Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-42256 (GCVE-0-2024-42256)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42256", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:12:59.830016Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:30.018Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/smb/client/smb2pdu.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b1d0a566769b6fb3795b5289fc1daf9e0638d97a", "status": "affected", "version": "3ee1a1fc39819906f04d6c62c180e760cd3a689d", "versionType": "git" }, { "lessThan": "de40579b903883274fe203865f29d66b168b7236", "status": "affected", "version": "3ee1a1fc39819906f04d6c62c180e760cd3a689d", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/smb/client/smb2pdu.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.10" }, { "lessThan": "6.10", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.10.*", "status": "unaffected", "version": "6.10.1", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.11", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.10.1", "versionStartIncluding": "6.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.11", "versionStartIncluding": "6.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix server re-repick on subrequest retry\n\nWhen a subrequest is marked for needing retry, netfs will call\ncifs_prepare_write() which will make cifs repick the server for the op\nbefore renegotiating credits; it then calls cifs_issue_write() which\ninvokes smb2_async_writev() - which re-repicks the server.\n\nIf a different server is then selected, this causes the increment of\nserver-\u003ein_flight to happen against one record and the decrement to happen\nagainst another, leading to misaccounting.\n\nFix this by just removing the repick code in smb2_async_writev(). As this\nis only called from netfslib-driven code, cifs_prepare_write() should\nalways have been called first, and so server should never be NULL and the\npreparatory step is repeated in the event that we do a retry.\n\nThe problem manifests as a warning looking something like:\n\n WARNING: CPU: 4 PID: 72896 at fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs]\n ...\n RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs]\n ...\n smb2_writev_callback+0x334/0x560 [cifs]\n cifs_demultiplex_thread+0x77a/0x11b0 [cifs]\n kthread+0x187/0x1d0\n ret_from_fork+0x34/0x60\n ret_from_fork_asm+0x1a/0x30\n\nWhich may be triggered by a number of different xfstests running against an\nAzure server in multichannel mode. generic/249 seems the most repeatable,\nbut generic/215, generic/249 and generic/308 may also show it." } ], "providerMetadata": { "dateUpdated": "2025-05-04T09:25:18.631Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b1d0a566769b6fb3795b5289fc1daf9e0638d97a" }, { "url": "https://git.kernel.org/stable/c/de40579b903883274fe203865f29d66b168b7236" } ], "title": "cifs: Fix server re-repick on subrequest retry", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42256", "datePublished": "2024-08-08T08:49:15.813Z", "dateReserved": "2024-07-30T07:40:12.257Z", "dateUpdated": "2025-05-04T09:25:18.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-42256\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-08-08T09:15:08.553\",\"lastModified\":\"2024-09-06T13:56:00.207\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncifs: Fix server re-repick on subrequest retry\\n\\nWhen a subrequest is marked for needing retry, netfs will call\\ncifs_prepare_write() which will make cifs repick the server for the op\\nbefore renegotiating credits; it then calls cifs_issue_write() which\\ninvokes smb2_async_writev() - which re-repicks the server.\\n\\nIf a different server is then selected, this causes the increment of\\nserver-\u003ein_flight to happen against one record and the decrement to happen\\nagainst another, leading to misaccounting.\\n\\nFix this by just removing the repick code in smb2_async_writev(). As this\\nis only called from netfslib-driven code, cifs_prepare_write() should\\nalways have been called first, and so server should never be NULL and the\\npreparatory step is repeated in the event that we do a retry.\\n\\nThe problem manifests as a warning looking something like:\\n\\n WARNING: CPU: 4 PID: 72896 at fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs]\\n ...\\n RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs]\\n ...\\n smb2_writev_callback+0x334/0x560 [cifs]\\n cifs_demultiplex_thread+0x77a/0x11b0 [cifs]\\n kthread+0x187/0x1d0\\n ret_from_fork+0x34/0x60\\n ret_from_fork_asm+0x1a/0x30\\n\\nWhich may be triggered by a number of different xfstests running against an\\nAzure server in multichannel mode. generic/249 seems the most repeatable,\\nbut generic/215, generic/249 and generic/308 may also show it.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: corrige la repetici\u00f3n del servidor en el reintento de subrequest Cuando se marca una subrequest para necesitar un reintento, netfs llamar\u00e1 a cifs_prepare_write(), lo que har\u00e1 que cifs vuelva a seleccionar el servidor para la operaci\u00f3n antes de renegociar los cr\u00e9ditos; luego llama a cifs_issue_write(), que invoca a smb2_async_writev(), que vuelve a seleccionar el servidor. Si luego se selecciona un servidor diferente, esto hace que el incremento de server-\u0026gt;in_flight ocurra en un registro y la disminuci\u00f3n en otro, lo que lleva a una contabilidad err\u00f3nea. Solucione este problema simplemente eliminando el c\u00f3digo de repetici\u00f3n en smb2_async_writev(). Como esto solo se llama desde c\u00f3digo controlado por netfslib, siempre se deber\u00eda haber llamado primero a cifs_prepare_write(), por lo que el servidor nunca deber\u00eda ser NULL y el paso preparatorio se repite en caso de que hagamos un reintento. El problema se manifiesta como una advertencia similar a: ADVERTENCIA: CPU: 4 PID: 72896 en fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs] ... RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs] ... smb2_writev_callback+0x334/0x560 [cifs] cifs_demultiplex_thread+0x77a/0x11b0 [cifs] kthread+0x187/0x1d0 ret_from_fork+0x34/0x60 ret_from_fork_asm+0x1a/0x30 Que puede ser activado por varios xfstests corriendo contra un Servidor Azure en modo multicanal. generic/249 parece el m\u00e1s repetible, pero generic/215, generic/249 y generic/308 tambi\u00e9n pueden mostrarlo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.10\",\"versionEndExcluding\":\"6.10.1\",\"matchCriteriaId\":\"CC5B6890-A2E7-41F8-AA56-E3202E9FB075\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/b1d0a566769b6fb3795b5289fc1daf9e0638d97a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/de40579b903883274fe203865f29d66b168b7236\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-42256\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:12:59.830016Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:24.038Z\"}}], \"cna\": {\"title\": \"cifs: Fix server re-repick on subrequest retry\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3ee1a1fc39819906f04d6c62c180e760cd3a689d\", \"lessThan\": \"b1d0a566769b6fb3795b5289fc1daf9e0638d97a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3ee1a1fc39819906f04d6c62c180e760cd3a689d\", \"lessThan\": \"de40579b903883274fe203865f29d66b168b7236\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/smb/client/smb2pdu.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.10\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.10\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.10.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/smb/client/smb2pdu.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b1d0a566769b6fb3795b5289fc1daf9e0638d97a\"}, {\"url\": \"https://git.kernel.org/stable/c/de40579b903883274fe203865f29d66b168b7236\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncifs: Fix server re-repick on subrequest retry\\n\\nWhen a subrequest is marked for needing retry, netfs will call\\ncifs_prepare_write() which will make cifs repick the server for the op\\nbefore renegotiating credits; it then calls cifs_issue_write() which\\ninvokes smb2_async_writev() - which re-repicks the server.\\n\\nIf a different server is then selected, this causes the increment of\\nserver-\u003ein_flight to happen against one record and the decrement to happen\\nagainst another, leading to misaccounting.\\n\\nFix this by just removing the repick code in smb2_async_writev(). As this\\nis only called from netfslib-driven code, cifs_prepare_write() should\\nalways have been called first, and so server should never be NULL and the\\npreparatory step is repeated in the event that we do a retry.\\n\\nThe problem manifests as a warning looking something like:\\n\\n WARNING: CPU: 4 PID: 72896 at fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs]\\n ...\\n RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs]\\n ...\\n smb2_writev_callback+0x334/0x560 [cifs]\\n cifs_demultiplex_thread+0x77a/0x11b0 [cifs]\\n kthread+0x187/0x1d0\\n ret_from_fork+0x34/0x60\\n ret_from_fork_asm+0x1a/0x30\\n\\nWhich may be triggered by a number of different xfstests running against an\\nAzure server in multichannel mode. generic/249 seems the most repeatable,\\nbut generic/215, generic/249 and generic/308 may also show it.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10.1\", \"versionStartIncluding\": \"6.10\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11\", \"versionStartIncluding\": \"6.10\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:25:18.631Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-42256\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:25:18.631Z\", \"dateReserved\": \"2024-07-30T07:40:12.257Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-08-08T08:49:15.813Z\", \"assignerShortName\": \"Linux\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ghsa-jrcf-gr4j-p9gp
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix server re-repick on subrequest retry
When a subrequest is marked for needing retry, netfs will call cifs_prepare_write() which will make cifs repick the server for the op before renegotiating credits; it then calls cifs_issue_write() which invokes smb2_async_writev() - which re-repicks the server.
If a different server is then selected, this causes the increment of server->in_flight to happen against one record and the decrement to happen against another, leading to misaccounting.
Fix this by just removing the repick code in smb2_async_writev(). As this is only called from netfslib-driven code, cifs_prepare_write() should always have been called first, and so server should never be NULL and the preparatory step is repeated in the event that we do a retry.
The problem manifests as a warning looking something like:
WARNING: CPU: 4 PID: 72896 at fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs] ... RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs] ... smb2_writev_callback+0x334/0x560 [cifs] cifs_demultiplex_thread+0x77a/0x11b0 [cifs] kthread+0x187/0x1d0 ret_from_fork+0x34/0x60 ret_from_fork_asm+0x1a/0x30
Which may be triggered by a number of different xfstests running against an Azure server in multichannel mode. generic/249 seems the most repeatable, but generic/215, generic/249 and generic/308 may also show it.
{ "affected": [], "aliases": [ "CVE-2024-42256" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-08-08T09:15:08Z", "severity": "CRITICAL" }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix server re-repick on subrequest retry\n\nWhen a subrequest is marked for needing retry, netfs will call\ncifs_prepare_write() which will make cifs repick the server for the op\nbefore renegotiating credits; it then calls cifs_issue_write() which\ninvokes smb2_async_writev() - which re-repicks the server.\n\nIf a different server is then selected, this causes the increment of\nserver-\u003ein_flight to happen against one record and the decrement to happen\nagainst another, leading to misaccounting.\n\nFix this by just removing the repick code in smb2_async_writev(). As this\nis only called from netfslib-driven code, cifs_prepare_write() should\nalways have been called first, and so server should never be NULL and the\npreparatory step is repeated in the event that we do a retry.\n\nThe problem manifests as a warning looking something like:\n\n WARNING: CPU: 4 PID: 72896 at fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs]\n ...\n RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs]\n ...\n smb2_writev_callback+0x334/0x560 [cifs]\n cifs_demultiplex_thread+0x77a/0x11b0 [cifs]\n kthread+0x187/0x1d0\n ret_from_fork+0x34/0x60\n ret_from_fork_asm+0x1a/0x30\n\nWhich may be triggered by a number of different xfstests running against an\nAzure server in multichannel mode. generic/249 seems the most repeatable,\nbut generic/215, generic/249 and generic/308 may also show it.", "id": "GHSA-jrcf-gr4j-p9gp", "modified": "2024-09-06T15:32:56Z", "published": "2024-08-08T09:30:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42256" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/b1d0a566769b6fb3795b5289fc1daf9e0638d97a" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/de40579b903883274fe203865f29d66b168b7236" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
WID-SEC-W-2024-1788
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1788 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1788.json" }, { "category": "self", "summary": "WID-SEC-2024-1788 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1788" }, { "category": "external", "summary": "Linux CVE Announce vom 2024-08-07", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5747 vom 2024-08-12", "url": "https://security-tracker.debian.org/tracker/DSA-5747-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12610 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12610.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12612 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12612.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12618 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12618.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7003-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3227-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019430.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7006-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7006-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3225-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019432.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-3 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7003-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-1 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7007-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3249-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019438.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6745 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6745" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6744 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6744" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-2 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7007-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6997" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-3 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7007-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3408-1 vom 2024-09-24", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TGC7PQ5QNGEZWYIHCKH2KPZMGYJ4VN6B/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7009-2 vom 2024-09-25", "url": "https://ubuntu.com/security/notices/USN-7009-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6997 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-6997.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-7000.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-4 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7003-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3467-1 vom 2024-09-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019532.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7001" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3499-1 vom 2024-09-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019536.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-5 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7003-5" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12779.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16", "url": "https://ubuntu.com/security/notices/USN-7069-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7069-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7174634" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7089-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7090-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7090-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7089-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8870" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8856" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8856.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-3 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7089-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7095-1 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7095-1" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8870" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-4 vom 2024-11-13", "url": "https://ubuntu.com/security/notices/USN-7089-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7089-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-6 vom 2024-11-15", "url": "https://ubuntu.com/security/notices/USN-7089-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-7 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7089-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10274 vom 2024-11-26", "url": "https://access.redhat.com/errata/RHSA-2024:10274" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25", "url": "https://ubuntu.com/security/notices/USN-7121-3" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10274 vom 2024-11-27", "url": "https://linux.oracle.com/errata/ELSA-2024-10274.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10772 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10772" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10773 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10773" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10771 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10771" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10", "url": "https://ubuntu.com/security/notices/USN-7148-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7159-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7159-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7159-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7166-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-4 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7159-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-5 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7159-5" }, { "category": "external", "summary": "IBM Security Bulletin 7180361 vom 2025-01-07", "url": "https://www.ibm.com/support/pages/node/7180361" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7195-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14", "url": "https://ubuntu.com/security/notices/USN-7195-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-1 vom 2025-01-28", "url": "https://ubuntu.com/security/notices/USN-7233-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-2 vom 2025-01-30", "url": "https://ubuntu.com/security/notices/USN-7233-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-3 vom 2025-02-03", "url": "https://ubuntu.com/security/notices/USN-7233-3" }, { "category": "external", "summary": "IBM Security Bulletin 7182335 vom 2025-02-03", "url": "https://www.ibm.com/support/pages/node/7182335" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-1 vom 2025-02-10", "url": "https://ubuntu.com/security/notices/USN-7262-1" }, { "category": "external", "summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7289-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-2 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7262-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7288-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7288-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7293-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7293-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7291-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7291-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7294-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7295-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7289-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7294-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7308-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7294-3" }, { "category": "external", "summary": "Debian Security Advisory DLA-4076 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03", "url": "https://ubuntu.com/security/notices/USN-7294-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1027-1 vom 2025-03-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7393-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7401-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7413-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7458-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-9080 vom 2025-06-18", "url": "http://linux.oracle.com/errata/ELSA-2025-9080.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02391-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021880.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02398-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZIQSMDCERQHP4JSQ3YSIO5TMBD637EV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02392-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021879.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02403-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXLF63OLKSA5LWF3BYMVRASA55GHVYJY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02390-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021881.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02419-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02422-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021884.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02440-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON72ZMOEO6E3K3KZFRVFHX5LUYA6RAXJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02455-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2GXZ2EL5OVKMNFWDPFV7NT367YYOFZO/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02436-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOC4XFCSYMATM6FYIQWRDFK5AQF4P2LT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02416-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021890.html" }, { "category": "external", "summary": "IBM Security Bulletin 7241167 vom 2025-07-30", "url": "https://www.ibm.com/support/pages/node/7241167" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff", "tracking": { "current_release_date": "2025-07-30T22:00:00.000+00:00", "generator": { "date": "2025-07-31T07:59:45.474+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-1788", "initial_release_date": "2024-08-07T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-08-12T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-09-10T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-09-16T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-22T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-23T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat, Ubuntu und SUSE aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Rocky Enterprise Software Foundation und SUSE aufgenommen" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-06T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-28T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-08T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-14T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-21T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-28T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-30T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-03T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu und IBM aufgenommen" }, { "date": "2025-02-10T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von BROCADE aufgenommen" }, { "date": "2025-02-24T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-26T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "73", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "73" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Broadcom Brocade SANnav", "product": { "name": "Broadcom Brocade SANnav", "product_id": "T034392", "product_identification_helper": { "cpe": "cpe:/a:broadcom:brocade_sannav:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01", "product_id": "T038741" } }, { "category": "product_version", "name": "7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP10 IF01", "product_id": "T038741-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP11", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11", "product_id": "T040749" } }, { "category": "product_version", "name": "7.5.0 UP11", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11", "product_id": "T040749-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.6.4", "product_id": "T040030" } }, { "category": "product_version", "name": "10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus 10.1.6.4", "product_id": "T040030-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4" } } } ], "category": "product_name", "name": "Spectrum Protect Plus" }, { "branches": [ { "category": "product_version_range", "name": "\u003c6.1.9.6", "product": { "name": "IBM Storage Scale System \u003c6.1.9.6", "product_id": "T041757" } }, { "category": "product_version", "name": "6.1.9.6", "product": { "name": "IBM Storage Scale System 6.1.9.6", "product_id": "T041757-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.6" } } }, { "category": "product_version_range", "name": "\u003c6.2.2.1", "product": { "name": "IBM Storage Scale System \u003c6.2.2.1", "product_id": "T041759" } }, { "category": "product_version", "name": "6.2.2.1", "product": { "name": "IBM Storage Scale System 6.2.2.1", "product_id": "T041759-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.2.2.1" } } } ], "category": "product_name", "name": "Storage Scale System" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.10", "product": { "name": "Open Source Linux Kernel \u003c6.10", "product_id": "T036648" } }, { "category": "product_version", "name": "6.1", "product": { "name": "Open Source Linux Kernel 6.10", "product_id": "T036648-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.10" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-42232", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42232" }, { "cve": "CVE-2024-42233", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42233" }, { "cve": "CVE-2024-42234", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42234" }, { "cve": "CVE-2024-42235", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42235" }, { "cve": "CVE-2024-42236", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42236" }, { "cve": "CVE-2024-42237", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42237" }, { "cve": "CVE-2024-42238", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42238" }, { "cve": "CVE-2024-42239", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42239" }, { "cve": "CVE-2024-42240", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42240" }, { "cve": "CVE-2024-42241", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42241" }, { "cve": "CVE-2024-42242", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42242" }, { "cve": "CVE-2024-42243", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42243" }, { "cve": "CVE-2024-42244", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42244" }, { "cve": "CVE-2024-42245", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42245" }, { "cve": "CVE-2024-42246", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42246" }, { "cve": "CVE-2024-42247", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42247" }, { "cve": "CVE-2024-42248", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42248" }, { "cve": "CVE-2024-42249", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42249" }, { "cve": "CVE-2024-42250", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42250" }, { "cve": "CVE-2024-42251", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42251" }, { "cve": "CVE-2024-42252", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42252" }, { "cve": "CVE-2024-42253", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42253" }, { "cve": "CVE-2024-42254", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42254" }, { "cve": "CVE-2024-42255", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42255" }, { "cve": "CVE-2024-42256", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42256" }, { "cve": "CVE-2024-42257", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42257" } ] }
wid-sec-w-2024-1788
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1788 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1788.json" }, { "category": "self", "summary": "WID-SEC-2024-1788 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1788" }, { "category": "external", "summary": "Linux CVE Announce vom 2024-08-07", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5747 vom 2024-08-12", "url": "https://security-tracker.debian.org/tracker/DSA-5747-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12610 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12610.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12612 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12612.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12618 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12618.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7003-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3227-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019430.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7006-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7006-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3225-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019432.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-3 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7003-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-1 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7007-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3249-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019438.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6745 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6745" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6744 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6744" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-2 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7007-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6997" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-3 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7007-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3408-1 vom 2024-09-24", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TGC7PQ5QNGEZWYIHCKH2KPZMGYJ4VN6B/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7009-2 vom 2024-09-25", "url": "https://ubuntu.com/security/notices/USN-7009-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6997 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-6997.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-7000.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-4 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7003-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3467-1 vom 2024-09-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019532.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7001" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3499-1 vom 2024-09-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019536.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-5 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7003-5" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12779.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16", "url": "https://ubuntu.com/security/notices/USN-7069-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7069-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7174634" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7089-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7090-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7090-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7089-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8870" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8856" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8856.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-3 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7089-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7095-1 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7095-1" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8870" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-4 vom 2024-11-13", "url": "https://ubuntu.com/security/notices/USN-7089-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7089-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-6 vom 2024-11-15", "url": "https://ubuntu.com/security/notices/USN-7089-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-7 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7089-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10274 vom 2024-11-26", "url": "https://access.redhat.com/errata/RHSA-2024:10274" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25", "url": "https://ubuntu.com/security/notices/USN-7121-3" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10274 vom 2024-11-27", "url": "https://linux.oracle.com/errata/ELSA-2024-10274.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10772 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10772" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10773 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10773" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10771 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10771" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10", "url": "https://ubuntu.com/security/notices/USN-7148-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7159-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7159-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7159-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7166-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-4 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7159-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-5 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7159-5" }, { "category": "external", "summary": "IBM Security Bulletin 7180361 vom 2025-01-07", "url": "https://www.ibm.com/support/pages/node/7180361" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7195-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14", "url": "https://ubuntu.com/security/notices/USN-7195-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-1 vom 2025-01-28", "url": "https://ubuntu.com/security/notices/USN-7233-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-2 vom 2025-01-30", "url": "https://ubuntu.com/security/notices/USN-7233-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-3 vom 2025-02-03", "url": "https://ubuntu.com/security/notices/USN-7233-3" }, { "category": "external", "summary": "IBM Security Bulletin 7182335 vom 2025-02-03", "url": "https://www.ibm.com/support/pages/node/7182335" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-1 vom 2025-02-10", "url": "https://ubuntu.com/security/notices/USN-7262-1" }, { "category": "external", "summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7289-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-2 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7262-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7288-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7288-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7293-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7293-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7291-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7291-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7294-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7295-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7289-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7294-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7308-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7294-3" }, { "category": "external", "summary": "Debian Security Advisory DLA-4076 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03", "url": "https://ubuntu.com/security/notices/USN-7294-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1027-1 vom 2025-03-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7393-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7401-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7413-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7458-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-9080 vom 2025-06-18", "url": "http://linux.oracle.com/errata/ELSA-2025-9080.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02391-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021880.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02398-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZIQSMDCERQHP4JSQ3YSIO5TMBD637EV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02392-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021879.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02403-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXLF63OLKSA5LWF3BYMVRASA55GHVYJY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02390-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021881.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02419-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02422-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021884.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02440-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON72ZMOEO6E3K3KZFRVFHX5LUYA6RAXJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02455-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2GXZ2EL5OVKMNFWDPFV7NT367YYOFZO/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02436-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOC4XFCSYMATM6FYIQWRDFK5AQF4P2LT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02416-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021890.html" }, { "category": "external", "summary": "IBM Security Bulletin 7241167 vom 2025-07-30", "url": "https://www.ibm.com/support/pages/node/7241167" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff", "tracking": { "current_release_date": "2025-07-30T22:00:00.000+00:00", "generator": { "date": "2025-07-31T07:59:45.474+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-1788", "initial_release_date": "2024-08-07T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-08-12T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-09-10T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-09-16T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-22T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-23T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat, Ubuntu und SUSE aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Rocky Enterprise Software Foundation und SUSE aufgenommen" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-06T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-28T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-08T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-14T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-21T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-28T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-30T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-03T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu und IBM aufgenommen" }, { "date": "2025-02-10T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von BROCADE aufgenommen" }, { "date": "2025-02-24T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-26T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "73", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "73" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Broadcom Brocade SANnav", "product": { "name": "Broadcom Brocade SANnav", "product_id": "T034392", "product_identification_helper": { "cpe": "cpe:/a:broadcom:brocade_sannav:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01", "product_id": "T038741" } }, { "category": "product_version", "name": "7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP10 IF01", "product_id": "T038741-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP11", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11", "product_id": "T040749" } }, { "category": "product_version", "name": "7.5.0 UP11", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11", "product_id": "T040749-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.6.4", "product_id": "T040030" } }, { "category": "product_version", "name": "10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus 10.1.6.4", "product_id": "T040030-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4" } } } ], "category": "product_name", "name": "Spectrum Protect Plus" }, { "branches": [ { "category": "product_version_range", "name": "\u003c6.1.9.6", "product": { "name": "IBM Storage Scale System \u003c6.1.9.6", "product_id": "T041757" } }, { "category": "product_version", "name": "6.1.9.6", "product": { "name": "IBM Storage Scale System 6.1.9.6", "product_id": "T041757-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.6" } } }, { "category": "product_version_range", "name": "\u003c6.2.2.1", "product": { "name": "IBM Storage Scale System \u003c6.2.2.1", "product_id": "T041759" } }, { "category": "product_version", "name": "6.2.2.1", "product": { "name": "IBM Storage Scale System 6.2.2.1", "product_id": "T041759-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.2.2.1" } } } ], "category": "product_name", "name": "Storage Scale System" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.10", "product": { "name": "Open Source Linux Kernel \u003c6.10", "product_id": "T036648" } }, { "category": "product_version", "name": "6.1", "product": { "name": "Open Source Linux Kernel 6.10", "product_id": "T036648-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.10" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-42232", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42232" }, { "cve": "CVE-2024-42233", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42233" }, { "cve": "CVE-2024-42234", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42234" }, { "cve": "CVE-2024-42235", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42235" }, { "cve": "CVE-2024-42236", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42236" }, { "cve": "CVE-2024-42237", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42237" }, { "cve": "CVE-2024-42238", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42238" }, { "cve": "CVE-2024-42239", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42239" }, { "cve": "CVE-2024-42240", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42240" }, { "cve": "CVE-2024-42241", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42241" }, { "cve": "CVE-2024-42242", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42242" }, { "cve": "CVE-2024-42243", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42243" }, { "cve": "CVE-2024-42244", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42244" }, { "cve": "CVE-2024-42245", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42245" }, { "cve": "CVE-2024-42246", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42246" }, { "cve": "CVE-2024-42247", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42247" }, { "cve": "CVE-2024-42248", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42248" }, { "cve": "CVE-2024-42249", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42249" }, { "cve": "CVE-2024-42250", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42250" }, { "cve": "CVE-2024-42251", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42251" }, { "cve": "CVE-2024-42252", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42252" }, { "cve": "CVE-2024-42253", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42253" }, { "cve": "CVE-2024-42254", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42254" }, { "cve": "CVE-2024-42255", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42255" }, { "cve": "CVE-2024-42256", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42256" }, { "cve": "CVE-2024-42257", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42257" } ] }
fkie_cve-2024-42256
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC5B6890-A2E7-41F8-AA56-E3202E9FB075", "versionEndExcluding": "6.10.1", "versionStartIncluding": "6.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix server re-repick on subrequest retry\n\nWhen a subrequest is marked for needing retry, netfs will call\ncifs_prepare_write() which will make cifs repick the server for the op\nbefore renegotiating credits; it then calls cifs_issue_write() which\ninvokes smb2_async_writev() - which re-repicks the server.\n\nIf a different server is then selected, this causes the increment of\nserver-\u003ein_flight to happen against one record and the decrement to happen\nagainst another, leading to misaccounting.\n\nFix this by just removing the repick code in smb2_async_writev(). As this\nis only called from netfslib-driven code, cifs_prepare_write() should\nalways have been called first, and so server should never be NULL and the\npreparatory step is repeated in the event that we do a retry.\n\nThe problem manifests as a warning looking something like:\n\n WARNING: CPU: 4 PID: 72896 at fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs]\n ...\n RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs]\n ...\n smb2_writev_callback+0x334/0x560 [cifs]\n cifs_demultiplex_thread+0x77a/0x11b0 [cifs]\n kthread+0x187/0x1d0\n ret_from_fork+0x34/0x60\n ret_from_fork_asm+0x1a/0x30\n\nWhich may be triggered by a number of different xfstests running against an\nAzure server in multichannel mode. generic/249 seems the most repeatable,\nbut generic/215, generic/249 and generic/308 may also show it." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: corrige la repetici\u00f3n del servidor en el reintento de subrequest Cuando se marca una subrequest para necesitar un reintento, netfs llamar\u00e1 a cifs_prepare_write(), lo que har\u00e1 que cifs vuelva a seleccionar el servidor para la operaci\u00f3n antes de renegociar los cr\u00e9ditos; luego llama a cifs_issue_write(), que invoca a smb2_async_writev(), que vuelve a seleccionar el servidor. Si luego se selecciona un servidor diferente, esto hace que el incremento de server-\u0026gt;in_flight ocurra en un registro y la disminuci\u00f3n en otro, lo que lleva a una contabilidad err\u00f3nea. Solucione este problema simplemente eliminando el c\u00f3digo de repetici\u00f3n en smb2_async_writev(). Como esto solo se llama desde c\u00f3digo controlado por netfslib, siempre se deber\u00eda haber llamado primero a cifs_prepare_write(), por lo que el servidor nunca deber\u00eda ser NULL y el paso preparatorio se repite en caso de que hagamos un reintento. El problema se manifiesta como una advertencia similar a: ADVERTENCIA: CPU: 4 PID: 72896 en fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs] ... RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs] ... smb2_writev_callback+0x334/0x560 [cifs] cifs_demultiplex_thread+0x77a/0x11b0 [cifs] kthread+0x187/0x1d0 ret_from_fork+0x34/0x60 ret_from_fork_asm+0x1a/0x30 Que puede ser activado por varios xfstests corriendo contra un Servidor Azure en modo multicanal. generic/249 parece el m\u00e1s repetible, pero generic/215, generic/249 y generic/308 tambi\u00e9n pueden mostrarlo." } ], "id": "CVE-2024-42256", "lastModified": "2024-09-06T13:56:00.207", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-08T09:15:08.553", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/b1d0a566769b6fb3795b5289fc1daf9e0638d97a" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/de40579b903883274fe203865f29d66b168b7236" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.