Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-42317 (GCVE-0-2024-42317)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42317", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:09:38.858847Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:33:26.338Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "include/linux/huge_mm.h", "mm/huge_memory.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "e60f62f75c99740a28e2bf7e6044086033012a16", "status": "affected", "version": "6b24ca4a1a8d4ee3221d6d44ddbb99f542e4bda3", "versionType": "git" }, { "lessThan": "d659b715e94ac039803d7601505d3473393fc0be", "status": "affected", "version": "6b24ca4a1a8d4ee3221d6d44ddbb99f542e4bda3", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "include/linux/huge_mm.h", "mm/huge_memory.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.17" }, { "lessThan": "5.17", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.10.*", "status": "unaffected", "version": "6.10.3", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.11", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.10.3", "versionStartIncluding": "5.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.11", "versionStartIncluding": "5.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/huge_memory: avoid PMD-size page cache if needed\n\nxarray can\u0027t support arbitrary page cache size. the largest and supported\npage cache size is defined as MAX_PAGECACHE_ORDER by commit 099d90642a71\n(\"mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray\"). However,\nit\u0027s possible to have 512MB page cache in the huge memory\u0027s collapsing\npath on ARM64 system whose base page size is 64KB. 512MB page cache is\nbreaking the limitation and a warning is raised when the xarray entry is\nsplit as shown in the following example.\n\n[root@dhcp-10-26-1-207 ~]# cat /proc/1/smaps | grep KernelPageSize\nKernelPageSize: 64 kB\n[root@dhcp-10-26-1-207 ~]# cat /tmp/test.c\n :\nint main(int argc, char **argv)\n{\n\tconst char *filename = TEST_XFS_FILENAME;\n\tint fd = 0;\n\tvoid *buf = (void *)-1, *p;\n\tint pgsize = getpagesize();\n\tint ret = 0;\n\n\tif (pgsize != 0x10000) {\n\t\tfprintf(stdout, \"System with 64KB base page size is required!\\n\");\n\t\treturn -EPERM;\n\t}\n\n\tsystem(\"echo 0 \u003e /sys/devices/virtual/bdi/253:0/read_ahead_kb\");\n\tsystem(\"echo 1 \u003e /proc/sys/vm/drop_caches\");\n\n\t/* Open the xfs file */\n\tfd = open(filename, O_RDONLY);\n\tassert(fd \u003e 0);\n\n\t/* Create VMA */\n\tbuf = mmap(NULL, TEST_MEM_SIZE, PROT_READ, MAP_SHARED, fd, 0);\n\tassert(buf != (void *)-1);\n\tfprintf(stdout, \"mapped buffer at 0x%p\\n\", buf);\n\n\t/* Populate VMA */\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_NOHUGEPAGE);\n\tassert(ret == 0);\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_POPULATE_READ);\n\tassert(ret == 0);\n\n\t/* Collapse VMA */\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_HUGEPAGE);\n\tassert(ret == 0);\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_COLLAPSE);\n\tif (ret) {\n\t\tfprintf(stdout, \"Error %d to madvise(MADV_COLLAPSE)\\n\", errno);\n\t\tgoto out;\n\t}\n\n\t/* Split xarray entry. Write permission is needed */\n\tmunmap(buf, TEST_MEM_SIZE);\n\tbuf = (void *)-1;\n\tclose(fd);\n\tfd = open(filename, O_RDWR);\n\tassert(fd \u003e 0);\n\tfallocate(fd, FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE,\n \t\t TEST_MEM_SIZE - pgsize, pgsize);\nout:\n\tif (buf != (void *)-1)\n\t\tmunmap(buf, TEST_MEM_SIZE);\n\tif (fd \u003e 0)\n\t\tclose(fd);\n\n\treturn ret;\n}\n\n[root@dhcp-10-26-1-207 ~]# gcc /tmp/test.c -o /tmp/test\n[root@dhcp-10-26-1-207 ~]# /tmp/test\n ------------[ cut here ]------------\n WARNING: CPU: 25 PID: 7560 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128\n Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \\\n nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \\\n nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \\\n ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse \\\n xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 virtio_net \\\n sha1_ce net_failover virtio_blk virtio_console failover dimlib virtio_mmio\n CPU: 25 PID: 7560 Comm: test Kdump: loaded Not tainted 6.10.0-rc7-gavin+ #9\n Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024\n pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n pc : xas_split_alloc+0xf8/0x128\n lr : split_huge_page_to_list_to_order+0x1c4/0x780\n sp : ffff8000ac32f660\n x29: ffff8000ac32f660 x28: ffff0000e0969eb0 x27: ffff8000ac32f6c0\n x26: 0000000000000c40 x25: ffff0000e0969eb0 x24: 000000000000000d\n x23: ffff8000ac32f6c0 x22: ffffffdfc0700000 x21: 0000000000000000\n x20: 0000000000000000 x19: ffffffdfc0700000 x18: 0000000000000000\n x17: 0000000000000000 x16: ffffd5f3708ffc70 x15: 0000000000000000\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: ffffffffffffffc0 x10: 0000000000000040 x9 : ffffd5f3708e692c\n x8 : 0000000000000003 x7 : 0000000000000000 x6 : ffff0000e0969eb8\n x5 : ffffd5f37289e378 x4 : 0000000000000000 x3 : 0000000000000c40\n x2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000\n Call trace:\n xas_split_alloc+0xf8/0x128\n split_huge_page_to_list_to_order+0x1c4/0x780\n truncate_inode_partial_folio+0xdc/0x160\n truncate_inode_pages_range+0x1b4/0x4a8\n truncate_pagecache_range+0x84/0xa\n---truncated---" } ], "providerMetadata": { "dateUpdated": "2025-05-04T09:26:37.791Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/e60f62f75c99740a28e2bf7e6044086033012a16" }, { "url": "https://git.kernel.org/stable/c/d659b715e94ac039803d7601505d3473393fc0be" } ], "title": "mm/huge_memory: avoid PMD-size page cache if needed", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42317", "datePublished": "2024-08-17T09:09:30.433Z", "dateReserved": "2024-07-30T07:40:12.278Z", "dateUpdated": "2025-05-04T09:26:37.791Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-42317\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-08-17T09:15:11.633\",\"lastModified\":\"2024-08-19T12:59:59.177\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm/huge_memory: avoid PMD-size page cache if needed\\n\\nxarray can\u0027t support arbitrary page cache size. the largest and supported\\npage cache size is defined as MAX_PAGECACHE_ORDER by commit 099d90642a71\\n(\\\"mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray\\\"). However,\\nit\u0027s possible to have 512MB page cache in the huge memory\u0027s collapsing\\npath on ARM64 system whose base page size is 64KB. 512MB page cache is\\nbreaking the limitation and a warning is raised when the xarray entry is\\nsplit as shown in the following example.\\n\\n[root@dhcp-10-26-1-207 ~]# cat /proc/1/smaps | grep KernelPageSize\\nKernelPageSize: 64 kB\\n[root@dhcp-10-26-1-207 ~]# cat /tmp/test.c\\n :\\nint main(int argc, char **argv)\\n{\\n\\tconst char *filename = TEST_XFS_FILENAME;\\n\\tint fd = 0;\\n\\tvoid *buf = (void *)-1, *p;\\n\\tint pgsize = getpagesize();\\n\\tint ret = 0;\\n\\n\\tif (pgsize != 0x10000) {\\n\\t\\tfprintf(stdout, \\\"System with 64KB base page size is required!\\\\n\\\");\\n\\t\\treturn -EPERM;\\n\\t}\\n\\n\\tsystem(\\\"echo 0 \u003e /sys/devices/virtual/bdi/253:0/read_ahead_kb\\\");\\n\\tsystem(\\\"echo 1 \u003e /proc/sys/vm/drop_caches\\\");\\n\\n\\t/* Open the xfs file */\\n\\tfd = open(filename, O_RDONLY);\\n\\tassert(fd \u003e 0);\\n\\n\\t/* Create VMA */\\n\\tbuf = mmap(NULL, TEST_MEM_SIZE, PROT_READ, MAP_SHARED, fd, 0);\\n\\tassert(buf != (void *)-1);\\n\\tfprintf(stdout, \\\"mapped buffer at 0x%p\\\\n\\\", buf);\\n\\n\\t/* Populate VMA */\\n\\tret = madvise(buf, TEST_MEM_SIZE, MADV_NOHUGEPAGE);\\n\\tassert(ret == 0);\\n\\tret = madvise(buf, TEST_MEM_SIZE, MADV_POPULATE_READ);\\n\\tassert(ret == 0);\\n\\n\\t/* Collapse VMA */\\n\\tret = madvise(buf, TEST_MEM_SIZE, MADV_HUGEPAGE);\\n\\tassert(ret == 0);\\n\\tret = madvise(buf, TEST_MEM_SIZE, MADV_COLLAPSE);\\n\\tif (ret) {\\n\\t\\tfprintf(stdout, \\\"Error %d to madvise(MADV_COLLAPSE)\\\\n\\\", errno);\\n\\t\\tgoto out;\\n\\t}\\n\\n\\t/* Split xarray entry. Write permission is needed */\\n\\tmunmap(buf, TEST_MEM_SIZE);\\n\\tbuf = (void *)-1;\\n\\tclose(fd);\\n\\tfd = open(filename, O_RDWR);\\n\\tassert(fd \u003e 0);\\n\\tfallocate(fd, FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE,\\n \\t\\t TEST_MEM_SIZE - pgsize, pgsize);\\nout:\\n\\tif (buf != (void *)-1)\\n\\t\\tmunmap(buf, TEST_MEM_SIZE);\\n\\tif (fd \u003e 0)\\n\\t\\tclose(fd);\\n\\n\\treturn ret;\\n}\\n\\n[root@dhcp-10-26-1-207 ~]# gcc /tmp/test.c -o /tmp/test\\n[root@dhcp-10-26-1-207 ~]# /tmp/test\\n ------------[ cut here ]------------\\n WARNING: CPU: 25 PID: 7560 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128\\n Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \\\\\\n nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \\\\\\n nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \\\\\\n ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse \\\\\\n xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 virtio_net \\\\\\n sha1_ce net_failover virtio_blk virtio_console failover dimlib virtio_mmio\\n CPU: 25 PID: 7560 Comm: test Kdump: loaded Not tainted 6.10.0-rc7-gavin+ #9\\n Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024\\n pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\\n pc : xas_split_alloc+0xf8/0x128\\n lr : split_huge_page_to_list_to_order+0x1c4/0x780\\n sp : ffff8000ac32f660\\n x29: ffff8000ac32f660 x28: ffff0000e0969eb0 x27: ffff8000ac32f6c0\\n x26: 0000000000000c40 x25: ffff0000e0969eb0 x24: 000000000000000d\\n x23: ffff8000ac32f6c0 x22: ffffffdfc0700000 x21: 0000000000000000\\n x20: 0000000000000000 x19: ffffffdfc0700000 x18: 0000000000000000\\n x17: 0000000000000000 x16: ffffd5f3708ffc70 x15: 0000000000000000\\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\\n x11: ffffffffffffffc0 x10: 0000000000000040 x9 : ffffd5f3708e692c\\n x8 : 0000000000000003 x7 : 0000000000000000 x6 : ffff0000e0969eb8\\n x5 : ffffd5f37289e378 x4 : 0000000000000000 x3 : 0000000000000c40\\n x2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000\\n Call trace:\\n xas_split_alloc+0xf8/0x128\\n split_huge_page_to_list_to_order+0x1c4/0x780\\n truncate_inode_partial_folio+0xdc/0x160\\n truncate_inode_pages_range+0x1b4/0x4a8\\n truncate_pagecache_range+0x84/0xa\\n---truncated---\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm/huge_memory: evite el cach\u00e9 de p\u00e1ginas de tama\u00f1o PMD si es necesario. xarray no puede admitir un tama\u00f1o de cach\u00e9 de p\u00e1ginas arbitrario. el tama\u00f1o de cach\u00e9 de p\u00e1gina m\u00e1s grande y admitido se define como MAX_PAGECACHE_ORDER mediante el commit 099d90642a71 (\\\"mm/filemap: hacer que MAX_PAGECACHE_ORDER sea aceptable para xarray\\\"). Sin embargo, es posible tener una cach\u00e9 de p\u00e1gina de 512 MB en la ruta de colapso de la enorme memoria en un sistema ARM64 cuyo tama\u00f1o de p\u00e1gina base es de 64 KB. La cach\u00e9 de p\u00e1gina de 512 MB supera la limitaci\u00f3n y aparece una advertencia cuando la entrada de xarray se divide como se muestra en el siguiente ejemplo. [root@dhcp-10-26-1-207 ~]# cat /proc/1/smaps | grep KernelPageSize KernelPageSize: 64 kB [root@dhcp-10-26-1-207 ~]# cat /tmp/test.c : int main(int argc, char **argv) { const char *filename = TEST_XFS_FILENAME; intfd = 0; vac\u00edo *buf = (vac\u00edo *)-1, *p; int pgsize = getpagesize(); int ret = 0; if (pgsize != 0x10000) { fprintf(stdout, \\\"\u00a1Se requiere un sistema con un tama\u00f1o de p\u00e1gina base de 64 KB!\\\\n\\\"); devolver -EPERM; } system(\\\"echo 0 \u0026gt; /sys/devices/virtual/bdi/253:0/read_ahead_kb\\\"); sistema(\\\"echo 1 \u0026gt; /proc/sys/vm/drop_caches\\\"); /* Abrir el archivo xfs */ fd = open(nombre de archivo, O_RDONLY); afirmar(fd \u0026gt; 0); /* Crear VMA */ buf = mmap(NULL, TEST_MEM_SIZE, PROT_READ, MAP_SHARED, fd, 0); afirmar(buf != (void *)-1); fprintf(stdout, \\\"b\u00fafer asignado en 0x%p\\\\n\\\", buf); /* Completar VMA */ ret = madvise(buf, TEST_MEM_SIZE, MADV_NOHUGEPAGE); afirmar(ret == 0); ret = madvise(buf, TEST_MEM_SIZE, MADV_POPULATE_READ); afirmar(ret == 0); /* Contraer VMA */ ret = madvise(buf, TEST_MEM_SIZE, MADV_HUGEPAGE); afirmar(ret == 0); ret = madvise(buf, TEST_MEM_SIZE, MADV_COLLAPSE); if (ret) { fprintf(stdout, \\\"Error %d en madvise(MADV_COLLAPSE)\\\\n\\\", errno); salir; } /* Dividir entrada de matriz x. Se necesita permiso de escritura */ munmap(buf, TEST_MEM_SIZE); buf = (nulo *)-1; cerrar(fd); fd = open(nombre de archivo, O_RDWR); afirmar(fd \u0026gt; 0); fallocate(fd, FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE, TEST_MEM_SIZE - tama\u00f1o de p\u00e1gina, tama\u00f1o de p\u00e1gina); salida: if (buf != (void *)-1) munmap(buf, TEST_MEM_SIZE); si (fd \u0026gt; 0) cerrar(fd); volver atr\u00e1s; } [root@dhcp-10-26-1-207 ~]# gcc /tmp/test.c -o /tmp/test [root@dhcp-10-26-1-207 ~]# /tmp/test -- ----------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 25 PID: 7560 en lib/xarray.c:1025 xas_split_alloc+0xf8/0x128 M\u00f3dulos vinculados en : nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \\\\ nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \\\\ nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \\\\ _set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse \\\\ xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 virtio_net \\\\ sha1_ce net_failover virtio_blk virtio_console failover dimlib virtio_mmio CPU: 25 PID: 7560 Comm : prueba Kdump: cargado No contaminado 6.10.0-rc7-gavin+ #9 Nombre del hardware: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 24/05/2024 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO + DIT -SSBS BTYPE=--) pc: xas_split_alloc+0xf8/0x128 lr: split_huge_page_to_list_to_order+0x1c4/0x780 sp: ffff8000ac32f660 x29: ffff8000ac32f660 x28: ffff0000e0969eb0 x27: 000ac32f6c0 x26: 0000000000000c40 x25: ffff0000e0969eb0 x24: 000000000000000d x23: ffff8000ac32f6c0 x22: ffffffdfc0700000 x21 : 0000000000000000 x20: 0000000000000000 x19: ffffffdfc0700000 x18: 0000000000000000 x17: 0000000000000000 x16: ffffd5f3708ffc70 x15: 000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: ffffffffffffffc0 x10: 0000000000000040 x9: 08e692c x8: 0000000000000003 x7: 0000000000000000 x6: ffff0000e0969eb8 x5: ffffd5f37289e378 x4: 0000000000000000 x3: 0000000000000c40 x2: 000000000000000d x1: 000000000000000c x0: 0000000000000000 Rastreo de llamadas: xas_split_alloc+0xf8/0x128 ---truncado---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/d659b715e94ac039803d7601505d3473393fc0be\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e60f62f75c99740a28e2bf7e6044086033012a16\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-42317\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:09:38.858847Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:23.378Z\"}}], \"cna\": {\"title\": \"mm/huge_memory: avoid PMD-size page cache if needed\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6b24ca4a1a8d4ee3221d6d44ddbb99f542e4bda3\", \"lessThan\": \"e60f62f75c99740a28e2bf7e6044086033012a16\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6b24ca4a1a8d4ee3221d6d44ddbb99f542e4bda3\", \"lessThan\": \"d659b715e94ac039803d7601505d3473393fc0be\", \"versionType\": \"git\"}], \"programFiles\": [\"include/linux/huge_mm.h\", \"mm/huge_memory.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.17\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.17\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.10.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"include/linux/huge_mm.h\", \"mm/huge_memory.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e60f62f75c99740a28e2bf7e6044086033012a16\"}, {\"url\": \"https://git.kernel.org/stable/c/d659b715e94ac039803d7601505d3473393fc0be\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm/huge_memory: avoid PMD-size page cache if needed\\n\\nxarray can\u0027t support arbitrary page cache size. the largest and supported\\npage cache size is defined as MAX_PAGECACHE_ORDER by commit 099d90642a71\\n(\\\"mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray\\\"). However,\\nit\u0027s possible to have 512MB page cache in the huge memory\u0027s collapsing\\npath on ARM64 system whose base page size is 64KB. 512MB page cache is\\nbreaking the limitation and a warning is raised when the xarray entry is\\nsplit as shown in the following example.\\n\\n[root@dhcp-10-26-1-207 ~]# cat /proc/1/smaps | grep KernelPageSize\\nKernelPageSize: 64 kB\\n[root@dhcp-10-26-1-207 ~]# cat /tmp/test.c\\n :\\nint main(int argc, char **argv)\\n{\\n\\tconst char *filename = TEST_XFS_FILENAME;\\n\\tint fd = 0;\\n\\tvoid *buf = (void *)-1, *p;\\n\\tint pgsize = getpagesize();\\n\\tint ret = 0;\\n\\n\\tif (pgsize != 0x10000) {\\n\\t\\tfprintf(stdout, \\\"System with 64KB base page size is required!\\\\n\\\");\\n\\t\\treturn -EPERM;\\n\\t}\\n\\n\\tsystem(\\\"echo 0 \u003e /sys/devices/virtual/bdi/253:0/read_ahead_kb\\\");\\n\\tsystem(\\\"echo 1 \u003e /proc/sys/vm/drop_caches\\\");\\n\\n\\t/* Open the xfs file */\\n\\tfd = open(filename, O_RDONLY);\\n\\tassert(fd \u003e 0);\\n\\n\\t/* Create VMA */\\n\\tbuf = mmap(NULL, TEST_MEM_SIZE, PROT_READ, MAP_SHARED, fd, 0);\\n\\tassert(buf != (void *)-1);\\n\\tfprintf(stdout, \\\"mapped buffer at 0x%p\\\\n\\\", buf);\\n\\n\\t/* Populate VMA */\\n\\tret = madvise(buf, TEST_MEM_SIZE, MADV_NOHUGEPAGE);\\n\\tassert(ret == 0);\\n\\tret = madvise(buf, TEST_MEM_SIZE, MADV_POPULATE_READ);\\n\\tassert(ret == 0);\\n\\n\\t/* Collapse VMA */\\n\\tret = madvise(buf, TEST_MEM_SIZE, MADV_HUGEPAGE);\\n\\tassert(ret == 0);\\n\\tret = madvise(buf, TEST_MEM_SIZE, MADV_COLLAPSE);\\n\\tif (ret) {\\n\\t\\tfprintf(stdout, \\\"Error %d to madvise(MADV_COLLAPSE)\\\\n\\\", errno);\\n\\t\\tgoto out;\\n\\t}\\n\\n\\t/* Split xarray entry. Write permission is needed */\\n\\tmunmap(buf, TEST_MEM_SIZE);\\n\\tbuf = (void *)-1;\\n\\tclose(fd);\\n\\tfd = open(filename, O_RDWR);\\n\\tassert(fd \u003e 0);\\n\\tfallocate(fd, FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE,\\n \\t\\t TEST_MEM_SIZE - pgsize, pgsize);\\nout:\\n\\tif (buf != (void *)-1)\\n\\t\\tmunmap(buf, TEST_MEM_SIZE);\\n\\tif (fd \u003e 0)\\n\\t\\tclose(fd);\\n\\n\\treturn ret;\\n}\\n\\n[root@dhcp-10-26-1-207 ~]# gcc /tmp/test.c -o /tmp/test\\n[root@dhcp-10-26-1-207 ~]# /tmp/test\\n ------------[ cut here ]------------\\n WARNING: CPU: 25 PID: 7560 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128\\n Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \\\\\\n nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \\\\\\n nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \\\\\\n ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse \\\\\\n xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 virtio_net \\\\\\n sha1_ce net_failover virtio_blk virtio_console failover dimlib virtio_mmio\\n CPU: 25 PID: 7560 Comm: test Kdump: loaded Not tainted 6.10.0-rc7-gavin+ #9\\n Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024\\n pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\\n pc : xas_split_alloc+0xf8/0x128\\n lr : split_huge_page_to_list_to_order+0x1c4/0x780\\n sp : ffff8000ac32f660\\n x29: ffff8000ac32f660 x28: ffff0000e0969eb0 x27: ffff8000ac32f6c0\\n x26: 0000000000000c40 x25: ffff0000e0969eb0 x24: 000000000000000d\\n x23: ffff8000ac32f6c0 x22: ffffffdfc0700000 x21: 0000000000000000\\n x20: 0000000000000000 x19: ffffffdfc0700000 x18: 0000000000000000\\n x17: 0000000000000000 x16: ffffd5f3708ffc70 x15: 0000000000000000\\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\\n x11: ffffffffffffffc0 x10: 0000000000000040 x9 : ffffd5f3708e692c\\n x8 : 0000000000000003 x7 : 0000000000000000 x6 : ffff0000e0969eb8\\n x5 : ffffd5f37289e378 x4 : 0000000000000000 x3 : 0000000000000c40\\n x2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000\\n Call trace:\\n xas_split_alloc+0xf8/0x128\\n split_huge_page_to_list_to_order+0x1c4/0x780\\n truncate_inode_partial_folio+0xdc/0x160\\n truncate_inode_pages_range+0x1b4/0x4a8\\n truncate_pagecache_range+0x84/0xa\\n---truncated---\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10.3\", \"versionStartIncluding\": \"5.17\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11\", \"versionStartIncluding\": \"5.17\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:26:37.791Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-42317\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:26:37.791Z\", \"dateReserved\": \"2024-07-30T07:40:12.278Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-08-17T09:09:30.433Z\", \"assignerShortName\": \"Linux\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
wid-sec-w-2024-1875
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu erzielen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1875 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1875.json" }, { "category": "self", "summary": "WID-SEC-2024-1875 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1875" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2023-52889 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081739-CVE-2023-52889-cdd0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42260 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-42260-0ce0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42261 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081736-CVE-2024-42261-f6a2@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42262 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081736-CVE-2024-42262-7156@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42263 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081737-CVE-2024-42263-31b3@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42264 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081737-CVE-2024-42264-5d23@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42265 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081737-CVE-2024-42265-a943@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42266 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081738-CVE-2024-42266-529f@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42267 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081738-CVE-2024-42267-9f79@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42268 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081738-CVE-2024-42268-2084@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42269 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081739-CVE-2024-42269-7d0a@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42270 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081739-CVE-2024-42270-c752@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42271 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081739-CVE-2024-42271-c501@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42272 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081739-CVE-2024-42272-c687@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42273 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081740-CVE-2024-42273-9b87@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42274 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081740-CVE-2024-42274-9dc6@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42275 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081740-CVE-2024-42275-8f91@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42276 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081741-CVE-2024-42276-cb0a@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42277 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081741-CVE-2024-42277-997a@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42278 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081742-CVE-2024-42278-e639@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42279 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081742-CVE-2024-42279-91b0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42280 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081742-CVE-2024-42280-b97c@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42281 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081743-CVE-2024-42281-780b@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42282 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081743-CVE-2024-42282-85ea@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42283 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081743-CVE-2024-42283-15a5@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42284 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081743-CVE-2024-42284-bbfa@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42285 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081744-CVE-2024-42285-37ec@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42286 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081744-CVE-2024-42286-e856@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42287 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081744-CVE-2024-42287-d635@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42288 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081745-CVE-2024-42288-c59b@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42289 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081745-CVE-2024-42289-fe68@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42290 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081745-CVE-2024-42290-c966@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42291 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42291-6f31@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42292 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42292-5387@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42293 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42293-0660@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42294 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42294-0145@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42295 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081747-CVE-2024-42295-4f43@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42296 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081747-CVE-2024-42296-3f50@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42297 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081747-CVE-2024-42297-fcec@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42298 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081748-CVE-2024-42298-d6a1@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42299 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081748-CVE-2024-42299-a588@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42300 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081748-CVE-2024-42300-0b29@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42301 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42301-4026@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42302 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42302-c0d9@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42303 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42303-4d12@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42304 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42304-d0e4@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42305 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081750-CVE-2024-42305-94ed@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42306 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081750-CVE-2024-42306-647c@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42307 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081750-CVE-2024-42307-7c2c@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42308 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081751-CVE-2024-42308-562d@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42309 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081751-CVE-2024-42309-9560@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42310 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081751-CVE-2024-42310-58b0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42311 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081752-CVE-2024-42311-f825@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42312 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081752-CVE-2024-42312-bddc@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42313 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081752-CVE-2024-42313-09b9@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42314 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081752-CVE-2024-42314-de1f@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42315 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081753-CVE-2024-42315-a707@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42316 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081753-CVE-2024-42316-8b49@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42317 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081753-CVE-2024-42317-cf87@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42318 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081754-CVE-2024-42318-f0c9@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42319 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081754-CVE-2024-42319-ec7c@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42320 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081754-CVE-2024-42320-cdea@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42321 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42321-4b46@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42322 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42322-e2ef@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43815 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081720-CVE-2024-43815-38e7@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43816 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081723-CVE-2024-43816-293f@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43817 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081723-CVE-2024-43817-2e95@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43818 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081723-CVE-2024-43818-71ec@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43819 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081723-CVE-2024-43819-88ce@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43820 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081724-CVE-2024-43820-1bd6@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43821 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081724-CVE-2024-43821-6ffc@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43822 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081724-CVE-2024-43822-6511@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43823 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081725-CVE-2024-43823-4bdd@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43824 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081725-CVE-2024-43824-fc04@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43825 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081725-CVE-2024-43825-20fc@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43826 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081726-CVE-2024-43826-2a5f@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43827 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081726-CVE-2024-43827-6486@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43828 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081726-CVE-2024-43828-6bcb@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43829 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081726-CVE-2024-43829-72cb@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43830 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081727-CVE-2024-43830-3b85@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43831 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081727-CVE-2024-43831-b13e@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43832 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081727-CVE-2024-43832-7746@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43833 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081728-CVE-2024-43833-4e73@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43834 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081728-CVE-2024-43834-0140@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43835 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081728-CVE-2024-43835-5f11@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43836 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081729-CVE-2024-43836-d81d@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43837 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081729-CVE-2024-43837-63d2@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43838 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081729-CVE-2024-43838-968a@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43839 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081729-CVE-2024-43839-ea03@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43840 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081730-CVE-2024-43840-69cb@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43841 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081730-CVE-2024-43841-8143@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43842 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081730-CVE-2024-43842-31e7@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43843 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081731-CVE-2024-43843-e436@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43844 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081731-CVE-2024-43844-97ea@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43845 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081731-CVE-2024-43845-a85d@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43846 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081732-CVE-2024-43846-2bd0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43847 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081732-CVE-2024-43847-6828@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43848 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081732-CVE-2024-43848-4e24@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43849 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081732-CVE-2024-43849-fef0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43850 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43850-4eec@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43851 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43851-26f9@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43852 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43852-61e2@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43853 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-43853-da5b@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43854 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-43854-5586@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43855 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-43855-b78a@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43856 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081732-CVE-2024-43856-9087@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43857 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43857-b71b@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43858 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43858-0d3e@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43859 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43859-62b4@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43860 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-43860-d72f@gregkh/T/" }, { "category": "external", "summary": "Kernel Updates vom 2024-08-18", "url": "https://kernel.org" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3225-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019432.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3227-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019430.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7004-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7004-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3249-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019438.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3408-1 vom 2024-09-24", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TGC7PQ5QNGEZWYIHCKH2KPZMGYJ4VN6B/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7009-2 vom 2024-09-25", "url": "https://ubuntu.com/security/notices/USN-7009-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-7000.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3499-1 vom 2024-09-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019536.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7001" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12682 vom 2024-09-30", "url": "http://linux.oracle.com/errata/ELSA-2024-12682.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5782 vom 2024-10-03", "url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3563-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12780 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12780.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8107 vom 2024-10-15", "url": "https://access.redhat.com/errata/RHSA-2024:8107" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12782 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12782.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8157 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8157" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8162 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8162" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8158 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8158" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16", "url": "https://ubuntu.com/security/notices/USN-7069-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8162 vom 2024-10-16", "url": "https://linux.oracle.com/errata/ELSA-2024-8162.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7069-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12796 vom 2024-10-21", "url": "https://linux.oracle.com/errata/ELSA-2024-12796.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8162 vom 2024-10-25", "url": "https://errata.build.resf.org/RLSA-2024:8162" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8617 vom 2024-10-30", "url": "https://access.redhat.com/errata/RHSA-2024:8617" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8617 vom 2024-10-31", "url": "https://linux.oracle.com/errata/ELSA-2024-8617.html" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7174634" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7089-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7090-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7090-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7089-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8856" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8870" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8856.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-3 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7089-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7095-1 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7095-1" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8870" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8617 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8617" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9497 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9497" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9498 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9498" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-4 vom 2024-11-13", "url": "https://ubuntu.com/security/notices/USN-7089-4" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9605 vom 2024-11-14", "url": "https://access.redhat.com/errata/RHSA-2024:9605" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7089-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7110-1 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7110-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-6 vom 2024-11-15", "url": "https://ubuntu.com/security/notices/USN-7089-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-7 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7089-7" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-9605 vom 2024-11-19", "url": "https://linux.oracle.com/errata/ELSA-2024-9605.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7123-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12830 vom 2024-11-21", "url": "https://linux.oracle.com/errata/ELSA-2024-12830.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5818 vom 2024-11-24", "url": "https://lists.debian.org/debian-security-announce/2024/msg00233.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25", "url": "https://ubuntu.com/security/notices/USN-7121-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10773 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10773" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10772 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10772" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10771 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10771" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09", "url": "https://linux.oracle.com/errata/ELSA-2024-12868.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10939" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10", "url": "https://ubuntu.com/security/notices/USN-7148-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10939.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4345-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", "url": "https://linux.oracle.com/errata/ELSA-2024-12887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7184-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7184-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7183-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7183-1" }, { "category": "external", "summary": "IBM Security Bulletin 7180361 vom 2025-01-07", "url": "https://www.ibm.com/support/pages/node/7180361" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7185-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7185-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13", "url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-1 vom 2025-01-28", "url": "https://ubuntu.com/security/notices/USN-7233-1" }, { "category": "external", "summary": "IBM Security Bulletin 7181933 vom 2025-01-29", "url": "https://www.ibm.com/support/pages/node/7181933" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-2 vom 2025-01-30", "url": "https://ubuntu.com/security/notices/USN-7233-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-3 vom 2025-02-03", "url": "https://ubuntu.com/security/notices/USN-7233-3" }, { "category": "external", "summary": "IBM Security Bulletin 7182335 vom 2025-02-03", "url": "https://www.ibm.com/support/pages/node/7182335" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20095 vom 2025-02-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20095.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-1 vom 2025-02-10", "url": "https://ubuntu.com/security/notices/USN-7262-1" }, { "category": "external", "summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7288-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-2 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7262-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7288-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7308-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7289-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-4076 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4075 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2270 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:2270" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1912 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:1912" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7331-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7331-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7332-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1962 vom 2025-03-06", "url": "https://alas.aws.amazon.com/ALAS-2025-1962.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2777 vom 2025-03-07", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2777.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2490 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2490" }, { "category": "external", "summary": "IBM Security Bulletin 7185244 vom 2025-03-10", "url": "https://www.ibm.com/support/pages/node/7185244" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-2 vom 2025-03-11", "url": "https://ubuntu.com/security/notices/USN-7332-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-3 vom 2025-03-13", "url": "https://ubuntu.com/security/notices/USN-7332-3" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-095 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-095.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-065 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-065.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-084 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-084.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2705 vom 2025-03-18", "url": "https://access.redhat.com/errata/RHSA-2025:2705" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2696 vom 2025-03-19", "url": "https://access.redhat.com/errata/RHSA-2025:2696" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7387-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7407-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3506 vom 2025-04-02", "url": "https://access.redhat.com/errata/RHSA-2025:3506" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-3506 vom 2025-04-03", "url": "https://linux.oracle.com/errata/ELSA-2025-3506.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7421-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5900 vom 2025-04-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7459-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7459-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4341 vom 2025-04-30", "url": "https://access.redhat.com/errata/RHSA-2025:4341" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4342 vom 2025-04-30", "url": "https://access.redhat.com/errata/RHSA-2025:4342" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-4341 vom 2025-05-01", "url": "https://linux.oracle.com/errata/ELSA-2025-4341.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4509 vom 2025-05-06", "url": "https://access.redhat.com/errata/RHSA-2025:4509" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5925 vom 2025-05-24", "url": "https://lists.debian.org/debian-security-announce/2025/msg00088.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8247 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8247" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8246 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8246" }, { "category": "external", "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-8246 vom 2025-05-29", "url": "https://linux.oracle.com/errata/ELSA-2025-8246.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06", "url": "https://ubuntu.com/security/notices/USN-7553-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-5" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SEM 2025.2.1 release notes vom 2025-07-02", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4271 vom 2025-08-13", "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7711-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7712-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7712-2" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-09-02T22:00:00.000+00:00", "generator": { "date": "2025-09-03T07:32:06.337+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-1875", "initial_release_date": "2024-08-18T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-09-16T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-23T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE, Rocky Enterprise Software Foundation und Oracle Linux aufgenommen" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-10-16T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-21T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-27T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-10-29T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-06T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat, Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-21T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-02T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-01-28T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-30T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-03T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu und IBM aufgenommen" }, { "date": "2025-02-10T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von BROCADE aufgenommen" }, { "date": "2025-02-24T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-03-04T23:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-05T23:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-06T23:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-09T23:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-10T23:00:00.000+00:00", "number": "67", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-12T23:00:00.000+00:00", "number": "69", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-13T23:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-17T23:00:00.000+00:00", "number": "71", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-19T23:00:00.000+00:00", "number": "72", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "73", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "74", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-02T22:00:00.000+00:00", "number": "75", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "76", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-04-07T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-13T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-01T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-05-05T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-25T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von Debian und Oracle Linux aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "91", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "92", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-05T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "97", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-01T22:00:00.000+00:00", "number": "98", "summary": "Neue Updates aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "99", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "100", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "101", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "102", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "103", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "104", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-08-18T22:00:00.000+00:00", "number": "105", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "106", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "107", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "107" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade SANnav", "product": { "name": "Broadcom Brocade SANnav", "product_id": "T034392", "product_identification_helper": { "cpe": "cpe:/a:broadcom:brocade_sannav:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Guardium", "product": { "name": "IBM InfoSphere Guardium", "product_id": "T002366", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_guardium:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01", "product_id": "T038741" } }, { "category": "product_version", "name": "7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP10 IF01", "product_id": "T038741-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP11", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11", "product_id": "T040749" } }, { "category": "product_version", "name": "7.5.0 UP11", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11", "product_id": "T040749-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "IBM Security Guardium 12.0", "product_id": "T031092", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:12.0" } } } ], "category": "product_name", "name": "Security Guardium" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.6.4", "product_id": "T040030" } }, { "category": "product_version", "name": "10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus 10.1.6.4", "product_id": "T040030-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4" } } } ], "category": "product_name", "name": "Spectrum Protect Plus" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.11-rc4", "product": { "name": "Open Source Linux Kernel \u003c6.11-rc4", "product_id": "T036946" } }, { "category": "product_version", "name": "6.11-rc4", "product": { "name": "Open Source Linux Kernel 6.11-rc4", "product_id": "T036946-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.11-rc4" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2025.2.1", "product": { "name": "SolarWinds Security Event Manager \u003c2025.2.1", "product_id": "T044986" } }, { "category": "product_version", "name": "2025.2.1", "product": { "name": "SolarWinds Security Event Manager 2025.2.1", "product_id": "T044986-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1" } } } ], "category": "product_name", "name": "Security Event Manager" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52889", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2023-52889" }, { "cve": "CVE-2024-42260", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42260" }, { "cve": "CVE-2024-42261", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42261" }, { "cve": "CVE-2024-42262", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42262" }, { "cve": "CVE-2024-42263", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42263" }, { "cve": "CVE-2024-42264", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42264" }, { "cve": "CVE-2024-42265", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42265" }, { "cve": "CVE-2024-42266", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42266" }, { "cve": "CVE-2024-42267", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42267" }, { "cve": "CVE-2024-42268", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42268" }, { "cve": "CVE-2024-42269", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42269" }, { "cve": "CVE-2024-42270", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42270" }, { "cve": "CVE-2024-42271", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42271" }, { "cve": "CVE-2024-42272", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42272" }, { "cve": "CVE-2024-42273", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42273" }, { "cve": "CVE-2024-42274", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42274" }, { "cve": "CVE-2024-42275", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42275" }, { "cve": "CVE-2024-42276", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42276" }, { "cve": "CVE-2024-42277", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42277" }, { "cve": "CVE-2024-42278", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42278" }, { "cve": "CVE-2024-42279", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42279" }, { "cve": "CVE-2024-42280", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42280" }, { "cve": "CVE-2024-42281", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42281" }, { "cve": "CVE-2024-42282", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42282" }, { "cve": "CVE-2024-42283", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42283" }, { "cve": "CVE-2024-42284", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42284" }, { "cve": "CVE-2024-42285", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42285" }, { "cve": "CVE-2024-42286", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42286" }, { "cve": "CVE-2024-42287", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42287" }, { "cve": "CVE-2024-42288", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42288" }, { "cve": "CVE-2024-42289", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42289" }, { "cve": "CVE-2024-42290", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42290" }, { "cve": "CVE-2024-42291", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42291" }, { "cve": "CVE-2024-42292", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42292" }, { "cve": "CVE-2024-42293", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42293" }, { "cve": "CVE-2024-42294", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42294" }, { "cve": "CVE-2024-42295", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42295" }, { "cve": "CVE-2024-42296", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42296" }, { "cve": "CVE-2024-42297", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42297" }, { "cve": "CVE-2024-42298", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42298" }, { "cve": "CVE-2024-42299", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42299" }, { "cve": "CVE-2024-42300", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42300" }, { "cve": "CVE-2024-42301", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42301" }, { "cve": "CVE-2024-42302", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42302" }, { "cve": "CVE-2024-42303", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42303" }, { "cve": "CVE-2024-42304", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42304" }, { "cve": "CVE-2024-42305", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42305" }, { "cve": "CVE-2024-42306", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42306" }, { "cve": "CVE-2024-42307", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42307" }, { "cve": "CVE-2024-42308", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42308" }, { "cve": "CVE-2024-42309", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42309" }, { "cve": "CVE-2024-42310", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42310" }, { "cve": "CVE-2024-42311", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42311" }, { "cve": "CVE-2024-42312", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42312" }, { "cve": "CVE-2024-42313", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42313" }, { "cve": "CVE-2024-42314", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42314" }, { "cve": "CVE-2024-42315", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42315" }, { "cve": "CVE-2024-42316", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42316" }, { "cve": "CVE-2024-42317", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42317" }, { "cve": "CVE-2024-42318", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42318" }, { "cve": "CVE-2024-42319", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42319" }, { "cve": "CVE-2024-42320", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42320" }, { "cve": "CVE-2024-42321", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42321" }, { "cve": "CVE-2024-42322", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42322" }, { "cve": "CVE-2024-43815", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43815" }, { "cve": "CVE-2024-43816", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43816" }, { "cve": "CVE-2024-43817", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43817" }, { "cve": "CVE-2024-43818", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43818" }, { "cve": "CVE-2024-43819", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43819" }, { "cve": "CVE-2024-43820", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43820" }, { "cve": "CVE-2024-43821", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43821" }, { "cve": "CVE-2024-43822", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43822" }, { "cve": "CVE-2024-43823", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43823" }, { "cve": "CVE-2024-43824", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43824" }, { "cve": "CVE-2024-43825", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43825" }, { "cve": "CVE-2024-43826", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43826" }, { "cve": "CVE-2024-43827", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43827" }, { "cve": "CVE-2024-43828", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43828" }, { "cve": "CVE-2024-43829", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43829" }, { "cve": "CVE-2024-43830", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43830" }, { "cve": "CVE-2024-43831", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43831" }, { "cve": "CVE-2024-43832", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43832" }, { "cve": "CVE-2024-43833", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43833" }, { "cve": "CVE-2024-43834", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43834" }, { "cve": "CVE-2024-43835", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43835" }, { "cve": "CVE-2024-43836", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43836" }, { "cve": "CVE-2024-43837", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43837" }, { "cve": "CVE-2024-43838", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43838" }, { "cve": "CVE-2024-43839", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43839" }, { "cve": "CVE-2024-43840", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43840" }, { "cve": "CVE-2024-43841", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43841" }, { "cve": "CVE-2024-43842", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43842" }, { "cve": "CVE-2024-43843", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43843" }, { "cve": "CVE-2024-43844", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43844" }, { "cve": "CVE-2024-43845", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43845" }, { "cve": "CVE-2024-43846", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43846" }, { "cve": "CVE-2024-43847", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43847" }, { "cve": "CVE-2024-43848", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43848" }, { "cve": "CVE-2024-43849", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43849" }, { "cve": "CVE-2024-43850", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43850" }, { "cve": "CVE-2024-43851", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43851" }, { "cve": "CVE-2024-43852", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43852" }, { "cve": "CVE-2024-43853", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43853" }, { "cve": "CVE-2024-43854", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43854" }, { "cve": "CVE-2024-43855", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43855" }, { "cve": "CVE-2024-43856", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43856" }, { "cve": "CVE-2024-43857", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43857" }, { "cve": "CVE-2024-43858", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43858" }, { "cve": "CVE-2024-43859", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43859" }, { "cve": "CVE-2024-43860", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43860" } ] }
WID-SEC-W-2024-1875
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu erzielen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1875 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1875.json" }, { "category": "self", "summary": "WID-SEC-2024-1875 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1875" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2023-52889 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081739-CVE-2023-52889-cdd0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42260 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-42260-0ce0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42261 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081736-CVE-2024-42261-f6a2@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42262 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081736-CVE-2024-42262-7156@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42263 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081737-CVE-2024-42263-31b3@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42264 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081737-CVE-2024-42264-5d23@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42265 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081737-CVE-2024-42265-a943@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42266 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081738-CVE-2024-42266-529f@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42267 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081738-CVE-2024-42267-9f79@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42268 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081738-CVE-2024-42268-2084@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42269 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081739-CVE-2024-42269-7d0a@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42270 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081739-CVE-2024-42270-c752@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42271 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081739-CVE-2024-42271-c501@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42272 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081739-CVE-2024-42272-c687@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42273 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081740-CVE-2024-42273-9b87@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42274 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081740-CVE-2024-42274-9dc6@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42275 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081740-CVE-2024-42275-8f91@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42276 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081741-CVE-2024-42276-cb0a@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42277 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081741-CVE-2024-42277-997a@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42278 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081742-CVE-2024-42278-e639@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42279 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081742-CVE-2024-42279-91b0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42280 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081742-CVE-2024-42280-b97c@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42281 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081743-CVE-2024-42281-780b@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42282 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081743-CVE-2024-42282-85ea@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42283 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081743-CVE-2024-42283-15a5@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42284 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081743-CVE-2024-42284-bbfa@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42285 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081744-CVE-2024-42285-37ec@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42286 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081744-CVE-2024-42286-e856@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42287 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081744-CVE-2024-42287-d635@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42288 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081745-CVE-2024-42288-c59b@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42289 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081745-CVE-2024-42289-fe68@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42290 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081745-CVE-2024-42290-c966@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42291 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42291-6f31@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42292 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42292-5387@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42293 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42293-0660@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42294 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42294-0145@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42295 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081747-CVE-2024-42295-4f43@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42296 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081747-CVE-2024-42296-3f50@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42297 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081747-CVE-2024-42297-fcec@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42298 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081748-CVE-2024-42298-d6a1@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42299 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081748-CVE-2024-42299-a588@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42300 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081748-CVE-2024-42300-0b29@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42301 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42301-4026@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42302 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42302-c0d9@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42303 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42303-4d12@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42304 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42304-d0e4@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42305 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081750-CVE-2024-42305-94ed@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42306 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081750-CVE-2024-42306-647c@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42307 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081750-CVE-2024-42307-7c2c@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42308 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081751-CVE-2024-42308-562d@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42309 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081751-CVE-2024-42309-9560@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42310 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081751-CVE-2024-42310-58b0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42311 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081752-CVE-2024-42311-f825@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42312 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081752-CVE-2024-42312-bddc@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42313 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081752-CVE-2024-42313-09b9@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42314 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081752-CVE-2024-42314-de1f@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42315 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081753-CVE-2024-42315-a707@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42316 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081753-CVE-2024-42316-8b49@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42317 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081753-CVE-2024-42317-cf87@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42318 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081754-CVE-2024-42318-f0c9@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42319 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081754-CVE-2024-42319-ec7c@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42320 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081754-CVE-2024-42320-cdea@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42321 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42321-4b46@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-42322 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42322-e2ef@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43815 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081720-CVE-2024-43815-38e7@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43816 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081723-CVE-2024-43816-293f@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43817 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081723-CVE-2024-43817-2e95@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43818 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081723-CVE-2024-43818-71ec@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43819 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081723-CVE-2024-43819-88ce@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43820 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081724-CVE-2024-43820-1bd6@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43821 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081724-CVE-2024-43821-6ffc@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43822 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081724-CVE-2024-43822-6511@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43823 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081725-CVE-2024-43823-4bdd@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43824 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081725-CVE-2024-43824-fc04@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43825 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081725-CVE-2024-43825-20fc@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43826 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081726-CVE-2024-43826-2a5f@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43827 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081726-CVE-2024-43827-6486@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43828 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081726-CVE-2024-43828-6bcb@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43829 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081726-CVE-2024-43829-72cb@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43830 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081727-CVE-2024-43830-3b85@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43831 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081727-CVE-2024-43831-b13e@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43832 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081727-CVE-2024-43832-7746@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43833 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081728-CVE-2024-43833-4e73@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43834 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081728-CVE-2024-43834-0140@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43835 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081728-CVE-2024-43835-5f11@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43836 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081729-CVE-2024-43836-d81d@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43837 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081729-CVE-2024-43837-63d2@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43838 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081729-CVE-2024-43838-968a@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43839 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081729-CVE-2024-43839-ea03@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43840 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081730-CVE-2024-43840-69cb@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43841 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081730-CVE-2024-43841-8143@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43842 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081730-CVE-2024-43842-31e7@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43843 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081731-CVE-2024-43843-e436@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43844 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081731-CVE-2024-43844-97ea@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43845 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081731-CVE-2024-43845-a85d@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43846 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081732-CVE-2024-43846-2bd0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43847 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081732-CVE-2024-43847-6828@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43848 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081732-CVE-2024-43848-4e24@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43849 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081732-CVE-2024-43849-fef0@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43850 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43850-4eec@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43851 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43851-26f9@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43852 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43852-61e2@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43853 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-43853-da5b@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43854 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-43854-5586@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43855 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-43855-b78a@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43856 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081732-CVE-2024-43856-9087@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43857 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43857-b71b@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43858 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43858-0d3e@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43859 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081733-CVE-2024-43859-62b4@gregkh/T/" }, { "category": "external", "summary": "Linux CVE Announcement CVE-2024-43860 vom 2024-08-18", "url": "https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-43860-d72f@gregkh/T/" }, { "category": "external", "summary": "Kernel Updates vom 2024-08-18", "url": "https://kernel.org" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3225-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019432.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3227-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019430.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7004-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7004-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3249-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019438.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3408-1 vom 2024-09-24", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TGC7PQ5QNGEZWYIHCKH2KPZMGYJ4VN6B/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7009-2 vom 2024-09-25", "url": "https://ubuntu.com/security/notices/USN-7009-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-7000.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3499-1 vom 2024-09-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019536.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7001" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12682 vom 2024-09-30", "url": "http://linux.oracle.com/errata/ELSA-2024-12682.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5782 vom 2024-10-03", "url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3563-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12780 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12780.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8107 vom 2024-10-15", "url": "https://access.redhat.com/errata/RHSA-2024:8107" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12782 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12782.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8157 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8157" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8162 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8162" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8158 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8158" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16", "url": "https://ubuntu.com/security/notices/USN-7069-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8162 vom 2024-10-16", "url": "https://linux.oracle.com/errata/ELSA-2024-8162.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7069-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12796 vom 2024-10-21", "url": "https://linux.oracle.com/errata/ELSA-2024-12796.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8162 vom 2024-10-25", "url": "https://errata.build.resf.org/RLSA-2024:8162" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8617 vom 2024-10-30", "url": "https://access.redhat.com/errata/RHSA-2024:8617" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8617 vom 2024-10-31", "url": "https://linux.oracle.com/errata/ELSA-2024-8617.html" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7174634" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7089-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7090-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7090-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7089-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8856" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8870" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8856.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-3 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7089-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7095-1 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7095-1" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8870" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8617 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8617" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9497 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9497" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9498 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9498" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-4 vom 2024-11-13", "url": "https://ubuntu.com/security/notices/USN-7089-4" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9605 vom 2024-11-14", "url": "https://access.redhat.com/errata/RHSA-2024:9605" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7089-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7110-1 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7110-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-6 vom 2024-11-15", "url": "https://ubuntu.com/security/notices/USN-7089-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-7 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7089-7" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-9605 vom 2024-11-19", "url": "https://linux.oracle.com/errata/ELSA-2024-9605.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7123-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12830 vom 2024-11-21", "url": "https://linux.oracle.com/errata/ELSA-2024-12830.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5818 vom 2024-11-24", "url": "https://lists.debian.org/debian-security-announce/2024/msg00233.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25", "url": "https://ubuntu.com/security/notices/USN-7121-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10773 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10773" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10772 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10772" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10771 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10771" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09", "url": "https://linux.oracle.com/errata/ELSA-2024-12868.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10939" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10", "url": "https://ubuntu.com/security/notices/USN-7148-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10939.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4345-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", "url": "https://linux.oracle.com/errata/ELSA-2024-12887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7184-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7184-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7183-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7183-1" }, { "category": "external", "summary": "IBM Security Bulletin 7180361 vom 2025-01-07", "url": "https://www.ibm.com/support/pages/node/7180361" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7185-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7185-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13", "url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-1 vom 2025-01-28", "url": "https://ubuntu.com/security/notices/USN-7233-1" }, { "category": "external", "summary": "IBM Security Bulletin 7181933 vom 2025-01-29", "url": "https://www.ibm.com/support/pages/node/7181933" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-2 vom 2025-01-30", "url": "https://ubuntu.com/security/notices/USN-7233-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-3 vom 2025-02-03", "url": "https://ubuntu.com/security/notices/USN-7233-3" }, { "category": "external", "summary": "IBM Security Bulletin 7182335 vom 2025-02-03", "url": "https://www.ibm.com/support/pages/node/7182335" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20095 vom 2025-02-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20095.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-1 vom 2025-02-10", "url": "https://ubuntu.com/security/notices/USN-7262-1" }, { "category": "external", "summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7288-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-2 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7262-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7288-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7308-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7289-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-4076 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4075 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2270 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:2270" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1912 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:1912" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7331-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7331-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7332-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1962 vom 2025-03-06", "url": "https://alas.aws.amazon.com/ALAS-2025-1962.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2777 vom 2025-03-07", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2777.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2490 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2490" }, { "category": "external", "summary": "IBM Security Bulletin 7185244 vom 2025-03-10", "url": "https://www.ibm.com/support/pages/node/7185244" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-2 vom 2025-03-11", "url": "https://ubuntu.com/security/notices/USN-7332-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-3 vom 2025-03-13", "url": "https://ubuntu.com/security/notices/USN-7332-3" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-095 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-095.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-065 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-065.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-084 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-084.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2705 vom 2025-03-18", "url": "https://access.redhat.com/errata/RHSA-2025:2705" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2696 vom 2025-03-19", "url": "https://access.redhat.com/errata/RHSA-2025:2696" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7387-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7407-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3506 vom 2025-04-02", "url": "https://access.redhat.com/errata/RHSA-2025:3506" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-3506 vom 2025-04-03", "url": "https://linux.oracle.com/errata/ELSA-2025-3506.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7421-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5900 vom 2025-04-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7459-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7459-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4341 vom 2025-04-30", "url": "https://access.redhat.com/errata/RHSA-2025:4341" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4342 vom 2025-04-30", "url": "https://access.redhat.com/errata/RHSA-2025:4342" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-4341 vom 2025-05-01", "url": "https://linux.oracle.com/errata/ELSA-2025-4341.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4509 vom 2025-05-06", "url": "https://access.redhat.com/errata/RHSA-2025:4509" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5925 vom 2025-05-24", "url": "https://lists.debian.org/debian-security-announce/2025/msg00088.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8247 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8247" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8246 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8246" }, { "category": "external", "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-8246 vom 2025-05-29", "url": "https://linux.oracle.com/errata/ELSA-2025-8246.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06", "url": "https://ubuntu.com/security/notices/USN-7553-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-5" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SEM 2025.2.1 release notes vom 2025-07-02", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4271 vom 2025-08-13", "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7711-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7712-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7712-2" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-09-02T22:00:00.000+00:00", "generator": { "date": "2025-09-03T07:32:06.337+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-1875", "initial_release_date": "2024-08-18T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-09-16T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-23T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE, Rocky Enterprise Software Foundation und Oracle Linux aufgenommen" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-10-16T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-21T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-27T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-10-29T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-06T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat, Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-21T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-02T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-01-28T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-30T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-03T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu und IBM aufgenommen" }, { "date": "2025-02-10T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von BROCADE aufgenommen" }, { "date": "2025-02-24T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-03-04T23:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-05T23:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-06T23:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-09T23:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-10T23:00:00.000+00:00", "number": "67", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-12T23:00:00.000+00:00", "number": "69", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-13T23:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-17T23:00:00.000+00:00", "number": "71", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-19T23:00:00.000+00:00", "number": "72", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "73", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "74", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-02T22:00:00.000+00:00", "number": "75", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "76", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-04-07T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-13T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-01T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-05-05T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-25T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von Debian und Oracle Linux aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "91", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "92", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-05T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "97", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-01T22:00:00.000+00:00", "number": "98", "summary": "Neue Updates aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "99", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "100", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "101", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "102", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "103", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "104", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-08-18T22:00:00.000+00:00", "number": "105", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "106", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "107", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "107" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade SANnav", "product": { "name": "Broadcom Brocade SANnav", "product_id": "T034392", "product_identification_helper": { "cpe": "cpe:/a:broadcom:brocade_sannav:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Guardium", "product": { "name": "IBM InfoSphere Guardium", "product_id": "T002366", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_guardium:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01", "product_id": "T038741" } }, { "category": "product_version", "name": "7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP10 IF01", "product_id": "T038741-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP11", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11", "product_id": "T040749" } }, { "category": "product_version", "name": "7.5.0 UP11", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11", "product_id": "T040749-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "IBM Security Guardium 12.0", "product_id": "T031092", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:12.0" } } } ], "category": "product_name", "name": "Security Guardium" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.6.4", "product_id": "T040030" } }, { "category": "product_version", "name": "10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus 10.1.6.4", "product_id": "T040030-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4" } } } ], "category": "product_name", "name": "Spectrum Protect Plus" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.11-rc4", "product": { "name": "Open Source Linux Kernel \u003c6.11-rc4", "product_id": "T036946" } }, { "category": "product_version", "name": "6.11-rc4", "product": { "name": "Open Source Linux Kernel 6.11-rc4", "product_id": "T036946-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.11-rc4" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2025.2.1", "product": { "name": "SolarWinds Security Event Manager \u003c2025.2.1", "product_id": "T044986" } }, { "category": "product_version", "name": "2025.2.1", "product": { "name": "SolarWinds Security Event Manager 2025.2.1", "product_id": "T044986-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1" } } } ], "category": "product_name", "name": "Security Event Manager" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52889", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2023-52889" }, { "cve": "CVE-2024-42260", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42260" }, { "cve": "CVE-2024-42261", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42261" }, { "cve": "CVE-2024-42262", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42262" }, { "cve": "CVE-2024-42263", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42263" }, { "cve": "CVE-2024-42264", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42264" }, { "cve": "CVE-2024-42265", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42265" }, { "cve": "CVE-2024-42266", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42266" }, { "cve": "CVE-2024-42267", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42267" }, { "cve": "CVE-2024-42268", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42268" }, { "cve": "CVE-2024-42269", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42269" }, { "cve": "CVE-2024-42270", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42270" }, { "cve": "CVE-2024-42271", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42271" }, { "cve": "CVE-2024-42272", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42272" }, { "cve": "CVE-2024-42273", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42273" }, { "cve": "CVE-2024-42274", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42274" }, { "cve": "CVE-2024-42275", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42275" }, { "cve": "CVE-2024-42276", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42276" }, { "cve": "CVE-2024-42277", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42277" }, { "cve": "CVE-2024-42278", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42278" }, { "cve": "CVE-2024-42279", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42279" }, { "cve": "CVE-2024-42280", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42280" }, { "cve": "CVE-2024-42281", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42281" }, { "cve": "CVE-2024-42282", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42282" }, { "cve": "CVE-2024-42283", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42283" }, { "cve": "CVE-2024-42284", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42284" }, { "cve": "CVE-2024-42285", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42285" }, { "cve": "CVE-2024-42286", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42286" }, { "cve": "CVE-2024-42287", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42287" }, { "cve": "CVE-2024-42288", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42288" }, { "cve": "CVE-2024-42289", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42289" }, { "cve": "CVE-2024-42290", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42290" }, { "cve": "CVE-2024-42291", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42291" }, { "cve": "CVE-2024-42292", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42292" }, { "cve": "CVE-2024-42293", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42293" }, { "cve": "CVE-2024-42294", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42294" }, { "cve": "CVE-2024-42295", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42295" }, { "cve": "CVE-2024-42296", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42296" }, { "cve": "CVE-2024-42297", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42297" }, { "cve": "CVE-2024-42298", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42298" }, { "cve": "CVE-2024-42299", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42299" }, { "cve": "CVE-2024-42300", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42300" }, { "cve": "CVE-2024-42301", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42301" }, { "cve": "CVE-2024-42302", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42302" }, { "cve": "CVE-2024-42303", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42303" }, { "cve": "CVE-2024-42304", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42304" }, { "cve": "CVE-2024-42305", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42305" }, { "cve": "CVE-2024-42306", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42306" }, { "cve": "CVE-2024-42307", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42307" }, { "cve": "CVE-2024-42308", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42308" }, { "cve": "CVE-2024-42309", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42309" }, { "cve": "CVE-2024-42310", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42310" }, { "cve": "CVE-2024-42311", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42311" }, { "cve": "CVE-2024-42312", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42312" }, { "cve": "CVE-2024-42313", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42313" }, { "cve": "CVE-2024-42314", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42314" }, { "cve": "CVE-2024-42315", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42315" }, { "cve": "CVE-2024-42316", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42316" }, { "cve": "CVE-2024-42317", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42317" }, { "cve": "CVE-2024-42318", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42318" }, { "cve": "CVE-2024-42319", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42319" }, { "cve": "CVE-2024-42320", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42320" }, { "cve": "CVE-2024-42321", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42321" }, { "cve": "CVE-2024-42322", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-42322" }, { "cve": "CVE-2024-43815", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43815" }, { "cve": "CVE-2024-43816", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43816" }, { "cve": "CVE-2024-43817", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43817" }, { "cve": "CVE-2024-43818", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43818" }, { "cve": "CVE-2024-43819", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43819" }, { "cve": "CVE-2024-43820", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43820" }, { "cve": "CVE-2024-43821", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43821" }, { "cve": "CVE-2024-43822", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43822" }, { "cve": "CVE-2024-43823", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43823" }, { "cve": "CVE-2024-43824", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43824" }, { "cve": "CVE-2024-43825", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43825" }, { "cve": "CVE-2024-43826", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43826" }, { "cve": "CVE-2024-43827", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43827" }, { "cve": "CVE-2024-43828", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43828" }, { "cve": "CVE-2024-43829", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43829" }, { "cve": "CVE-2024-43830", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43830" }, { "cve": "CVE-2024-43831", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43831" }, { "cve": "CVE-2024-43832", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43832" }, { "cve": "CVE-2024-43833", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43833" }, { "cve": "CVE-2024-43834", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43834" }, { "cve": "CVE-2024-43835", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43835" }, { "cve": "CVE-2024-43836", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43836" }, { "cve": "CVE-2024-43837", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43837" }, { "cve": "CVE-2024-43838", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43838" }, { "cve": "CVE-2024-43839", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43839" }, { "cve": "CVE-2024-43840", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43840" }, { "cve": "CVE-2024-43841", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43841" }, { "cve": "CVE-2024-43842", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43842" }, { "cve": "CVE-2024-43843", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43843" }, { "cve": "CVE-2024-43844", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43844" }, { "cve": "CVE-2024-43845", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43845" }, { "cve": "CVE-2024-43846", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43846" }, { "cve": "CVE-2024-43847", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43847" }, { "cve": "CVE-2024-43848", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43848" }, { "cve": "CVE-2024-43849", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43849" }, { "cve": "CVE-2024-43850", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43850" }, { "cve": "CVE-2024-43851", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43851" }, { "cve": "CVE-2024-43852", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43852" }, { "cve": "CVE-2024-43853", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43853" }, { "cve": "CVE-2024-43854", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43854" }, { "cve": "CVE-2024-43855", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43855" }, { "cve": "CVE-2024-43856", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43856" }, { "cve": "CVE-2024-43857", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43857" }, { "cve": "CVE-2024-43858", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43858" }, { "cve": "CVE-2024-43859", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43859" }, { "cve": "CVE-2024-43860", "product_status": { "known_affected": [ "T036946", "T040749", "67646", "T004914", "T032255", "T038741", "T040030", "T044986", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-08-18T22:00:00.000+00:00", "title": "CVE-2024-43860" } ] }
ghsa-rwv8-fgrm-jqjg
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
mm/huge_memory: avoid PMD-size page cache if needed
xarray can't support arbitrary page cache size. the largest and supported page cache size is defined as MAX_PAGECACHE_ORDER by commit 099d90642a71 ("mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray"). However, it's possible to have 512MB page cache in the huge memory's collapsing path on ARM64 system whose base page size is 64KB. 512MB page cache is breaking the limitation and a warning is raised when the xarray entry is split as shown in the following example.
[root@dhcp-10-26-1-207 ~]# cat /proc/1/smaps | grep KernelPageSize KernelPageSize: 64 kB [root@dhcp-10-26-1-207 ~]# cat /tmp/test.c : int main(int argc, char argv) { const char filename = TEST_XFS_FILENAME; int fd = 0; void buf = (void )-1, p; int pgsize = getpagesize(); int ret = 0;
if (pgsize != 0x10000) {
fprintf(stdout, "System with 64KB base page size is required!\n");
return -EPERM;
}
system("echo 0 > /sys/devices/virtual/bdi/253:0/read_ahead_kb");
system("echo 1 > /proc/sys/vm/drop_caches");
/* Open the xfs file */
fd = open(filename, O_RDONLY);
assert(fd > 0);
/* Create VMA */
buf = mmap(NULL, TEST_MEM_SIZE, PROT_READ, MAP_SHARED, fd, 0);
assert(buf != (void *)-1);
fprintf(stdout, "mapped buffer at 0x%p\n", buf);
/* Populate VMA */
ret = madvise(buf, TEST_MEM_SIZE, MADV_NOHUGEPAGE);
assert(ret == 0);
ret = madvise(buf, TEST_MEM_SIZE, MADV_POPULATE_READ);
assert(ret == 0);
/* Collapse VMA */
ret = madvise(buf, TEST_MEM_SIZE, MADV_HUGEPAGE);
assert(ret == 0);
ret = madvise(buf, TEST_MEM_SIZE, MADV_COLLAPSE);
if (ret) {
fprintf(stdout, "Error %d to madvise(MADV_COLLAPSE)\n", errno);
goto out;
}
/* Split xarray entry. Write permission is needed */
munmap(buf, TEST_MEM_SIZE);
buf = (void *)-1;
close(fd);
fd = open(filename, O_RDWR);
assert(fd > 0);
fallocate(fd, FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE,
TEST_MEM_SIZE - pgsize, pgsize);
out: if (buf != (void *)-1) munmap(buf, TEST_MEM_SIZE); if (fd > 0) close(fd);
return ret;
}
[root@dhcp-10-26-1-207 ~]# gcc /tmp/test.c -o /tmp/test [root@dhcp-10-26-1-207 ~]# /tmp/test ------------[ cut here ]------------ WARNING: CPU: 25 PID: 7560 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128 Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \ nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \ nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \ ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse \ xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 virtio_net \ sha1_ce net_failover virtio_blk virtio_console failover dimlib virtio_mmio CPU: 25 PID: 7560 Comm: test Kdump: loaded Not tainted 6.10.0-rc7-gavin+ #9 Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : xas_split_alloc+0xf8/0x128 lr : split_huge_page_to_list_to_order+0x1c4/0x780 sp : ffff8000ac32f660 x29: ffff8000ac32f660 x28: ffff0000e0969eb0 x27: ffff8000ac32f6c0 x26: 0000000000000c40 x25: ffff0000e0969eb0 x24: 000000000000000d x23: ffff8000ac32f6c0 x22: ffffffdfc0700000 x21: 0000000000000000 x20: 0000000000000000 x19: ffffffdfc0700000 x18: 0000000000000000 x17: 0000000000000000 x16: ffffd5f3708ffc70 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: ffffffffffffffc0 x10: 0000000000000040 x9 : ffffd5f3708e692c x8 : 0000000000000003 x7 : 0000000000000000 x6 : ffff0000e0969eb8 x5 : ffffd5f37289e378 x4 : 0000000000000000 x3 : 0000000000000c40 x2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000 Call trace: xas_split_alloc+0xf8/0x128 split_huge_page_to_list_to_order+0x1c4/0x780 truncate_inode_partial_folio+0xdc/0x160 truncate_inode_pages_range+0x1b4/0x4a8 truncate_pagecache_range+0x84/0xa ---truncated---
{ "affected": [], "aliases": [ "CVE-2024-42317" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-08-17T09:15:11Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/huge_memory: avoid PMD-size page cache if needed\n\nxarray can\u0027t support arbitrary page cache size. the largest and supported\npage cache size is defined as MAX_PAGECACHE_ORDER by commit 099d90642a71\n(\"mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray\"). However,\nit\u0027s possible to have 512MB page cache in the huge memory\u0027s collapsing\npath on ARM64 system whose base page size is 64KB. 512MB page cache is\nbreaking the limitation and a warning is raised when the xarray entry is\nsplit as shown in the following example.\n\n[root@dhcp-10-26-1-207 ~]# cat /proc/1/smaps | grep KernelPageSize\nKernelPageSize: 64 kB\n[root@dhcp-10-26-1-207 ~]# cat /tmp/test.c\n :\nint main(int argc, char **argv)\n{\n\tconst char *filename = TEST_XFS_FILENAME;\n\tint fd = 0;\n\tvoid *buf = (void *)-1, *p;\n\tint pgsize = getpagesize();\n\tint ret = 0;\n\n\tif (pgsize != 0x10000) {\n\t\tfprintf(stdout, \"System with 64KB base page size is required!\\n\");\n\t\treturn -EPERM;\n\t}\n\n\tsystem(\"echo 0 \u003e /sys/devices/virtual/bdi/253:0/read_ahead_kb\");\n\tsystem(\"echo 1 \u003e /proc/sys/vm/drop_caches\");\n\n\t/* Open the xfs file */\n\tfd = open(filename, O_RDONLY);\n\tassert(fd \u003e 0);\n\n\t/* Create VMA */\n\tbuf = mmap(NULL, TEST_MEM_SIZE, PROT_READ, MAP_SHARED, fd, 0);\n\tassert(buf != (void *)-1);\n\tfprintf(stdout, \"mapped buffer at 0x%p\\n\", buf);\n\n\t/* Populate VMA */\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_NOHUGEPAGE);\n\tassert(ret == 0);\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_POPULATE_READ);\n\tassert(ret == 0);\n\n\t/* Collapse VMA */\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_HUGEPAGE);\n\tassert(ret == 0);\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_COLLAPSE);\n\tif (ret) {\n\t\tfprintf(stdout, \"Error %d to madvise(MADV_COLLAPSE)\\n\", errno);\n\t\tgoto out;\n\t}\n\n\t/* Split xarray entry. Write permission is needed */\n\tmunmap(buf, TEST_MEM_SIZE);\n\tbuf = (void *)-1;\n\tclose(fd);\n\tfd = open(filename, O_RDWR);\n\tassert(fd \u003e 0);\n\tfallocate(fd, FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE,\n \t\t TEST_MEM_SIZE - pgsize, pgsize);\nout:\n\tif (buf != (void *)-1)\n\t\tmunmap(buf, TEST_MEM_SIZE);\n\tif (fd \u003e 0)\n\t\tclose(fd);\n\n\treturn ret;\n}\n\n[root@dhcp-10-26-1-207 ~]# gcc /tmp/test.c -o /tmp/test\n[root@dhcp-10-26-1-207 ~]# /tmp/test\n ------------[ cut here ]------------\n WARNING: CPU: 25 PID: 7560 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128\n Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \\\n nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \\\n nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \\\n ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse \\\n xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 virtio_net \\\n sha1_ce net_failover virtio_blk virtio_console failover dimlib virtio_mmio\n CPU: 25 PID: 7560 Comm: test Kdump: loaded Not tainted 6.10.0-rc7-gavin+ #9\n Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024\n pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n pc : xas_split_alloc+0xf8/0x128\n lr : split_huge_page_to_list_to_order+0x1c4/0x780\n sp : ffff8000ac32f660\n x29: ffff8000ac32f660 x28: ffff0000e0969eb0 x27: ffff8000ac32f6c0\n x26: 0000000000000c40 x25: ffff0000e0969eb0 x24: 000000000000000d\n x23: ffff8000ac32f6c0 x22: ffffffdfc0700000 x21: 0000000000000000\n x20: 0000000000000000 x19: ffffffdfc0700000 x18: 0000000000000000\n x17: 0000000000000000 x16: ffffd5f3708ffc70 x15: 0000000000000000\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: ffffffffffffffc0 x10: 0000000000000040 x9 : ffffd5f3708e692c\n x8 : 0000000000000003 x7 : 0000000000000000 x6 : ffff0000e0969eb8\n x5 : ffffd5f37289e378 x4 : 0000000000000000 x3 : 0000000000000c40\n x2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000\n Call trace:\n xas_split_alloc+0xf8/0x128\n split_huge_page_to_list_to_order+0x1c4/0x780\n truncate_inode_partial_folio+0xdc/0x160\n truncate_inode_pages_range+0x1b4/0x4a8\n truncate_pagecache_range+0x84/0xa\n---truncated---", "id": "GHSA-rwv8-fgrm-jqjg", "modified": "2024-08-17T09:30:25Z", "published": "2024-08-17T09:30:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42317" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/d659b715e94ac039803d7601505d3473393fc0be" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/e60f62f75c99740a28e2bf7e6044086033012a16" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2024-42317
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/huge_memory: avoid PMD-size page cache if needed\n\nxarray can\u0027t support arbitrary page cache size. the largest and supported\npage cache size is defined as MAX_PAGECACHE_ORDER by commit 099d90642a71\n(\"mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray\"). However,\nit\u0027s possible to have 512MB page cache in the huge memory\u0027s collapsing\npath on ARM64 system whose base page size is 64KB. 512MB page cache is\nbreaking the limitation and a warning is raised when the xarray entry is\nsplit as shown in the following example.\n\n[root@dhcp-10-26-1-207 ~]# cat /proc/1/smaps | grep KernelPageSize\nKernelPageSize: 64 kB\n[root@dhcp-10-26-1-207 ~]# cat /tmp/test.c\n :\nint main(int argc, char **argv)\n{\n\tconst char *filename = TEST_XFS_FILENAME;\n\tint fd = 0;\n\tvoid *buf = (void *)-1, *p;\n\tint pgsize = getpagesize();\n\tint ret = 0;\n\n\tif (pgsize != 0x10000) {\n\t\tfprintf(stdout, \"System with 64KB base page size is required!\\n\");\n\t\treturn -EPERM;\n\t}\n\n\tsystem(\"echo 0 \u003e /sys/devices/virtual/bdi/253:0/read_ahead_kb\");\n\tsystem(\"echo 1 \u003e /proc/sys/vm/drop_caches\");\n\n\t/* Open the xfs file */\n\tfd = open(filename, O_RDONLY);\n\tassert(fd \u003e 0);\n\n\t/* Create VMA */\n\tbuf = mmap(NULL, TEST_MEM_SIZE, PROT_READ, MAP_SHARED, fd, 0);\n\tassert(buf != (void *)-1);\n\tfprintf(stdout, \"mapped buffer at 0x%p\\n\", buf);\n\n\t/* Populate VMA */\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_NOHUGEPAGE);\n\tassert(ret == 0);\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_POPULATE_READ);\n\tassert(ret == 0);\n\n\t/* Collapse VMA */\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_HUGEPAGE);\n\tassert(ret == 0);\n\tret = madvise(buf, TEST_MEM_SIZE, MADV_COLLAPSE);\n\tif (ret) {\n\t\tfprintf(stdout, \"Error %d to madvise(MADV_COLLAPSE)\\n\", errno);\n\t\tgoto out;\n\t}\n\n\t/* Split xarray entry. Write permission is needed */\n\tmunmap(buf, TEST_MEM_SIZE);\n\tbuf = (void *)-1;\n\tclose(fd);\n\tfd = open(filename, O_RDWR);\n\tassert(fd \u003e 0);\n\tfallocate(fd, FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE,\n \t\t TEST_MEM_SIZE - pgsize, pgsize);\nout:\n\tif (buf != (void *)-1)\n\t\tmunmap(buf, TEST_MEM_SIZE);\n\tif (fd \u003e 0)\n\t\tclose(fd);\n\n\treturn ret;\n}\n\n[root@dhcp-10-26-1-207 ~]# gcc /tmp/test.c -o /tmp/test\n[root@dhcp-10-26-1-207 ~]# /tmp/test\n ------------[ cut here ]------------\n WARNING: CPU: 25 PID: 7560 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128\n Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \\\n nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \\\n nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \\\n ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse \\\n xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 virtio_net \\\n sha1_ce net_failover virtio_blk virtio_console failover dimlib virtio_mmio\n CPU: 25 PID: 7560 Comm: test Kdump: loaded Not tainted 6.10.0-rc7-gavin+ #9\n Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024\n pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n pc : xas_split_alloc+0xf8/0x128\n lr : split_huge_page_to_list_to_order+0x1c4/0x780\n sp : ffff8000ac32f660\n x29: ffff8000ac32f660 x28: ffff0000e0969eb0 x27: ffff8000ac32f6c0\n x26: 0000000000000c40 x25: ffff0000e0969eb0 x24: 000000000000000d\n x23: ffff8000ac32f6c0 x22: ffffffdfc0700000 x21: 0000000000000000\n x20: 0000000000000000 x19: ffffffdfc0700000 x18: 0000000000000000\n x17: 0000000000000000 x16: ffffd5f3708ffc70 x15: 0000000000000000\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: ffffffffffffffc0 x10: 0000000000000040 x9 : ffffd5f3708e692c\n x8 : 0000000000000003 x7 : 0000000000000000 x6 : ffff0000e0969eb8\n x5 : ffffd5f37289e378 x4 : 0000000000000000 x3 : 0000000000000c40\n x2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000\n Call trace:\n xas_split_alloc+0xf8/0x128\n split_huge_page_to_list_to_order+0x1c4/0x780\n truncate_inode_partial_folio+0xdc/0x160\n truncate_inode_pages_range+0x1b4/0x4a8\n truncate_pagecache_range+0x84/0xa\n---truncated---" }, { "lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm/huge_memory: evite el cach\u00e9 de p\u00e1ginas de tama\u00f1o PMD si es necesario. xarray no puede admitir un tama\u00f1o de cach\u00e9 de p\u00e1ginas arbitrario. el tama\u00f1o de cach\u00e9 de p\u00e1gina m\u00e1s grande y admitido se define como MAX_PAGECACHE_ORDER mediante el commit 099d90642a71 (\"mm/filemap: hacer que MAX_PAGECACHE_ORDER sea aceptable para xarray\"). Sin embargo, es posible tener una cach\u00e9 de p\u00e1gina de 512 MB en la ruta de colapso de la enorme memoria en un sistema ARM64 cuyo tama\u00f1o de p\u00e1gina base es de 64 KB. La cach\u00e9 de p\u00e1gina de 512 MB supera la limitaci\u00f3n y aparece una advertencia cuando la entrada de xarray se divide como se muestra en el siguiente ejemplo. [root@dhcp-10-26-1-207 ~]# cat /proc/1/smaps | grep KernelPageSize KernelPageSize: 64 kB [root@dhcp-10-26-1-207 ~]# cat /tmp/test.c : int main(int argc, char **argv) { const char *filename = TEST_XFS_FILENAME; intfd = 0; vac\u00edo *buf = (vac\u00edo *)-1, *p; int pgsize = getpagesize(); int ret = 0; if (pgsize != 0x10000) { fprintf(stdout, \"\u00a1Se requiere un sistema con un tama\u00f1o de p\u00e1gina base de 64 KB!\\n\"); devolver -EPERM; } system(\"echo 0 \u0026gt; /sys/devices/virtual/bdi/253:0/read_ahead_kb\"); sistema(\"echo 1 \u0026gt; /proc/sys/vm/drop_caches\"); /* Abrir el archivo xfs */ fd = open(nombre de archivo, O_RDONLY); afirmar(fd \u0026gt; 0); /* Crear VMA */ buf = mmap(NULL, TEST_MEM_SIZE, PROT_READ, MAP_SHARED, fd, 0); afirmar(buf != (void *)-1); fprintf(stdout, \"b\u00fafer asignado en 0x%p\\n\", buf); /* Completar VMA */ ret = madvise(buf, TEST_MEM_SIZE, MADV_NOHUGEPAGE); afirmar(ret == 0); ret = madvise(buf, TEST_MEM_SIZE, MADV_POPULATE_READ); afirmar(ret == 0); /* Contraer VMA */ ret = madvise(buf, TEST_MEM_SIZE, MADV_HUGEPAGE); afirmar(ret == 0); ret = madvise(buf, TEST_MEM_SIZE, MADV_COLLAPSE); if (ret) { fprintf(stdout, \"Error %d en madvise(MADV_COLLAPSE)\\n\", errno); salir; } /* Dividir entrada de matriz x. Se necesita permiso de escritura */ munmap(buf, TEST_MEM_SIZE); buf = (nulo *)-1; cerrar(fd); fd = open(nombre de archivo, O_RDWR); afirmar(fd \u0026gt; 0); fallocate(fd, FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE, TEST_MEM_SIZE - tama\u00f1o de p\u00e1gina, tama\u00f1o de p\u00e1gina); salida: if (buf != (void *)-1) munmap(buf, TEST_MEM_SIZE); si (fd \u0026gt; 0) cerrar(fd); volver atr\u00e1s; } [root@dhcp-10-26-1-207 ~]# gcc /tmp/test.c -o /tmp/test [root@dhcp-10-26-1-207 ~]# /tmp/test -- ----------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 25 PID: 7560 en lib/xarray.c:1025 xas_split_alloc+0xf8/0x128 M\u00f3dulos vinculados en : nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \\ nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \\ nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \\ _set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse \\ xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 virtio_net \\ sha1_ce net_failover virtio_blk virtio_console failover dimlib virtio_mmio CPU: 25 PID: 7560 Comm : prueba Kdump: cargado No contaminado 6.10.0-rc7-gavin+ #9 Nombre del hardware: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 24/05/2024 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO + DIT -SSBS BTYPE=--) pc: xas_split_alloc+0xf8/0x128 lr: split_huge_page_to_list_to_order+0x1c4/0x780 sp: ffff8000ac32f660 x29: ffff8000ac32f660 x28: ffff0000e0969eb0 x27: 000ac32f6c0 x26: 0000000000000c40 x25: ffff0000e0969eb0 x24: 000000000000000d x23: ffff8000ac32f6c0 x22: ffffffdfc0700000 x21 : 0000000000000000 x20: 0000000000000000 x19: ffffffdfc0700000 x18: 0000000000000000 x17: 0000000000000000 x16: ffffd5f3708ffc70 x15: 000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: ffffffffffffffc0 x10: 0000000000000040 x9: 08e692c x8: 0000000000000003 x7: 0000000000000000 x6: ffff0000e0969eb8 x5: ffffd5f37289e378 x4: 0000000000000000 x3: 0000000000000c40 x2: 000000000000000d x1: 000000000000000c x0: 0000000000000000 Rastreo de llamadas: xas_split_alloc+0xf8/0x128 ---truncado---" } ], "id": "CVE-2024-42317", "lastModified": "2024-08-19T12:59:59.177", "metrics": {}, "published": "2024-08-17T09:15:11.633", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/d659b715e94ac039803d7601505d3473393fc0be" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/e60f62f75c99740a28e2bf7e6044086033012a16" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.