Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-46733 (GCVE-0-2024-46733)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-46733", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-29T14:53:35.751159Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-29T14:53:50.933Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/btrfs/inode.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "159f0f61b283ea71e827dd0c18c5dce197de1fa2", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "84464db2ec2a55b9313d5f264da196a37ec80994", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "e42ef22bc10f0309c0c65d8d6ca8b4127a674b7f", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "30479f31d44d47ed00ae0c7453d9b253537005b2", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/btrfs/inode.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.135", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.88", "versionType": "semver" }, { "lessThanOrEqual": "6.10.*", "status": "unaffected", "version": "6.10.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.11", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.135", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6.88", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.10.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix qgroup reserve leaks in cow_file_range\n\nIn the buffered write path, the dirty page owns the qgroup reserve until\nit creates an ordered_extent.\n\nTherefore, any errors that occur before the ordered_extent is created\nmust free that reservation, or else the space is leaked. The fstest\ngeneric/475 exercises various IO error paths, and is able to trigger\nerrors in cow_file_range where we fail to get to allocating the ordered\nextent. Note that because we *do* clear delalloc, we are likely to\nremove the inode from the delalloc list, so the inodes/pages to not have\ninvalidate/launder called on them in the commit abort path.\n\nThis results in failures at the unmount stage of the test that look like:\n\n BTRFS: error (device dm-8 state EA) in cleanup_transaction:2018: errno=-5 IO failure\n BTRFS: error (device dm-8 state EA) in btrfs_replace_file_extents:2416: errno=-5 IO failure\n BTRFS warning (device dm-8 state EA): qgroup 0/5 has unreleased space, type 0 rsv 28672\n ------------[ cut here ]------------\n WARNING: CPU: 3 PID: 22588 at fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs]\n Modules linked in: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq\n CPU: 3 PID: 22588 Comm: umount Kdump: loaded Tainted: G W 6.10.0-rc7-gab56fde445b8 #21\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n RIP: 0010:close_ctree+0x222/0x4d0 [btrfs]\n RSP: 0018:ffffb4465283be00 EFLAGS: 00010202\n RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001\n RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8\n RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000\n R10: 0000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c\n R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n FS: 00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0\n Call Trace:\n \u003cTASK\u003e\n ? close_ctree+0x222/0x4d0 [btrfs]\n ? __warn.cold+0x8e/0xea\n ? close_ctree+0x222/0x4d0 [btrfs]\n ? report_bug+0xff/0x140\n ? handle_bug+0x3b/0x70\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? close_ctree+0x222/0x4d0 [btrfs]\n generic_shutdown_super+0x70/0x160\n kill_anon_super+0x11/0x40\n btrfs_kill_super+0x11/0x20 [btrfs]\n deactivate_locked_super+0x2e/0xa0\n cleanup_mnt+0xb5/0x150\n task_work_run+0x57/0x80\n syscall_exit_to_user_mode+0x121/0x130\n do_syscall_64+0xab/0x1a0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7f916847a887\n ---[ end trace 0000000000000000 ]---\n BTRFS error (device dm-8 state EA): qgroup reserved space leaked\n\nCases 2 and 3 in the out_reserve path both pertain to this type of leak\nand must free the reserved qgroup data. Because it is already an error\npath, I opted not to handle the possible errors in\nbtrfs_free_qgroup_data." } ], "providerMetadata": { "dateUpdated": "2025-05-04T09:32:59.327Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/159f0f61b283ea71e827dd0c18c5dce197de1fa2" }, { "url": "https://git.kernel.org/stable/c/84464db2ec2a55b9313d5f264da196a37ec80994" }, { "url": "https://git.kernel.org/stable/c/e42ef22bc10f0309c0c65d8d6ca8b4127a674b7f" }, { "url": "https://git.kernel.org/stable/c/30479f31d44d47ed00ae0c7453d9b253537005b2" } ], "title": "btrfs: fix qgroup reserve leaks in cow_file_range", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-46733", "datePublished": "2024-09-18T06:32:27.453Z", "dateReserved": "2024-09-11T15:12:18.257Z", "dateUpdated": "2025-05-04T09:32:59.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-46733\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-09-18T07:15:04.170\",\"lastModified\":\"2025-04-25T11:15:44.663\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbtrfs: fix qgroup reserve leaks in cow_file_range\\n\\nIn the buffered write path, the dirty page owns the qgroup reserve until\\nit creates an ordered_extent.\\n\\nTherefore, any errors that occur before the ordered_extent is created\\nmust free that reservation, or else the space is leaked. The fstest\\ngeneric/475 exercises various IO error paths, and is able to trigger\\nerrors in cow_file_range where we fail to get to allocating the ordered\\nextent. Note that because we *do* clear delalloc, we are likely to\\nremove the inode from the delalloc list, so the inodes/pages to not have\\ninvalidate/launder called on them in the commit abort path.\\n\\nThis results in failures at the unmount stage of the test that look like:\\n\\n BTRFS: error (device dm-8 state EA) in cleanup_transaction:2018: errno=-5 IO failure\\n BTRFS: error (device dm-8 state EA) in btrfs_replace_file_extents:2416: errno=-5 IO failure\\n BTRFS warning (device dm-8 state EA): qgroup 0/5 has unreleased space, type 0 rsv 28672\\n ------------[ cut here ]------------\\n WARNING: CPU: 3 PID: 22588 at fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs]\\n Modules linked in: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq\\n CPU: 3 PID: 22588 Comm: umount Kdump: loaded Tainted: G W 6.10.0-rc7-gab56fde445b8 #21\\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\\n RIP: 0010:close_ctree+0x222/0x4d0 [btrfs]\\n RSP: 0018:ffffb4465283be00 EFLAGS: 00010202\\n RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001\\n RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8\\n RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000\\n R10: 0000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c\\n R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\\n FS: 00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000\\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0\\n Call Trace:\\n \u003cTASK\u003e\\n ? close_ctree+0x222/0x4d0 [btrfs]\\n ? __warn.cold+0x8e/0xea\\n ? close_ctree+0x222/0x4d0 [btrfs]\\n ? report_bug+0xff/0x140\\n ? handle_bug+0x3b/0x70\\n ? exc_invalid_op+0x17/0x70\\n ? asm_exc_invalid_op+0x1a/0x20\\n ? close_ctree+0x222/0x4d0 [btrfs]\\n generic_shutdown_super+0x70/0x160\\n kill_anon_super+0x11/0x40\\n btrfs_kill_super+0x11/0x20 [btrfs]\\n deactivate_locked_super+0x2e/0xa0\\n cleanup_mnt+0xb5/0x150\\n task_work_run+0x57/0x80\\n syscall_exit_to_user_mode+0x121/0x130\\n do_syscall_64+0xab/0x1a0\\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\\n RIP: 0033:0x7f916847a887\\n ---[ end trace 0000000000000000 ]---\\n BTRFS error (device dm-8 state EA): qgroup reserved space leaked\\n\\nCases 2 and 3 in the out_reserve path both pertain to this type of leak\\nand must free the reserved qgroup data. Because it is already an error\\npath, I opted not to handle the possible errors in\\nbtrfs_free_qgroup_data.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: reparar fugas de reserva de qgroup en cow_file_range En la ruta de escritura en b\u00fafer, la p\u00e1gina sucia posee la reserva de qgroup hasta que crea una ordered_extent. Por lo tanto, cualquier error que ocurra antes de que se cree la ordered_extent debe liberar esa reserva, o de lo contrario se pierde el espacio. El fstest generic/475 ejercita varias rutas de error de E/S y puede desencadenar errores en cow_file_range donde no logramos asignar la extensi\u00f3n ordenada. Tenga en cuenta que debido a que *s\u00ed* borramos delalloc, es probable que eliminemos el inodo de la lista de delalloc, por lo que los inodos/p\u00e1ginas no tienen una llamada de invalidaci\u00f3n/lavado en ellos en la ruta de aborto de confirmaci\u00f3n. Esto genera fallas en la etapa de desmontaje de la prueba que se ven as\u00ed: BTRFS: error (dispositivo dm-8 estado EA) en cleanup_transaction:2018: errno=-5 falla de E/S BTRFS: error (dispositivo dm-8 estado EA) en btrfs_replace_file_extents:2416: errno=-5 falla de E/S Advertencia de BTRFS (dispositivo dm-8 estado EA): qgroup 0/5 tiene espacio sin liberar, tipo 0 rsv 28672 ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 3 PID: 22588 en fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs] M\u00f3dulos vinculados en: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq CPU: 3 PID: 22588 Comm: umount Kdump: cargado Tainted: GW 6.10.0-rc7-gab56fde445b8 #21 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 01/04/2014 RIP: 0010:close_ctree+0x222/0x4d0 [btrfs] RSP: 0018:ffffb4465283be00 EFLAGS: 00010202 RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8 RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000 R10: 000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c R13: 000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0 Seguimiento de llamadas: ? close_ctree+0x222/0x4d0 [btrfs] ? __warn.cold+0x8e/0xea ? close_ctree+0x222/0x4d0 [btrfs] ? reportar_error+0xff/0x140 ? manejar_error+0x3b/0x70 ? exc_op_inv\u00e1lida+0x17/0x70 ? asm_exc_op_inv\u00e1lida+0x1a/0x20 ? cerrar_ctree+0x222/0x4d0 [btrfs] apagado_gen\u00e9rico_super+0x70/0x160 matar_an\u00f3nimo_super+0x11/0x40 btrfs_kill_super+0x11/0x20 [btrfs] desactivar_bloqueado_super+0x2e/0xa0 limpieza_mnt+0xb5/0x150 ejecuci\u00f3n_trabajo_tarea+0x57/0x80 salida_llamada_al_sistema_modo_usuario_+0x121/0x130 hacer_llamada_al_sistema_64+0xab/0x1a0 entrada_SYSCALL_64_despu\u00e9s_de_hwframe+0x77/0x7f RIP: 0033:0x7f916847a887 ---[ fin de seguimiento 0000000000000000 ]--- Error BTRFS (estado del dispositivo dm-8 EA): se filtr\u00f3 el espacio reservado del qgroup Los casos 2 y 3 en la ruta out_reserve pertenecen a este tipo de fuga y deben liberar los datos reservados del qgroup. Debido a que ya es una ruta de error, opt\u00e9 por no manejar los posibles errores en btrfs_free_qgroup_data.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/159f0f61b283ea71e827dd0c18c5dce197de1fa2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/30479f31d44d47ed00ae0c7453d9b253537005b2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/84464db2ec2a55b9313d5f264da196a37ec80994\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e42ef22bc10f0309c0c65d8d6ca8b4127a674b7f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-46733\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-29T14:53:35.751159Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-29T14:53:39.822Z\"}}], \"cna\": {\"title\": \"btrfs: fix qgroup reserve leaks in cow_file_range\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"159f0f61b283ea71e827dd0c18c5dce197de1fa2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"84464db2ec2a55b9313d5f264da196a37ec80994\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"e42ef22bc10f0309c0c65d8d6ca8b4127a674b7f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"30479f31d44d47ed00ae0c7453d9b253537005b2\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/btrfs/inode.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"6.1.135\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.88\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/btrfs/inode.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/159f0f61b283ea71e827dd0c18c5dce197de1fa2\"}, {\"url\": \"https://git.kernel.org/stable/c/84464db2ec2a55b9313d5f264da196a37ec80994\"}, {\"url\": \"https://git.kernel.org/stable/c/e42ef22bc10f0309c0c65d8d6ca8b4127a674b7f\"}, {\"url\": \"https://git.kernel.org/stable/c/30479f31d44d47ed00ae0c7453d9b253537005b2\"}], \"x_generator\": {\"engine\": \"bippy-1.1.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbtrfs: fix qgroup reserve leaks in cow_file_range\\n\\nIn the buffered write path, the dirty page owns the qgroup reserve until\\nit creates an ordered_extent.\\n\\nTherefore, any errors that occur before the ordered_extent is created\\nmust free that reservation, or else the space is leaked. The fstest\\ngeneric/475 exercises various IO error paths, and is able to trigger\\nerrors in cow_file_range where we fail to get to allocating the ordered\\nextent. Note that because we *do* clear delalloc, we are likely to\\nremove the inode from the delalloc list, so the inodes/pages to not have\\ninvalidate/launder called on them in the commit abort path.\\n\\nThis results in failures at the unmount stage of the test that look like:\\n\\n BTRFS: error (device dm-8 state EA) in cleanup_transaction:2018: errno=-5 IO failure\\n BTRFS: error (device dm-8 state EA) in btrfs_replace_file_extents:2416: errno=-5 IO failure\\n BTRFS warning (device dm-8 state EA): qgroup 0/5 has unreleased space, type 0 rsv 28672\\n ------------[ cut here ]------------\\n WARNING: CPU: 3 PID: 22588 at fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs]\\n Modules linked in: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq\\n CPU: 3 PID: 22588 Comm: umount Kdump: loaded Tainted: G W 6.10.0-rc7-gab56fde445b8 #21\\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\\n RIP: 0010:close_ctree+0x222/0x4d0 [btrfs]\\n RSP: 0018:ffffb4465283be00 EFLAGS: 00010202\\n RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001\\n RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8\\n RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000\\n R10: 0000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c\\n R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\\n FS: 00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000\\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0\\n Call Trace:\\n \u003cTASK\u003e\\n ? close_ctree+0x222/0x4d0 [btrfs]\\n ? __warn.cold+0x8e/0xea\\n ? close_ctree+0x222/0x4d0 [btrfs]\\n ? report_bug+0xff/0x140\\n ? handle_bug+0x3b/0x70\\n ? exc_invalid_op+0x17/0x70\\n ? asm_exc_invalid_op+0x1a/0x20\\n ? close_ctree+0x222/0x4d0 [btrfs]\\n generic_shutdown_super+0x70/0x160\\n kill_anon_super+0x11/0x40\\n btrfs_kill_super+0x11/0x20 [btrfs]\\n deactivate_locked_super+0x2e/0xa0\\n cleanup_mnt+0xb5/0x150\\n task_work_run+0x57/0x80\\n syscall_exit_to_user_mode+0x121/0x130\\n do_syscall_64+0xab/0x1a0\\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\\n RIP: 0033:0x7f916847a887\\n ---[ end trace 0000000000000000 ]---\\n BTRFS error (device dm-8 state EA): qgroup reserved space leaked\\n\\nCases 2 and 3 in the out_reserve path both pertain to this type of leak\\nand must free the reserved qgroup data. Because it is already an error\\npath, I opted not to handle the possible errors in\\nbtrfs_free_qgroup_data.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-04-25T10:06:37.265Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-46733\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-25T10:06:37.265Z\", \"dateReserved\": \"2024-09-11T15:12:18.257Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-18T06:32:27.453Z\", \"assignerShortName\": \"Linux\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
wid-sec-w-2024-2173
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder einen unspezifischen Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2173 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2173.json" }, { "category": "self", "summary": "WID-SEC-2024-2173 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2173" }, { "category": "external", "summary": "Linux Kernel CVE Announcement vom 2024-09-17", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-070 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-070.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-071 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-071.html" }, { "category": "external", "summary": "ORACLE OVMSA-2024-0013 vom 2024-10-03", "url": "https://oss.oracle.com/pipermail/el-errata/2024-October/016481.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-086 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-086.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5782 vom 2024-10-03", "url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-055 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-055.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3563-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3567-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3565-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3585-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019586.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3587-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12782 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12782.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12779.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2695 vom 2024-11-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2695.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2696 vom 2024-11-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2696.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7120-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7120-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7120-2 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7120-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7123-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7120-3 vom 2024-11-21", "url": "https://ubuntu.com/security/notices/USN-7120-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25", "url": "https://ubuntu.com/security/notices/USN-7121-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09", "url": "https://linux.oracle.com/errata/ELSA-2024-12868.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10", "url": "https://ubuntu.com/security/notices/USN-7148-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7159-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7166-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7159-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7159-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-4 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7159-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-5 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7159-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7195-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Google Cloud Platform Security Bulletin GCP-2024-062 vom 2025-01-10", "url": "https://cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-002-gke" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20018 vom 2025-01-13", "url": "https://linux.oracle.com/errata/ELSA-2025-20018.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14", "url": "https://ubuntu.com/security/notices/USN-7195-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" }, { "category": "external", "summary": "IBM Security Bulletin 7181933 vom 2025-01-29", "url": "https://www.ibm.com/support/pages/node/7181933" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7294-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7295-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7294-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7294-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03", "url": "https://ubuntu.com/security/notices/USN-7294-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7387-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7393-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7401-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7407-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7413-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7421-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5900 vom 2025-04-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7458-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7459-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5907 vom 2025-04-27", "url": "https://lists.debian.org/debian-security-announce/2025/msg00069.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7459-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-4341 vom 2025-05-01", "url": "https://linux.oracle.com/errata/ELSA-2025-4341.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13", "url": "https://ubuntu.com/security/notices/USN-7506-4" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1573-1 vom 2025-05-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01627-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020866.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-8056 vom 2025-05-22", "url": "https://linux.oracle.com/errata/ELSA-2025-8056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5925 vom 2025-05-24", "url": "https://lists.debian.org/debian-security-announce/2025/msg00088.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7593-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7592-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7592-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-2 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-095 vom 2025-06-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-095.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-077 vom 2025-06-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-077.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-3 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7597-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7597-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-4 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7597-2 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7597-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7598-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7598-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26", "url": "https://ubuntu.com/security/notices/USN-7602-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-3 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7608-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7608-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01", "url": "https://ubuntu.com/security/notices/USN-7607-1" }, { "category": "external", "summary": "SEM 2025.2.1 release notes vom 2025-07-02", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7607-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-1 vom 2025-07-01", "url": "https://ubuntu.com/security/notices/USN-7608-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-4 vom 2025-07-03", "url": "https://ubuntu.com/security/notices/USN-7608-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-5 vom 2025-07-04", "url": "https://ubuntu.com/security/notices/USN-7591-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7627-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-5 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7608-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08", "url": "https://ubuntu.com/security/notices/USN-7627-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7607-3" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-078 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-078.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-6 vom 2025-07-11", "url": "https://ubuntu.com/security/notices/USN-7608-6" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02308-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021805.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02320-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02322-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021810.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-6 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7591-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25", "url": "https://ubuntu.com/security/notices/USN-7671-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02537-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021978.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7671-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-7 vom 2025-07-30", "url": "https://ubuntu.com/security/notices/USN-7608-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04", "url": "https://ubuntu.com/security/notices/USN-7671-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4271 vom 2025-08-13", "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7712-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7711-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7712-2" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-02T22:00:00.000+00:00", "generator": { "date": "2025-09-03T07:32:09.948+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-2173", "initial_release_date": "2024-09-17T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-17T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon, ORACLE und Debian aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-17T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-21T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-28T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-02T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-08T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Google aufgenommen" }, { "date": "2025-01-14T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-26T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von SUSE und IBM aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-02T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-07T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-13T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-27T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-05-01T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-05-06T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-12T22:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "59", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "60", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "61", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-05-25T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von SUSE und Debian aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Debian, Amazon und SUSE aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "73", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "74", "summary": "Neue Updates von Ubuntu und Amazon aufgenommen" }, { "date": "2025-06-24T22:00:00.000+00:00", "number": "75", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-26T22:00:00.000+00:00", "number": "76", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-01T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-03T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-06T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2025-07-13T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-27T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "91", "summary": "Referenz(en) aufgenommen:" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "92", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "96" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Google Cloud Platform", "product": { "name": "Google Cloud Platform", "product_id": "393401", "product_identification_helper": { "cpe": "cpe:/a:google:cloud_platform:-" } } } ], "category": "vendor", "name": "Google" }, { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Guardium", "product": { "name": "IBM InfoSphere Guardium", "product_id": "T002366", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_guardium:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T037716", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2025.2.1", "product": { "name": "SolarWinds Security Event Manager \u003c2025.2.1", "product_id": "T044986" } }, { "category": "product_version", "name": "2025.2.1", "product": { "name": "SolarWinds Security Event Manager 2025.2.1", "product_id": "T044986-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1" } } } ], "category": "product_name", "name": "Security Event Manager" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-46714", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46714" }, { "cve": "CVE-2024-46715", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46715" }, { "cve": "CVE-2024-46716", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46716" }, { "cve": "CVE-2024-46717", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46717" }, { "cve": "CVE-2024-46718", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46718" }, { "cve": "CVE-2024-46719", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46719" }, { "cve": "CVE-2024-46720", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46720" }, { "cve": "CVE-2024-46721", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46721" }, { "cve": "CVE-2024-46722", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46722" }, { "cve": "CVE-2024-46723", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46723" }, { "cve": "CVE-2024-46724", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46724" }, { "cve": "CVE-2024-46725", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46725" }, { "cve": "CVE-2024-46726", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46726" }, { "cve": "CVE-2024-46727", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46727" }, { "cve": "CVE-2024-46728", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46728" }, { "cve": "CVE-2024-46729", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46729" }, { "cve": "CVE-2024-46730", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46730" }, { "cve": "CVE-2024-46731", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46731" }, { "cve": "CVE-2024-46732", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46732" }, { "cve": "CVE-2024-46733", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46733" }, { "cve": "CVE-2024-46734", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46734" }, { "cve": "CVE-2024-46735", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46735" }, { "cve": "CVE-2024-46736", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46736" }, { "cve": "CVE-2024-46737", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46737" }, { "cve": "CVE-2024-46738", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46738" }, { "cve": "CVE-2024-46739", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46739" }, { "cve": "CVE-2024-46740", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46740" }, { "cve": "CVE-2024-46741", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46741" }, { "cve": "CVE-2024-46742", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46742" }, { "cve": "CVE-2024-46743", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46743" }, { "cve": "CVE-2024-46744", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46744" }, { "cve": "CVE-2024-46745", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46745" }, { "cve": "CVE-2024-46746", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46746" }, { "cve": "CVE-2024-46747", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46747" }, { "cve": "CVE-2024-46748", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46748" }, { "cve": "CVE-2024-46749", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46749" }, { "cve": "CVE-2024-46750", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46750" }, { "cve": "CVE-2024-46751", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46751" }, { "cve": "CVE-2024-46752", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46752" }, { "cve": "CVE-2024-46753", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46753" }, { "cve": "CVE-2024-46754", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46754" }, { "cve": "CVE-2024-46755", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46755" }, { "cve": "CVE-2024-46756", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46756" }, { "cve": "CVE-2024-46757", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46757" }, { "cve": "CVE-2024-46758", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46758" }, { "cve": "CVE-2024-46759", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46759" }, { "cve": "CVE-2024-46760", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46760" }, { "cve": "CVE-2024-46761", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46761" }, { "cve": "CVE-2024-46762", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46762" }, { "cve": "CVE-2024-46763", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46763" }, { "cve": "CVE-2024-46764", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46764" }, { "cve": "CVE-2024-46765", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46765" }, { "cve": "CVE-2024-46766", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46766" }, { "cve": "CVE-2024-46767", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46767" }, { "cve": "CVE-2024-46768", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46768" }, { "cve": "CVE-2024-46769", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46769" }, { "cve": "CVE-2024-46770", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46770" }, { "cve": "CVE-2024-46771", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46771" }, { "cve": "CVE-2024-46772", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46772" }, { "cve": "CVE-2024-46773", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46773" }, { "cve": "CVE-2024-46774", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46774" }, { "cve": "CVE-2024-46775", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46775" }, { "cve": "CVE-2024-46776", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46776" }, { "cve": "CVE-2024-46777", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46777" }, { "cve": "CVE-2024-46778", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46778" }, { "cve": "CVE-2024-46779", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46779" }, { "cve": "CVE-2024-46780", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46780" }, { "cve": "CVE-2024-46781", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46781" }, { "cve": "CVE-2024-46782", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46782" }, { "cve": "CVE-2024-46783", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46783" }, { "cve": "CVE-2024-46784", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46784" }, { "cve": "CVE-2024-46785", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46785" }, { "cve": "CVE-2024-46786", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46786" }, { "cve": "CVE-2024-46787", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46787" }, { "cve": "CVE-2024-46788", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46788" }, { "cve": "CVE-2024-46789", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46789" }, { "cve": "CVE-2024-46790", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46790" }, { "cve": "CVE-2024-46791", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46791" }, { "cve": "CVE-2024-46792", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46792" }, { "cve": "CVE-2024-46793", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46793" }, { "cve": "CVE-2024-46794", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46794" }, { "cve": "CVE-2024-46795", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46795" }, { "cve": "CVE-2024-46796", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46796" }, { "cve": "CVE-2024-46797", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46797" }, { "cve": "CVE-2024-46798", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46798" }, { "cve": "CVE-2024-46799", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46799" }, { "cve": "CVE-2024-46800", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46800" }, { "cve": "CVE-2024-46801", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46801" } ] }
WID-SEC-W-2024-2173
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder einen unspezifischen Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2173 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2173.json" }, { "category": "self", "summary": "WID-SEC-2024-2173 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2173" }, { "category": "external", "summary": "Linux Kernel CVE Announcement vom 2024-09-17", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-070 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-070.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-071 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-071.html" }, { "category": "external", "summary": "ORACLE OVMSA-2024-0013 vom 2024-10-03", "url": "https://oss.oracle.com/pipermail/el-errata/2024-October/016481.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-086 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-086.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5782 vom 2024-10-03", "url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-055 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-055.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3563-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3567-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3565-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3585-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019586.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3587-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12782 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12782.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12779.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2695 vom 2024-11-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2695.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2696 vom 2024-11-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2696.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7120-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7120-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7120-2 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7120-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7123-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7120-3 vom 2024-11-21", "url": "https://ubuntu.com/security/notices/USN-7120-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25", "url": "https://ubuntu.com/security/notices/USN-7121-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09", "url": "https://linux.oracle.com/errata/ELSA-2024-12868.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10", "url": "https://ubuntu.com/security/notices/USN-7148-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7159-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7166-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7159-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7159-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-4 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7159-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-5 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7159-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7195-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Google Cloud Platform Security Bulletin GCP-2024-062 vom 2025-01-10", "url": "https://cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-002-gke" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20018 vom 2025-01-13", "url": "https://linux.oracle.com/errata/ELSA-2025-20018.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14", "url": "https://ubuntu.com/security/notices/USN-7195-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" }, { "category": "external", "summary": "IBM Security Bulletin 7181933 vom 2025-01-29", "url": "https://www.ibm.com/support/pages/node/7181933" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7294-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7295-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7294-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7294-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03", "url": "https://ubuntu.com/security/notices/USN-7294-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7387-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7393-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7401-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7407-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7413-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7421-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5900 vom 2025-04-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7458-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7459-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5907 vom 2025-04-27", "url": "https://lists.debian.org/debian-security-announce/2025/msg00069.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7459-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-4341 vom 2025-05-01", "url": "https://linux.oracle.com/errata/ELSA-2025-4341.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13", "url": "https://ubuntu.com/security/notices/USN-7506-4" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1573-1 vom 2025-05-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01627-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020866.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-8056 vom 2025-05-22", "url": "https://linux.oracle.com/errata/ELSA-2025-8056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5925 vom 2025-05-24", "url": "https://lists.debian.org/debian-security-announce/2025/msg00088.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7593-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7592-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7592-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-2 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-095 vom 2025-06-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-095.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-077 vom 2025-06-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-077.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-3 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7597-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7597-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-4 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7597-2 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7597-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7598-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7598-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26", "url": "https://ubuntu.com/security/notices/USN-7602-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-3 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7608-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7608-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01", "url": "https://ubuntu.com/security/notices/USN-7607-1" }, { "category": "external", "summary": "SEM 2025.2.1 release notes vom 2025-07-02", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7607-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-1 vom 2025-07-01", "url": "https://ubuntu.com/security/notices/USN-7608-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-4 vom 2025-07-03", "url": "https://ubuntu.com/security/notices/USN-7608-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-5 vom 2025-07-04", "url": "https://ubuntu.com/security/notices/USN-7591-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7627-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-5 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7608-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08", "url": "https://ubuntu.com/security/notices/USN-7627-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7607-3" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-078 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-078.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-6 vom 2025-07-11", "url": "https://ubuntu.com/security/notices/USN-7608-6" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02308-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021805.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02320-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02322-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021810.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-6 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7591-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25", "url": "https://ubuntu.com/security/notices/USN-7671-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02537-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021978.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7671-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-7 vom 2025-07-30", "url": "https://ubuntu.com/security/notices/USN-7608-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04", "url": "https://ubuntu.com/security/notices/USN-7671-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4271 vom 2025-08-13", "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7712-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7711-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7712-2" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-02T22:00:00.000+00:00", "generator": { "date": "2025-09-03T07:32:09.948+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-2173", "initial_release_date": "2024-09-17T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-17T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon, ORACLE und Debian aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-17T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-21T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-28T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-02T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-08T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Google aufgenommen" }, { "date": "2025-01-14T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-26T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von SUSE und IBM aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-02T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-07T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-13T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-27T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-05-01T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-05-06T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-12T22:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "59", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "60", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "61", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-05-25T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von SUSE und Debian aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Debian, Amazon und SUSE aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "73", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "74", "summary": "Neue Updates von Ubuntu und Amazon aufgenommen" }, { "date": "2025-06-24T22:00:00.000+00:00", "number": "75", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-26T22:00:00.000+00:00", "number": "76", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-01T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-03T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-06T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2025-07-13T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-27T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "91", "summary": "Referenz(en) aufgenommen:" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "92", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "96" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Google Cloud Platform", "product": { "name": "Google Cloud Platform", "product_id": "393401", "product_identification_helper": { "cpe": "cpe:/a:google:cloud_platform:-" } } } ], "category": "vendor", "name": "Google" }, { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Guardium", "product": { "name": "IBM InfoSphere Guardium", "product_id": "T002366", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_guardium:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T037716", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2025.2.1", "product": { "name": "SolarWinds Security Event Manager \u003c2025.2.1", "product_id": "T044986" } }, { "category": "product_version", "name": "2025.2.1", "product": { "name": "SolarWinds Security Event Manager 2025.2.1", "product_id": "T044986-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1" } } } ], "category": "product_name", "name": "Security Event Manager" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-46714", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46714" }, { "cve": "CVE-2024-46715", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46715" }, { "cve": "CVE-2024-46716", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46716" }, { "cve": "CVE-2024-46717", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46717" }, { "cve": "CVE-2024-46718", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46718" }, { "cve": "CVE-2024-46719", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46719" }, { "cve": "CVE-2024-46720", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46720" }, { "cve": "CVE-2024-46721", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46721" }, { "cve": "CVE-2024-46722", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46722" }, { "cve": "CVE-2024-46723", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46723" }, { "cve": "CVE-2024-46724", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46724" }, { "cve": "CVE-2024-46725", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46725" }, { "cve": "CVE-2024-46726", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46726" }, { "cve": "CVE-2024-46727", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46727" }, { "cve": "CVE-2024-46728", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46728" }, { "cve": "CVE-2024-46729", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46729" }, { "cve": "CVE-2024-46730", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46730" }, { "cve": "CVE-2024-46731", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46731" }, { "cve": "CVE-2024-46732", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46732" }, { "cve": "CVE-2024-46733", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46733" }, { "cve": "CVE-2024-46734", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46734" }, { "cve": "CVE-2024-46735", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46735" }, { "cve": "CVE-2024-46736", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46736" }, { "cve": "CVE-2024-46737", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46737" }, { "cve": "CVE-2024-46738", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46738" }, { "cve": "CVE-2024-46739", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46739" }, { "cve": "CVE-2024-46740", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46740" }, { "cve": "CVE-2024-46741", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46741" }, { "cve": "CVE-2024-46742", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46742" }, { "cve": "CVE-2024-46743", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46743" }, { "cve": "CVE-2024-46744", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46744" }, { "cve": "CVE-2024-46745", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46745" }, { "cve": "CVE-2024-46746", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46746" }, { "cve": "CVE-2024-46747", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46747" }, { "cve": "CVE-2024-46748", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46748" }, { "cve": "CVE-2024-46749", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46749" }, { "cve": "CVE-2024-46750", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46750" }, { "cve": "CVE-2024-46751", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46751" }, { "cve": "CVE-2024-46752", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46752" }, { "cve": "CVE-2024-46753", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46753" }, { "cve": "CVE-2024-46754", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46754" }, { "cve": "CVE-2024-46755", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46755" }, { "cve": "CVE-2024-46756", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46756" }, { "cve": "CVE-2024-46757", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46757" }, { "cve": "CVE-2024-46758", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46758" }, { "cve": "CVE-2024-46759", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46759" }, { "cve": "CVE-2024-46760", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46760" }, { "cve": "CVE-2024-46761", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46761" }, { "cve": "CVE-2024-46762", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46762" }, { "cve": "CVE-2024-46763", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46763" }, { "cve": "CVE-2024-46764", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46764" }, { "cve": "CVE-2024-46765", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46765" }, { "cve": "CVE-2024-46766", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46766" }, { "cve": "CVE-2024-46767", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46767" }, { "cve": "CVE-2024-46768", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46768" }, { "cve": "CVE-2024-46769", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46769" }, { "cve": "CVE-2024-46770", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46770" }, { "cve": "CVE-2024-46771", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46771" }, { "cve": "CVE-2024-46772", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46772" }, { "cve": "CVE-2024-46773", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46773" }, { "cve": "CVE-2024-46774", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46774" }, { "cve": "CVE-2024-46775", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46775" }, { "cve": "CVE-2024-46776", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46776" }, { "cve": "CVE-2024-46777", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46777" }, { "cve": "CVE-2024-46778", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46778" }, { "cve": "CVE-2024-46779", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46779" }, { "cve": "CVE-2024-46780", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46780" }, { "cve": "CVE-2024-46781", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46781" }, { "cve": "CVE-2024-46782", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46782" }, { "cve": "CVE-2024-46783", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46783" }, { "cve": "CVE-2024-46784", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46784" }, { "cve": "CVE-2024-46785", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46785" }, { "cve": "CVE-2024-46786", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46786" }, { "cve": "CVE-2024-46787", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46787" }, { "cve": "CVE-2024-46788", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46788" }, { "cve": "CVE-2024-46789", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46789" }, { "cve": "CVE-2024-46790", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46790" }, { "cve": "CVE-2024-46791", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46791" }, { "cve": "CVE-2024-46792", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46792" }, { "cve": "CVE-2024-46793", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46793" }, { "cve": "CVE-2024-46794", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46794" }, { "cve": "CVE-2024-46795", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46795" }, { "cve": "CVE-2024-46796", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46796" }, { "cve": "CVE-2024-46797", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46797" }, { "cve": "CVE-2024-46798", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46798" }, { "cve": "CVE-2024-46799", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46799" }, { "cve": "CVE-2024-46800", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46800" }, { "cve": "CVE-2024-46801", "product_status": { "known_affected": [ "T037716", "T044986", "2951", "T002207", "67646", "T000126", "T002366", "398363", "393401", "T004914" ] }, "release_date": "2024-09-17T22:00:00.000+00:00", "title": "CVE-2024-46801" } ] }
fkie_cve-2024-46733
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix qgroup reserve leaks in cow_file_range\n\nIn the buffered write path, the dirty page owns the qgroup reserve until\nit creates an ordered_extent.\n\nTherefore, any errors that occur before the ordered_extent is created\nmust free that reservation, or else the space is leaked. The fstest\ngeneric/475 exercises various IO error paths, and is able to trigger\nerrors in cow_file_range where we fail to get to allocating the ordered\nextent. Note that because we *do* clear delalloc, we are likely to\nremove the inode from the delalloc list, so the inodes/pages to not have\ninvalidate/launder called on them in the commit abort path.\n\nThis results in failures at the unmount stage of the test that look like:\n\n BTRFS: error (device dm-8 state EA) in cleanup_transaction:2018: errno=-5 IO failure\n BTRFS: error (device dm-8 state EA) in btrfs_replace_file_extents:2416: errno=-5 IO failure\n BTRFS warning (device dm-8 state EA): qgroup 0/5 has unreleased space, type 0 rsv 28672\n ------------[ cut here ]------------\n WARNING: CPU: 3 PID: 22588 at fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs]\n Modules linked in: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq\n CPU: 3 PID: 22588 Comm: umount Kdump: loaded Tainted: G W 6.10.0-rc7-gab56fde445b8 #21\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n RIP: 0010:close_ctree+0x222/0x4d0 [btrfs]\n RSP: 0018:ffffb4465283be00 EFLAGS: 00010202\n RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001\n RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8\n RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000\n R10: 0000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c\n R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n FS: 00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0\n Call Trace:\n \u003cTASK\u003e\n ? close_ctree+0x222/0x4d0 [btrfs]\n ? __warn.cold+0x8e/0xea\n ? close_ctree+0x222/0x4d0 [btrfs]\n ? report_bug+0xff/0x140\n ? handle_bug+0x3b/0x70\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? close_ctree+0x222/0x4d0 [btrfs]\n generic_shutdown_super+0x70/0x160\n kill_anon_super+0x11/0x40\n btrfs_kill_super+0x11/0x20 [btrfs]\n deactivate_locked_super+0x2e/0xa0\n cleanup_mnt+0xb5/0x150\n task_work_run+0x57/0x80\n syscall_exit_to_user_mode+0x121/0x130\n do_syscall_64+0xab/0x1a0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7f916847a887\n ---[ end trace 0000000000000000 ]---\n BTRFS error (device dm-8 state EA): qgroup reserved space leaked\n\nCases 2 and 3 in the out_reserve path both pertain to this type of leak\nand must free the reserved qgroup data. Because it is already an error\npath, I opted not to handle the possible errors in\nbtrfs_free_qgroup_data." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: reparar fugas de reserva de qgroup en cow_file_range En la ruta de escritura en b\u00fafer, la p\u00e1gina sucia posee la reserva de qgroup hasta que crea una ordered_extent. Por lo tanto, cualquier error que ocurra antes de que se cree la ordered_extent debe liberar esa reserva, o de lo contrario se pierde el espacio. El fstest generic/475 ejercita varias rutas de error de E/S y puede desencadenar errores en cow_file_range donde no logramos asignar la extensi\u00f3n ordenada. Tenga en cuenta que debido a que *s\u00ed* borramos delalloc, es probable que eliminemos el inodo de la lista de delalloc, por lo que los inodos/p\u00e1ginas no tienen una llamada de invalidaci\u00f3n/lavado en ellos en la ruta de aborto de confirmaci\u00f3n. Esto genera fallas en la etapa de desmontaje de la prueba que se ven as\u00ed: BTRFS: error (dispositivo dm-8 estado EA) en cleanup_transaction:2018: errno=-5 falla de E/S BTRFS: error (dispositivo dm-8 estado EA) en btrfs_replace_file_extents:2416: errno=-5 falla de E/S Advertencia de BTRFS (dispositivo dm-8 estado EA): qgroup 0/5 tiene espacio sin liberar, tipo 0 rsv 28672 ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 3 PID: 22588 en fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs] M\u00f3dulos vinculados en: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq CPU: 3 PID: 22588 Comm: umount Kdump: cargado Tainted: GW 6.10.0-rc7-gab56fde445b8 #21 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 01/04/2014 RIP: 0010:close_ctree+0x222/0x4d0 [btrfs] RSP: 0018:ffffb4465283be00 EFLAGS: 00010202 RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8 RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000 R10: 000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c R13: 000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0 Seguimiento de llamadas: ? close_ctree+0x222/0x4d0 [btrfs] ? __warn.cold+0x8e/0xea ? close_ctree+0x222/0x4d0 [btrfs] ? reportar_error+0xff/0x140 ? manejar_error+0x3b/0x70 ? exc_op_inv\u00e1lida+0x17/0x70 ? asm_exc_op_inv\u00e1lida+0x1a/0x20 ? cerrar_ctree+0x222/0x4d0 [btrfs] apagado_gen\u00e9rico_super+0x70/0x160 matar_an\u00f3nimo_super+0x11/0x40 btrfs_kill_super+0x11/0x20 [btrfs] desactivar_bloqueado_super+0x2e/0xa0 limpieza_mnt+0xb5/0x150 ejecuci\u00f3n_trabajo_tarea+0x57/0x80 salida_llamada_al_sistema_modo_usuario_+0x121/0x130 hacer_llamada_al_sistema_64+0xab/0x1a0 entrada_SYSCALL_64_despu\u00e9s_de_hwframe+0x77/0x7f RIP: 0033:0x7f916847a887 ---[ fin de seguimiento 0000000000000000 ]--- Error BTRFS (estado del dispositivo dm-8 EA): se filtr\u00f3 el espacio reservado del qgroup Los casos 2 y 3 en la ruta out_reserve pertenecen a este tipo de fuga y deben liberar los datos reservados del qgroup. Debido a que ya es una ruta de error, opt\u00e9 por no manejar los posibles errores en btrfs_free_qgroup_data." } ], "id": "CVE-2024-46733", "lastModified": "2025-04-25T11:15:44.663", "metrics": {}, "published": "2024-09-18T07:15:04.170", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/159f0f61b283ea71e827dd0c18c5dce197de1fa2" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/30479f31d44d47ed00ae0c7453d9b253537005b2" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/84464db2ec2a55b9313d5f264da196a37ec80994" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/e42ef22bc10f0309c0c65d8d6ca8b4127a674b7f" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
ghsa-p357-q4ph-xr92
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix qgroup reserve leaks in cow_file_range
In the buffered write path, the dirty page owns the qgroup reserve until it creates an ordered_extent.
Therefore, any errors that occur before the ordered_extent is created must free that reservation, or else the space is leaked. The fstest generic/475 exercises various IO error paths, and is able to trigger errors in cow_file_range where we fail to get to allocating the ordered extent. Note that because we do clear delalloc, we are likely to remove the inode from the delalloc list, so the inodes/pages to not have invalidate/launder called on them in the commit abort path.
This results in failures at the unmount stage of the test that look like:
BTRFS: error (device dm-8 state EA) in cleanup_transaction:2018: errno=-5 IO failure BTRFS: error (device dm-8 state EA) in btrfs_replace_file_extents:2416: errno=-5 IO failure BTRFS warning (device dm-8 state EA): qgroup 0/5 has unreleased space, type 0 rsv 28672 ------------[ cut here ]------------ WARNING: CPU: 3 PID: 22588 at fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs] Modules linked in: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq CPU: 3 PID: 22588 Comm: umount Kdump: loaded Tainted: G W 6.10.0-rc7-gab56fde445b8 #21 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014 RIP: 0010:close_ctree+0x222/0x4d0 [btrfs] RSP: 0018:ffffb4465283be00 EFLAGS: 00010202 RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8 RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000 R10: 0000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0 Call Trace: ? close_ctree+0x222/0x4d0 [btrfs] ? __warn.cold+0x8e/0xea ? close_ctree+0x222/0x4d0 [btrfs] ? report_bug+0xff/0x140 ? handle_bug+0x3b/0x70 ? exc_invalid_op+0x17/0x70 ? asm_exc_invalid_op+0x1a/0x20 ? close_ctree+0x222/0x4d0 [btrfs] generic_shutdown_super+0x70/0x160 kill_anon_super+0x11/0x40 btrfs_kill_super+0x11/0x20 [btrfs] deactivate_locked_super+0x2e/0xa0 cleanup_mnt+0xb5/0x150 task_work_run+0x57/0x80 syscall_exit_to_user_mode+0x121/0x130 do_syscall_64+0xab/0x1a0 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f916847a887 ---[ end trace 0000000000000000 ]--- BTRFS error (device dm-8 state EA): qgroup reserved space leaked
Cases 2 and 3 in the out_reserve path both pertain to this type of leak and must free the reserved qgroup data. Because it is already an error path, I opted not to handle the possible errors in btrfs_free_qgroup_data.
{ "affected": [], "aliases": [ "CVE-2024-46733" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-09-18T07:15:04Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix qgroup reserve leaks in cow_file_range\n\nIn the buffered write path, the dirty page owns the qgroup reserve until\nit creates an ordered_extent.\n\nTherefore, any errors that occur before the ordered_extent is created\nmust free that reservation, or else the space is leaked. The fstest\ngeneric/475 exercises various IO error paths, and is able to trigger\nerrors in cow_file_range where we fail to get to allocating the ordered\nextent. Note that because we *do* clear delalloc, we are likely to\nremove the inode from the delalloc list, so the inodes/pages to not have\ninvalidate/launder called on them in the commit abort path.\n\nThis results in failures at the unmount stage of the test that look like:\n\n BTRFS: error (device dm-8 state EA) in cleanup_transaction:2018: errno=-5 IO failure\n BTRFS: error (device dm-8 state EA) in btrfs_replace_file_extents:2416: errno=-5 IO failure\n BTRFS warning (device dm-8 state EA): qgroup 0/5 has unreleased space, type 0 rsv 28672\n ------------[ cut here ]------------\n WARNING: CPU: 3 PID: 22588 at fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs]\n Modules linked in: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq\n CPU: 3 PID: 22588 Comm: umount Kdump: loaded Tainted: G W 6.10.0-rc7-gab56fde445b8 #21\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n RIP: 0010:close_ctree+0x222/0x4d0 [btrfs]\n RSP: 0018:ffffb4465283be00 EFLAGS: 00010202\n RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001\n RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8\n RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000\n R10: 0000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c\n R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n FS: 00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0\n Call Trace:\n \u003cTASK\u003e\n ? close_ctree+0x222/0x4d0 [btrfs]\n ? __warn.cold+0x8e/0xea\n ? close_ctree+0x222/0x4d0 [btrfs]\n ? report_bug+0xff/0x140\n ? handle_bug+0x3b/0x70\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? close_ctree+0x222/0x4d0 [btrfs]\n generic_shutdown_super+0x70/0x160\n kill_anon_super+0x11/0x40\n btrfs_kill_super+0x11/0x20 [btrfs]\n deactivate_locked_super+0x2e/0xa0\n cleanup_mnt+0xb5/0x150\n task_work_run+0x57/0x80\n syscall_exit_to_user_mode+0x121/0x130\n do_syscall_64+0xab/0x1a0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7f916847a887\n ---[ end trace 0000000000000000 ]---\n BTRFS error (device dm-8 state EA): qgroup reserved space leaked\n\nCases 2 and 3 in the out_reserve path both pertain to this type of leak\nand must free the reserved qgroup data. Because it is already an error\npath, I opted not to handle the possible errors in\nbtrfs_free_qgroup_data.", "id": "GHSA-p357-q4ph-xr92", "modified": "2025-04-25T12:30:26Z", "published": "2024-09-18T09:30:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-46733" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/159f0f61b283ea71e827dd0c18c5dce197de1fa2" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/30479f31d44d47ed00ae0c7453d9b253537005b2" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/84464db2ec2a55b9313d5f264da196a37ec80994" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/e42ef22bc10f0309c0c65d8d6ca8b4127a674b7f" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.