Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-57806 (GCVE-0-2024-57806)
Vulnerability from cvelistv5
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/btrfs/qgroup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b87c9b9ba05ba6e8e2ee9ecd29a8c930b35648ed", "status": "affected", "version": "182940f4f4dbd932776414744c8de64333957725", "versionType": "git" }, { "lessThan": "f2363e6fcc7938c5f0f6ac066fad0dd247598b51", "status": "affected", "version": "182940f4f4dbd932776414744c8de64333957725", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/btrfs/qgroup.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.7" }, { "lessThan": "6.7", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.12.*", "status": "unaffected", "version": "6.12.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.13", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.8", "versionStartIncluding": "6.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.13", "versionStartIncluding": "6.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix transaction atomicity bug when enabling simple quotas\n\nSet squota incompat bit before committing the transaction that enables\nthe feature.\n\nWith the config CONFIG_BTRFS_ASSERT enabled, an assertion\nfailure occurs regarding the simple quota feature.\n\n [5.596534] assertion failed: btrfs_fs_incompat(fs_info, SIMPLE_QUOTA), in fs/btrfs/qgroup.c:365\n [5.597098] ------------[ cut here ]------------\n [5.597371] kernel BUG at fs/btrfs/qgroup.c:365!\n [5.597946] CPU: 1 UID: 0 PID: 268 Comm: mount Not tainted 6.13.0-rc2-00031-gf92f4749861b #146\n [5.598450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\n [5.599008] RIP: 0010:btrfs_read_qgroup_config+0x74d/0x7a0\n [5.604303] \u003cTASK\u003e\n [5.605230] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.605538] ? exc_invalid_op+0x56/0x70\n [5.605775] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.606066] ? asm_exc_invalid_op+0x1f/0x30\n [5.606441] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.606741] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.607038] ? try_to_wake_up+0x317/0x760\n [5.607286] open_ctree+0xd9c/0x1710\n [5.607509] btrfs_get_tree+0x58a/0x7e0\n [5.608002] vfs_get_tree+0x2e/0x100\n [5.608224] fc_mount+0x16/0x60\n [5.608420] btrfs_get_tree+0x2f8/0x7e0\n [5.608897] vfs_get_tree+0x2e/0x100\n [5.609121] path_mount+0x4c8/0xbc0\n [5.609538] __x64_sys_mount+0x10d/0x150\n\nThe issue can be easily reproduced using the following reproducer:\n\n root@q:linux# cat repro.sh\n set -e\n\n mkfs.btrfs -q -f /dev/sdb\n mount /dev/sdb /mnt/btrfs\n btrfs quota enable -s /mnt/btrfs\n umount /mnt/btrfs\n mount /dev/sdb /mnt/btrfs\n\nThe issue is that when enabling quotas, at btrfs_quota_enable(), we set\nBTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE at fs_info-\u003eqgroup_flags and persist\nit in the quota root in the item with the key BTRFS_QGROUP_STATUS_KEY, but\nwe only set the incompat bit BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA after we\ncommit the transaction used to enable simple quotas.\n\nThis means that if after that transaction commit we unmount the filesystem\nwithout starting and committing any other transaction, or we have a power\nfailure, the next time we mount the filesystem we will find the flag\nBTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE set in the item with the key\nBTRFS_QGROUP_STATUS_KEY but we will not find the incompat bit\nBTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA set in the superblock, triggering an\nassertion failure at:\n\n btrfs_read_qgroup_config() -\u003e qgroup_read_enable_gen()\n\nTo fix this issue, set the BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA flag\nimmediately after setting the BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE.\nThis ensures that both flags are flushed to disk within the same\ntransaction." } ], "providerMetadata": { "dateUpdated": "2025-05-04T10:05:14.076Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b87c9b9ba05ba6e8e2ee9ecd29a8c930b35648ed" }, { "url": "https://git.kernel.org/stable/c/f2363e6fcc7938c5f0f6ac066fad0dd247598b51" } ], "title": "btrfs: fix transaction atomicity bug when enabling simple quotas", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-57806", "datePublished": "2025-01-11T12:39:52.628Z", "dateReserved": "2025-01-11T12:32:49.322Z", "dateUpdated": "2025-05-04T10:05:14.076Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-57806\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-01-11T13:15:30.597\",\"lastModified\":\"2025-01-11T13:15:30.597\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbtrfs: fix transaction atomicity bug when enabling simple quotas\\n\\nSet squota incompat bit before committing the transaction that enables\\nthe feature.\\n\\nWith the config CONFIG_BTRFS_ASSERT enabled, an assertion\\nfailure occurs regarding the simple quota feature.\\n\\n [5.596534] assertion failed: btrfs_fs_incompat(fs_info, SIMPLE_QUOTA), in fs/btrfs/qgroup.c:365\\n [5.597098] ------------[ cut here ]------------\\n [5.597371] kernel BUG at fs/btrfs/qgroup.c:365!\\n [5.597946] CPU: 1 UID: 0 PID: 268 Comm: mount Not tainted 6.13.0-rc2-00031-gf92f4749861b #146\\n [5.598450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\\n [5.599008] RIP: 0010:btrfs_read_qgroup_config+0x74d/0x7a0\\n [5.604303] \u003cTASK\u003e\\n [5.605230] ? btrfs_read_qgroup_config+0x74d/0x7a0\\n [5.605538] ? exc_invalid_op+0x56/0x70\\n [5.605775] ? btrfs_read_qgroup_config+0x74d/0x7a0\\n [5.606066] ? asm_exc_invalid_op+0x1f/0x30\\n [5.606441] ? btrfs_read_qgroup_config+0x74d/0x7a0\\n [5.606741] ? btrfs_read_qgroup_config+0x74d/0x7a0\\n [5.607038] ? try_to_wake_up+0x317/0x760\\n [5.607286] open_ctree+0xd9c/0x1710\\n [5.607509] btrfs_get_tree+0x58a/0x7e0\\n [5.608002] vfs_get_tree+0x2e/0x100\\n [5.608224] fc_mount+0x16/0x60\\n [5.608420] btrfs_get_tree+0x2f8/0x7e0\\n [5.608897] vfs_get_tree+0x2e/0x100\\n [5.609121] path_mount+0x4c8/0xbc0\\n [5.609538] __x64_sys_mount+0x10d/0x150\\n\\nThe issue can be easily reproduced using the following reproducer:\\n\\n root@q:linux# cat repro.sh\\n set -e\\n\\n mkfs.btrfs -q -f /dev/sdb\\n mount /dev/sdb /mnt/btrfs\\n btrfs quota enable -s /mnt/btrfs\\n umount /mnt/btrfs\\n mount /dev/sdb /mnt/btrfs\\n\\nThe issue is that when enabling quotas, at btrfs_quota_enable(), we set\\nBTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE at fs_info-\u003eqgroup_flags and persist\\nit in the quota root in the item with the key BTRFS_QGROUP_STATUS_KEY, but\\nwe only set the incompat bit BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA after we\\ncommit the transaction used to enable simple quotas.\\n\\nThis means that if after that transaction commit we unmount the filesystem\\nwithout starting and committing any other transaction, or we have a power\\nfailure, the next time we mount the filesystem we will find the flag\\nBTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE set in the item with the key\\nBTRFS_QGROUP_STATUS_KEY but we will not find the incompat bit\\nBTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA set in the superblock, triggering an\\nassertion failure at:\\n\\n btrfs_read_qgroup_config() -\u003e qgroup_read_enable_gen()\\n\\nTo fix this issue, set the BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA flag\\nimmediately after setting the BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE.\\nThis ensures that both flags are flushed to disk within the same\\ntransaction.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/b87c9b9ba05ba6e8e2ee9ecd29a8c930b35648ed\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f2363e6fcc7938c5f0f6ac066fad0dd247598b51\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
ghsa-ffjg-532q-8rr8
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix transaction atomicity bug when enabling simple quotas
Set squota incompat bit before committing the transaction that enables the feature.
With the config CONFIG_BTRFS_ASSERT enabled, an assertion failure occurs regarding the simple quota feature.
[5.596534] assertion failed: btrfs_fs_incompat(fs_info, SIMPLE_QUOTA), in fs/btrfs/qgroup.c:365 [5.597098] ------------[ cut here ]------------ [5.597371] kernel BUG at fs/btrfs/qgroup.c:365! [5.597946] CPU: 1 UID: 0 PID: 268 Comm: mount Not tainted 6.13.0-rc2-00031-gf92f4749861b #146 [5.598450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [5.599008] RIP: 0010:btrfs_read_qgroup_config+0x74d/0x7a0 [5.604303] [5.605230] ? btrfs_read_qgroup_config+0x74d/0x7a0 [5.605538] ? exc_invalid_op+0x56/0x70 [5.605775] ? btrfs_read_qgroup_config+0x74d/0x7a0 [5.606066] ? asm_exc_invalid_op+0x1f/0x30 [5.606441] ? btrfs_read_qgroup_config+0x74d/0x7a0 [5.606741] ? btrfs_read_qgroup_config+0x74d/0x7a0 [5.607038] ? try_to_wake_up+0x317/0x760 [5.607286] open_ctree+0xd9c/0x1710 [5.607509] btrfs_get_tree+0x58a/0x7e0 [5.608002] vfs_get_tree+0x2e/0x100 [5.608224] fc_mount+0x16/0x60 [5.608420] btrfs_get_tree+0x2f8/0x7e0 [5.608897] vfs_get_tree+0x2e/0x100 [5.609121] path_mount+0x4c8/0xbc0 [5.609538] __x64_sys_mount+0x10d/0x150
The issue can be easily reproduced using the following reproducer:
root@q:linux# cat repro.sh set -e
mkfs.btrfs -q -f /dev/sdb mount /dev/sdb /mnt/btrfs btrfs quota enable -s /mnt/btrfs umount /mnt/btrfs mount /dev/sdb /mnt/btrfs
The issue is that when enabling quotas, at btrfs_quota_enable(), we set BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE at fs_info->qgroup_flags and persist it in the quota root in the item with the key BTRFS_QGROUP_STATUS_KEY, but we only set the incompat bit BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA after we commit the transaction used to enable simple quotas.
This means that if after that transaction commit we unmount the filesystem without starting and committing any other transaction, or we have a power failure, the next time we mount the filesystem we will find the flag BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE set in the item with the key BTRFS_QGROUP_STATUS_KEY but we will not find the incompat bit BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA set in the superblock, triggering an assertion failure at:
btrfs_read_qgroup_config() -> qgroup_read_enable_gen()
To fix this issue, set the BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA flag immediately after setting the BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE. This ensures that both flags are flushed to disk within the same transaction.
{ "affected": [], "aliases": [ "CVE-2024-57806" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-01-11T13:15:30Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix transaction atomicity bug when enabling simple quotas\n\nSet squota incompat bit before committing the transaction that enables\nthe feature.\n\nWith the config CONFIG_BTRFS_ASSERT enabled, an assertion\nfailure occurs regarding the simple quota feature.\n\n [5.596534] assertion failed: btrfs_fs_incompat(fs_info, SIMPLE_QUOTA), in fs/btrfs/qgroup.c:365\n [5.597098] ------------[ cut here ]------------\n [5.597371] kernel BUG at fs/btrfs/qgroup.c:365!\n [5.597946] CPU: 1 UID: 0 PID: 268 Comm: mount Not tainted 6.13.0-rc2-00031-gf92f4749861b #146\n [5.598450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\n [5.599008] RIP: 0010:btrfs_read_qgroup_config+0x74d/0x7a0\n [5.604303] \u003cTASK\u003e\n [5.605230] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.605538] ? exc_invalid_op+0x56/0x70\n [5.605775] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.606066] ? asm_exc_invalid_op+0x1f/0x30\n [5.606441] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.606741] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.607038] ? try_to_wake_up+0x317/0x760\n [5.607286] open_ctree+0xd9c/0x1710\n [5.607509] btrfs_get_tree+0x58a/0x7e0\n [5.608002] vfs_get_tree+0x2e/0x100\n [5.608224] fc_mount+0x16/0x60\n [5.608420] btrfs_get_tree+0x2f8/0x7e0\n [5.608897] vfs_get_tree+0x2e/0x100\n [5.609121] path_mount+0x4c8/0xbc0\n [5.609538] __x64_sys_mount+0x10d/0x150\n\nThe issue can be easily reproduced using the following reproducer:\n\n root@q:linux# cat repro.sh\n set -e\n\n mkfs.btrfs -q -f /dev/sdb\n mount /dev/sdb /mnt/btrfs\n btrfs quota enable -s /mnt/btrfs\n umount /mnt/btrfs\n mount /dev/sdb /mnt/btrfs\n\nThe issue is that when enabling quotas, at btrfs_quota_enable(), we set\nBTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE at fs_info-\u003eqgroup_flags and persist\nit in the quota root in the item with the key BTRFS_QGROUP_STATUS_KEY, but\nwe only set the incompat bit BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA after we\ncommit the transaction used to enable simple quotas.\n\nThis means that if after that transaction commit we unmount the filesystem\nwithout starting and committing any other transaction, or we have a power\nfailure, the next time we mount the filesystem we will find the flag\nBTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE set in the item with the key\nBTRFS_QGROUP_STATUS_KEY but we will not find the incompat bit\nBTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA set in the superblock, triggering an\nassertion failure at:\n\n btrfs_read_qgroup_config() -\u003e qgroup_read_enable_gen()\n\nTo fix this issue, set the BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA flag\nimmediately after setting the BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE.\nThis ensures that both flags are flushed to disk within the same\ntransaction.", "id": "GHSA-ffjg-532q-8rr8", "modified": "2025-01-11T15:30:29Z", "published": "2025-01-11T15:30:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57806" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/b87c9b9ba05ba6e8e2ee9ecd29a8c930b35648ed" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f2363e6fcc7938c5f0f6ac066fad0dd247598b51" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2024-57806
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix transaction atomicity bug when enabling simple quotas\n\nSet squota incompat bit before committing the transaction that enables\nthe feature.\n\nWith the config CONFIG_BTRFS_ASSERT enabled, an assertion\nfailure occurs regarding the simple quota feature.\n\n [5.596534] assertion failed: btrfs_fs_incompat(fs_info, SIMPLE_QUOTA), in fs/btrfs/qgroup.c:365\n [5.597098] ------------[ cut here ]------------\n [5.597371] kernel BUG at fs/btrfs/qgroup.c:365!\n [5.597946] CPU: 1 UID: 0 PID: 268 Comm: mount Not tainted 6.13.0-rc2-00031-gf92f4749861b #146\n [5.598450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\n [5.599008] RIP: 0010:btrfs_read_qgroup_config+0x74d/0x7a0\n [5.604303] \u003cTASK\u003e\n [5.605230] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.605538] ? exc_invalid_op+0x56/0x70\n [5.605775] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.606066] ? asm_exc_invalid_op+0x1f/0x30\n [5.606441] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.606741] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.607038] ? try_to_wake_up+0x317/0x760\n [5.607286] open_ctree+0xd9c/0x1710\n [5.607509] btrfs_get_tree+0x58a/0x7e0\n [5.608002] vfs_get_tree+0x2e/0x100\n [5.608224] fc_mount+0x16/0x60\n [5.608420] btrfs_get_tree+0x2f8/0x7e0\n [5.608897] vfs_get_tree+0x2e/0x100\n [5.609121] path_mount+0x4c8/0xbc0\n [5.609538] __x64_sys_mount+0x10d/0x150\n\nThe issue can be easily reproduced using the following reproducer:\n\n root@q:linux# cat repro.sh\n set -e\n\n mkfs.btrfs -q -f /dev/sdb\n mount /dev/sdb /mnt/btrfs\n btrfs quota enable -s /mnt/btrfs\n umount /mnt/btrfs\n mount /dev/sdb /mnt/btrfs\n\nThe issue is that when enabling quotas, at btrfs_quota_enable(), we set\nBTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE at fs_info-\u003eqgroup_flags and persist\nit in the quota root in the item with the key BTRFS_QGROUP_STATUS_KEY, but\nwe only set the incompat bit BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA after we\ncommit the transaction used to enable simple quotas.\n\nThis means that if after that transaction commit we unmount the filesystem\nwithout starting and committing any other transaction, or we have a power\nfailure, the next time we mount the filesystem we will find the flag\nBTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE set in the item with the key\nBTRFS_QGROUP_STATUS_KEY but we will not find the incompat bit\nBTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA set in the superblock, triggering an\nassertion failure at:\n\n btrfs_read_qgroup_config() -\u003e qgroup_read_enable_gen()\n\nTo fix this issue, set the BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA flag\nimmediately after setting the BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE.\nThis ensures that both flags are flushed to disk within the same\ntransaction." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: se corrige el error de atomicidad de transacciones al habilitar cuotas simples. Establezca el bit de incompatibilidad de squota antes de confirmar la transacci\u00f3n que habilita la funci\u00f3n. Con la configuraci\u00f3n CONFIG_BTRFS_ASSERT habilitada, se produce un error de afirmaci\u00f3n con respecto a la funci\u00f3n de cuota simple. [5.596534] Error de afirmaci\u00f3n: btrfs_fs_incompat(fs_info, SIMPLE_QUOTA), en fs/btrfs/qgroup.c:365 [5.597098] ------------[ corte aqu\u00ed ]------------ [5.597371] \u00a1ERROR del kernel en fs/btrfs/qgroup.c:365! [5.597946] CPU: 1 UID: 0 PID: 268 Comm: montaje No contaminado 6.13.0-rc2-00031-gf92f4749861b #146 [5.598450] Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 01/04/2014 [5.599008] RIP: 0010:btrfs_read_qgroup_config+0x74d/0x7a0 [5.604303] [5.605230] ? btrfs_read_qgroup_config+0x74d/0x7a0 [5.605538] ? asm_exc_invalid_op+0x1f/0x30 [5.606441] ? btrfs_read_qgroup_config+0x74d/0x7a0 [5.606741] ? btrfs_read_qgroup_config+0x74d/0x7a0 [5.607038] ? intentar_activar+0x317/0x760 [5.607286] abrir_ctree+0xd9c/0x1710 [5.607509] btrfs_get_tree+0x58a/0x7e0 [5.608002] vfs_get_tree+0x2e/0x100 [5.608224] montaje_fc+0x16/0x60 [5.608420] btrfs_get_tree+0x2f8/0x7e0 [5.608897] vfs_get_tree+0x2e/0x100 [5.609121] montaje_ruta+0x4c8/0xbc0 [5.609538] __x64_sys_mount+0x10d/0x150 El problema se puede reproducir f\u00e1cilmente utilizando el siguiente reproductor: root@q:linux# cat repro.sh set -e mkfs.btrfs -q -f /dev/sdb mount /dev/sdb /mnt/btrfs btrfs quota enable -s /mnt/btrfs umount /mnt/btrfs mount /dev/sdb /mnt/btrfs El problema es que al habilitar cuotas, en btrfs_quota_enable(), configuramos BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE en fs_info-\u0026gt;qgroup_flags y lo persistimos en la ra\u00edz de cuotas en el elemento con la clave BTRFS_QGROUP_STATUS_KEY, pero solo configuramos el bit de incompatibilidad BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA despu\u00e9s de que confirmamos la transacci\u00f3n utilizada para habilitar la cuota simple. Esto significa que si despu\u00e9s de esa confirmaci\u00f3n de transacci\u00f3n desmontamos el sistema de archivos sin iniciar y confirmar ninguna otra transacci\u00f3n, o tenemos un corte de energ\u00eda, la pr\u00f3xima vez que montemos el sistema de archivos encontraremos el indicador BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE establecido en el elemento con la clave BTRFS_QGROUP_STATUS_KEY pero no encontraremos el bit de incompatibilidad BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA establecido en el superbloque, lo que desencadena un error de aserci\u00f3n en: btrfs_read_qgroup_config() -\u0026gt; qgroup_read_enable_gen() Para solucionar este problema, configure el indicador BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA inmediatamente despu\u00e9s de configurar BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE. Esto garantiza que ambos indicadores se vac\u00eden en el disco dentro de la misma transacci\u00f3n." } ], "id": "CVE-2024-57806", "lastModified": "2025-01-11T13:15:30.597", "metrics": {}, "published": "2025-01-11T13:15:30.597", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/b87c9b9ba05ba6e8e2ee9ecd29a8c930b35648ed" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/f2363e6fcc7938c5f0f6ac066fad0dd247598b51" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
wid-sec-w-2025-0047
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und weitere nicht spezifizierte Angriffe zu starten.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0047 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0047.json" }, { "category": "self", "summary": "WID-SEC-2025-0047 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0047" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-41149", "url": "https://lore.kernel.org/linux-cve-announce/2025011141-CVE-2024-41149-7e9b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-41932", "url": "https://lore.kernel.org/linux-cve-announce/2025011116-CVE-2024-41932-ed84@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-41935", "url": "https://lore.kernel.org/linux-cve-announce/2025011118-CVE-2024-41935-e11d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-43098", "url": "https://lore.kernel.org/linux-cve-announce/2025011118-CVE-2024-43098-e732@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-45828", "url": "https://lore.kernel.org/linux-cve-announce/2025011119-CVE-2024-45828-8cbd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46896", "url": "https://lore.kernel.org/linux-cve-announce/2025011141-CVE-2024-46896-8e7c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47141", "url": "https://lore.kernel.org/linux-cve-announce/2025011119-CVE-2024-47141-13f5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47143", "url": "https://lore.kernel.org/linux-cve-announce/2025011119-CVE-2024-47143-37ba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47408", "url": "https://lore.kernel.org/linux-cve-announce/2025011141-CVE-2024-47408-e686@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47794", "url": "https://lore.kernel.org/linux-cve-announce/2025011120-CVE-2024-47794-09e9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47809", "url": "https://lore.kernel.org/linux-cve-announce/2025011120-CVE-2024-47809-7b40@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-48873", "url": "https://lore.kernel.org/linux-cve-announce/2025011120-CVE-2024-48873-75a9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-48875", "url": "https://lore.kernel.org/linux-cve-announce/2025011121-CVE-2024-48875-5b79@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-48876", "url": "https://lore.kernel.org/linux-cve-announce/2025011121-CVE-2024-48876-da61@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-48881", "url": "https://lore.kernel.org/linux-cve-announce/2025011121-CVE-2024-48881-c4e5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49568", "url": "https://lore.kernel.org/linux-cve-announce/2025011142-CVE-2024-49568-e5f6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49569", "url": "https://lore.kernel.org/linux-cve-announce/2025011122-CVE-2024-49569-c532@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49571", "url": "https://lore.kernel.org/linux-cve-announce/2025011142-CVE-2024-49571-c86d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49573", "url": "https://lore.kernel.org/linux-cve-announce/2025011142-CVE-2024-49573-fa46@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50051", "url": "https://lore.kernel.org/linux-cve-announce/2025011122-CVE-2024-50051-d822@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-51729", "url": "https://lore.kernel.org/linux-cve-announce/2025011143-CVE-2024-51729-799d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-52319", "url": "https://lore.kernel.org/linux-cve-announce/2025011143-CVE-2024-52319-61ca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-52332", "url": "https://lore.kernel.org/linux-cve-announce/2025011122-CVE-2024-52332-9d2f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53680", "url": "https://lore.kernel.org/linux-cve-announce/2025011123-CVE-2024-53680-88d4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53682", "url": "https://lore.kernel.org/linux-cve-announce/2025011157-CVE-2024-53682-263d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53685", "url": "https://lore.kernel.org/linux-cve-announce/2025011143-CVE-2024-53685-e6c3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53687", "url": "https://lore.kernel.org/linux-cve-announce/2025011157-CVE-2024-53687-5f05@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53689", "url": "https://lore.kernel.org/linux-cve-announce/2025011158-CVE-2024-53689-c526@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53690", "url": "https://lore.kernel.org/linux-cve-announce/2025011144-CVE-2024-53690-8ad8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54191", "url": "https://lore.kernel.org/linux-cve-announce/2025011158-CVE-2024-54191-eeef@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54193", "url": "https://lore.kernel.org/linux-cve-announce/2025011144-CVE-2024-54193-9ce6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54455", "url": "https://lore.kernel.org/linux-cve-announce/2025011145-CVE-2024-54455-0e8e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54460", "url": "https://lore.kernel.org/linux-cve-announce/2025011158-CVE-2024-54460-c8c8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54680", "url": "https://lore.kernel.org/linux-cve-announce/2025011145-CVE-2024-54680-db98@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54683", "url": "https://lore.kernel.org/linux-cve-announce/2025011159-CVE-2024-54683-042e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-55639", "url": "https://lore.kernel.org/linux-cve-announce/2025011159-CVE-2024-55639-b3d2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-55641", "url": "https://lore.kernel.org/linux-cve-announce/2025011159-CVE-2024-55641-fa58@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-55642", "url": "https://lore.kernel.org/linux-cve-announce/2025011100-CVE-2024-55642-29a8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-55881", "url": "https://lore.kernel.org/linux-cve-announce/2025011145-CVE-2024-55881-ad68@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-55916", "url": "https://lore.kernel.org/linux-cve-announce/2025011146-CVE-2024-55916-3a1f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56368", "url": "https://lore.kernel.org/linux-cve-announce/2025011146-CVE-2024-56368-e3cd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56369", "url": "https://lore.kernel.org/linux-cve-announce/2025011146-CVE-2024-56369-be56@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56372", "url": "https://lore.kernel.org/linux-cve-announce/2025011147-CVE-2024-56372-99e3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56788", "url": "https://lore.kernel.org/linux-cve-announce/2025011147-CVE-2024-56788-7a74@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57791", "url": "https://lore.kernel.org/linux-cve-announce/2025011147-CVE-2024-57791-7bc8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57792", "url": "https://lore.kernel.org/linux-cve-announce/2025011150-CVE-2024-57792-0002@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57793", "url": "https://lore.kernel.org/linux-cve-announce/2025011150-CVE-2024-57793-4d57@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57798", "url": "https://lore.kernel.org/linux-cve-announce/2025011151-CVE-2024-57798-68b5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57799", "url": "https://lore.kernel.org/linux-cve-announce/2025011151-CVE-2024-57799-ae66@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57800", "url": "https://lore.kernel.org/linux-cve-announce/2025011152-CVE-2024-57800-699a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57804", "url": "https://lore.kernel.org/linux-cve-announce/2025011152-CVE-2024-57804-4bad@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57805", "url": "https://lore.kernel.org/linux-cve-announce/2025011152-CVE-2024-57805-fbae@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57806", "url": "https://lore.kernel.org/linux-cve-announce/2025011153-CVE-2024-57806-0afb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57807", "url": "https://lore.kernel.org/linux-cve-announce/2025011153-CVE-2024-57807-b595@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57809", "url": "https://lore.kernel.org/linux-cve-announce/2025011103-CVE-2024-57809-a6be@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57838", "url": "https://lore.kernel.org/linux-cve-announce/2025011105-CVE-2024-57838-4111@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57839", "url": "https://lore.kernel.org/linux-cve-announce/2025011101-CVE-2024-57839-daf6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57843", "url": "https://lore.kernel.org/linux-cve-announce/2025011103-CVE-2024-57843-1c15@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57849", "url": "https://lore.kernel.org/linux-cve-announce/2025011103-CVE-2024-57849-64db@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57850", "url": "https://lore.kernel.org/linux-cve-announce/2025011104-CVE-2024-57850-7e8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57872", "url": "https://lore.kernel.org/linux-cve-announce/2025011104-CVE-2024-57872-28ee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57874", "url": "https://lore.kernel.org/linux-cve-announce/2025011113-CVE-2024-57874-539d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57875", "url": "https://lore.kernel.org/linux-cve-announce/2025011107-CVE-2024-57875-7902@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57876", "url": "https://lore.kernel.org/linux-cve-announce/2025011107-CVE-2024-57876-1d02@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57877", "url": "https://lore.kernel.org/linux-cve-announce/2025011108-CVE-2024-57877-ee49@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57878", "url": "https://lore.kernel.org/linux-cve-announce/2025011108-CVE-2024-57878-465c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57879", "url": "https://lore.kernel.org/linux-cve-announce/2025011131-CVE-2024-57879-7fa8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57880", "url": "https://lore.kernel.org/linux-cve-announce/2025011134-CVE-2024-57880-c009@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57881", "url": "https://lore.kernel.org/linux-cve-announce/2025011146-CVE-2024-57881-7516@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23124", "url": "https://lore.kernel.org/linux-cve-announce/2025011104-CVE-2025-23124-6e63@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23125", "url": "https://lore.kernel.org/linux-cve-announce/2025011105-CVE-2025-23125-069a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23126", "url": "https://lore.kernel.org/linux-cve-announce/2025011105-CVE-2025-23126-4c4f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23127", "url": "https://lore.kernel.org/linux-cve-announce/2025011105-CVE-2025-23127-2b8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23128", "url": "https://lore.kernel.org/linux-cve-announce/2025011106-CVE-2025-23128-2d6e@gregkh/#t" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5860 vom 2025-02-08", "url": "https://lists.debian.org/debian-security-announce/2025/msg00023.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0428-1 vom 2025-02-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0499-1 vom 2025-02-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0517-1 vom 2025-02-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0557-1 vom 2025-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0555-1 vom 2025-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0556-1 vom 2025-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0577-1 vom 2025-02-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0576-1 vom 2025-02-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0517-2 vom 2025-02-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0603-1 vom 2025-02-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4075 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4076 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0771-1 vom 2025-03-03", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6X627UISONPV7CQLLHUDVJCDEIODQO4O/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2474 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2474" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2473 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2473" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-2473 vom 2025-03-11", "url": "https://linux.oracle.com/errata/ELSA-2025-2473.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20152 vom 2025-03-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20152.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0577-2 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-082 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-082.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0867-1 vom 2025-03-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2710 vom 2025-03-20", "url": "https://access.redhat.com/errata/RHSA-2025:2710" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7387-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7382-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7382-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7381-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7381-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7379-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7379-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7380-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7380-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7391-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7393-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7392-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7392-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7392-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7379-2 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7379-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7392-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7401-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7402-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7403-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7403-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-2 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7402-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7407-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7406-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-2 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7406-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-3 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7406-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7413-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-4 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7406-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-3 vom 2025-04-04", "url": "https://ubuntu.com/security/notices/USN-7402-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7421-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-4 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7402-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7420-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7420-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-6 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7406-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-5 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7406-5" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0111-1 vom 2025-04-16", "url": "https://ubuntu.com/security/notices/LSN-0111-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-5 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7402-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7453-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7452-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7449-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7450-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7451-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7449-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7458-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7463-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7459-1" }, { "category": "external", "summary": "IBM Security Bulletin 7231915 vom 2025-04-26", "url": "https://www.ibm.com/support/pages/node/7231915" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7459-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7468-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7475-1 vom 2025-05-02", "url": "https://ubuntu.com/security/notices/USN-7475-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7514-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7513-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7515-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7513-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7513-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7515-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7522-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7523-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7524-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8248 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8248" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-4 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7513-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-5 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7513-5" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0112-1 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/LSN-0112-1" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30", "url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06", "url": "https://ubuntu.com/security/notices/USN-7553-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0113-1 vom 2025-07-10", "url": "https://ubuntu.com/security/notices/LSN-0113-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02387-1 vom 2025-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021861.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20480 vom 2025-07-18", "url": "https://linux.oracle.com/errata/ELSA-2025-20480.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02388-1 vom 2025-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021860.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02389-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021882.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02411-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DEKG43SVEEUNQXJBCRXWGSWJ6NQ36NUC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02412-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021866.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02390-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021881.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02403-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXLF63OLKSA5LWF3BYMVRASA55GHVYJY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02413-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021865.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02410-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7JYI4RKW2E7EB4ZJ6UB45TTF2H6PEYR/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02420-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021886.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02449-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOIECZ42HAJGKZ7TVGI4LLLNAG27ZF7L/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02433-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021883.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02421-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021885.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02437-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCEZBA2U7C5F2MCQC3AIBIKAHNQBPFOI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02440-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON72ZMOEO6E3K3KZFRVFHX5LUYA6RAXJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02459-1 vom 2025-07-22", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNBGONL5CBCKJ2ZQN6XVJFDFNJMHMLDW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20519-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022032.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20518-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022033.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20517-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022034.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20525-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022027.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20526-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022026.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20527-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20540-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022104.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20541-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022103.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20544-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20545-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022099.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-12752 vom 2025-08-07", "url": "http://linux.oracle.com/errata/ELSA-2025-12752.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-1 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-2 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-3 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7727-3" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-09-02T22:00:00.000+00:00", "generator": { "date": "2025-09-03T07:33:08.514+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0047", "initial_release_date": "2025-01-12T23:00:00.000+00:00", "revision_history": [ { "date": "2025-01-12T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-01-26T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-09T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-02-11T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-16T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-17T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-20T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-09T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-10T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-13T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-16T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-19T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-02T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-06T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-07T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-15T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-16T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-22T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-23T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-27T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-01T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-05T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-19T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "53", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "56", "summary": "Referenz(en) aufgenommen:" }, { "date": "2025-08-03T22:00:00.000+00:00", "number": "57", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "58", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-06T22:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-19T22:00:00.000+00:00", "number": "60", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-28T22:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "62" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Avamar", "product": { "name": "Dell Avamar", "product_id": "T039664", "product_identification_helper": { "cpe": "cpe:/a:dell:avamar:-" } } }, { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP11 IF04", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04", "product_id": "T043169" } }, { "category": "product_version", "name": "7.5.0 UP11 IF04", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11 IF04", "product_id": "T043169-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T008144", "product_identification_helper": { "cpe": "cpe:/a:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "Container Platform \u003c4.14.49", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.49", "product_id": "T042010" } }, { "category": "product_version", "name": "Container Platform 4.14.49", "product": { "name": "Red Hat OpenShift Container Platform 4.14.49", "product_id": "T042010-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.49" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-41149", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-41149" }, { "cve": "CVE-2024-41932", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-41932" }, { "cve": "CVE-2024-41935", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-41935" }, { "cve": "CVE-2024-43098", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-43098" }, { "cve": "CVE-2024-45828", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-45828" }, { "cve": "CVE-2024-46896", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-46896" }, { "cve": "CVE-2024-47141", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47141" }, { "cve": "CVE-2024-47143", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47143" }, { "cve": "CVE-2024-47408", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47408" }, { "cve": "CVE-2024-47794", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47794" }, { "cve": "CVE-2024-47809", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47809" }, { "cve": "CVE-2024-48873", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-48873" }, { "cve": "CVE-2024-48875", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-48875" }, { "cve": "CVE-2024-48876", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-48876" }, { "cve": "CVE-2024-48881", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-48881" }, { "cve": "CVE-2024-49568", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-49568" }, { "cve": "CVE-2024-49569", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-49569" }, { "cve": "CVE-2024-49571", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-49571" }, { "cve": "CVE-2024-49573", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-49573" }, { "cve": "CVE-2024-50051", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-50051" }, { "cve": "CVE-2024-51729", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-51729" }, { "cve": "CVE-2024-52319", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-52319" }, { "cve": "CVE-2024-52332", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-52332" }, { "cve": "CVE-2024-53680", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53680" }, { "cve": "CVE-2024-53682", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53682" }, { "cve": "CVE-2024-53685", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53685" }, { "cve": "CVE-2024-53687", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53687" }, { "cve": "CVE-2024-53689", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53689" }, { "cve": "CVE-2024-53690", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53690" }, { "cve": "CVE-2024-54191", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54191" }, { "cve": "CVE-2024-54193", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54193" }, { "cve": "CVE-2024-54455", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54455" }, { "cve": "CVE-2024-54460", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54460" }, { "cve": "CVE-2024-54680", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54680" }, { "cve": "CVE-2024-54683", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54683" }, { "cve": "CVE-2024-55639", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-55639" }, { "cve": "CVE-2024-55641", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-55641" }, { "cve": "CVE-2024-55642", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-55642" }, { "cve": "CVE-2024-55881", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-55881" }, { "cve": "CVE-2024-55916", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-55916" }, { "cve": "CVE-2024-56368", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-56368" }, { "cve": "CVE-2024-56369", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-56369" }, { "cve": "CVE-2024-56372", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-56372" }, { "cve": "CVE-2024-56788", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-56788" }, { "cve": "CVE-2024-57791", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57791" }, { "cve": "CVE-2024-57792", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57792" }, { "cve": "CVE-2024-57793", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57793" }, { "cve": "CVE-2024-57798", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57798" }, { "cve": "CVE-2024-57799", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57799" }, { "cve": "CVE-2024-57800", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57800" }, { "cve": "CVE-2024-57804", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57804" }, { "cve": "CVE-2024-57805", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57805" }, { "cve": "CVE-2024-57806", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57806" }, { "cve": "CVE-2024-57807", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57807" }, { "cve": "CVE-2024-57809", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57809" }, { "cve": "CVE-2024-57838", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57838" }, { "cve": "CVE-2024-57839", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57839" }, { "cve": "CVE-2024-57843", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57843" }, { "cve": "CVE-2024-57849", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57849" }, { "cve": "CVE-2024-57850", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57850" }, { "cve": "CVE-2024-57872", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57872" }, { "cve": "CVE-2024-57874", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57874" }, { "cve": "CVE-2024-57875", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57875" }, { "cve": "CVE-2024-57876", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57876" }, { "cve": "CVE-2024-57877", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57877" }, { "cve": "CVE-2024-57878", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57878" }, { "cve": "CVE-2024-57879", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57879" }, { "cve": "CVE-2024-57880", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57880" }, { "cve": "CVE-2024-57881", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57881" }, { "cve": "CVE-2025-23124", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2025-23124" }, { "cve": "CVE-2025-23125", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2025-23125" }, { "cve": "CVE-2025-23126", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2025-23126" }, { "cve": "CVE-2025-23127", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2025-23127" }, { "cve": "CVE-2025-23128", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "398363", "T004914", "T042010", "T008144", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2025-23128" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.