Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-57878 (GCVE-0-2024-57878)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-57878", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-10-01T19:54:50.581552Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-908", "description": "CWE-908 Use of Uninitialized Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-01T19:57:19.658Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/arm64/kernel/ptrace.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8ab73c34e3c5b580721696665eabd799346bc50b", "status": "affected", "version": "4035c22ef7d43a6c00d6a6584c60e902b95b46af", "versionType": "git" }, { "lessThan": "f5d71291841aecfe5d8435da2dfa7f58ccd18bc8", "status": "affected", "version": "4035c22ef7d43a6c00d6a6584c60e902b95b46af", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/arm64/kernel/ptrace.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.9" }, { "lessThan": "6.9", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.12.*", "status": "unaffected", "version": "6.12.5", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.13", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.5", "versionStartIncluding": "6.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.13", "versionStartIncluding": "6.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: ptrace: fix partial SETREGSET for NT_ARM_FPMR\n\nCurrently fpmr_set() doesn\u0027t initialize the temporary \u0027fpmr\u0027 variable,\nand a SETREGSET call with a length of zero will leave this\nuninitialized. Consequently an arbitrary value will be written back to\ntarget-\u003ethread.uw.fpmr, potentially leaking up to 64 bits of memory from\nthe kernel stack. The read is limited to a specific slot on the stack,\nand the issue does not provide a write mechanism.\n\nFix this by initializing the temporary value before copying the regset\nfrom userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG,\nNT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing\ncontents of FPMR will be retained.\n\nBefore this patch:\n\n| # ./fpmr-test\n| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n| SETREGSET(nt=0x40e, len=8) wrote 8 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n|\n| Attempting to write NT_ARM_FPMR (zero length)\n| SETREGSET(nt=0x40e, len=0) wrote 0 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0xffff800083963d50\n\nAfter this patch:\n\n| # ./fpmr-test\n| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n| SETREGSET(nt=0x40e, len=8) wrote 8 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n|\n| Attempting to write NT_ARM_FPMR (zero length)\n| SETREGSET(nt=0x40e, len=0) wrote 0 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d" } ], "providerMetadata": { "dateUpdated": "2025-05-04T10:05:41.552Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8ab73c34e3c5b580721696665eabd799346bc50b" }, { "url": "https://git.kernel.org/stable/c/f5d71291841aecfe5d8435da2dfa7f58ccd18bc8" } ], "title": "arm64: ptrace: fix partial SETREGSET for NT_ARM_FPMR", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-57878", "datePublished": "2025-01-11T14:49:04.088Z", "dateReserved": "2025-01-11T14:45:42.023Z", "dateUpdated": "2025-10-01T19:57:19.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-57878\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-01-11T15:15:08.190\",\"lastModified\":\"2025-10-01T20:17:59.500\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\narm64: ptrace: fix partial SETREGSET for NT_ARM_FPMR\\n\\nCurrently fpmr_set() doesn\u0027t initialize the temporary \u0027fpmr\u0027 variable,\\nand a SETREGSET call with a length of zero will leave this\\nuninitialized. Consequently an arbitrary value will be written back to\\ntarget-\u003ethread.uw.fpmr, potentially leaking up to 64 bits of memory from\\nthe kernel stack. The read is limited to a specific slot on the stack,\\nand the issue does not provide a write mechanism.\\n\\nFix this by initializing the temporary value before copying the regset\\nfrom userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG,\\nNT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing\\ncontents of FPMR will be retained.\\n\\nBefore this patch:\\n\\n| # ./fpmr-test\\n| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d\\n| SETREGSET(nt=0x40e, len=8) wrote 8 bytes\\n|\\n| Attempting to read NT_ARM_FPMR::fpmr\\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d\\n|\\n| Attempting to write NT_ARM_FPMR (zero length)\\n| SETREGSET(nt=0x40e, len=0) wrote 0 bytes\\n|\\n| Attempting to read NT_ARM_FPMR::fpmr\\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\\n| Read NT_ARM_FPMR::fpmr = 0xffff800083963d50\\n\\nAfter this patch:\\n\\n| # ./fpmr-test\\n| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d\\n| SETREGSET(nt=0x40e, len=8) wrote 8 bytes\\n|\\n| Attempting to read NT_ARM_FPMR::fpmr\\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d\\n|\\n| Attempting to write NT_ARM_FPMR (zero length)\\n| SETREGSET(nt=0x40e, len=0) wrote 0 bytes\\n|\\n| Attempting to read NT_ARM_FPMR::fpmr\\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: correcci\u00f3n de SETREGSET parcial para NT_ARM_FPMR Actualmente, fpmr_set() no inicializa la variable temporal \u0027fpmr\u0027, y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, se volver\u00e1 a escribir un valor arbitrario en target-\u0026gt;thread.uw.fpmr, lo que podr\u00eda provocar una p\u00e9rdida de hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Corrija esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1n los contenidos existentes de FPMR. Antes de este parche: | # ./fpmr-test | Intentando escribir NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Le\u00eddo NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Intentando escribir NT_ARM_FPMR (longitud cero) | SETREGSET(nt=0x40e, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Leer NT_ARM_FPMR::fpmr = 0xffff800083963d50 Despu\u00e9s de este parche: | # ./fpmr-test | Intentando escribir NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Leer NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Intentando escribir NT_ARM_FPMR (longitud cero) | SETREGSET(nt=0x40e, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) leer 8 bytes | Leer NT_ARM_FPMR::fpmr = 0x900d900d900d900d\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.2},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-908\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-908\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.9\",\"versionEndExcluding\":\"6.12.5\",\"matchCriteriaId\":\"EF8BDA69-3016-4248-8055-EA7662336040\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62567B3C-6CEE-46D0-BC2E-B3717FBF7D13\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/8ab73c34e3c5b580721696665eabd799346bc50b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f5d71291841aecfe5d8435da2dfa7f58ccd18bc8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}" } }
ghsa-w46c-ww47-4hf8
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
arm64: ptrace: fix partial SETREGSET for NT_ARM_FPMR
Currently fpmr_set() doesn't initialize the temporary 'fpmr' variable, and a SETREGSET call with a length of zero will leave this uninitialized. Consequently an arbitrary value will be written back to target->thread.uw.fpmr, potentially leaking up to 64 bits of memory from the kernel stack. The read is limited to a specific slot on the stack, and the issue does not provide a write mechanism.
Fix this by initializing the temporary value before copying the regset from userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing contents of FPMR will be retained.
Before this patch:
| # ./fpmr-test | Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) wrote 8 bytes | | Attempting to read NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) read 8 bytes | Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Attempting to write NT_ARM_FPMR (zero length) | SETREGSET(nt=0x40e, len=0) wrote 0 bytes | | Attempting to read NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) read 8 bytes | Read NT_ARM_FPMR::fpmr = 0xffff800083963d50
After this patch:
| # ./fpmr-test | Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) wrote 8 bytes | | Attempting to read NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) read 8 bytes | Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Attempting to write NT_ARM_FPMR (zero length) | SETREGSET(nt=0x40e, len=0) wrote 0 bytes | | Attempting to read NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) read 8 bytes | Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d
{ "affected": [], "aliases": [ "CVE-2024-57878" ], "database_specific": { "cwe_ids": [ "CWE-908" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-01-11T15:15:08Z", "severity": "MODERATE" }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: ptrace: fix partial SETREGSET for NT_ARM_FPMR\n\nCurrently fpmr_set() doesn\u0027t initialize the temporary \u0027fpmr\u0027 variable,\nand a SETREGSET call with a length of zero will leave this\nuninitialized. Consequently an arbitrary value will be written back to\ntarget-\u003ethread.uw.fpmr, potentially leaking up to 64 bits of memory from\nthe kernel stack. The read is limited to a specific slot on the stack,\nand the issue does not provide a write mechanism.\n\nFix this by initializing the temporary value before copying the regset\nfrom userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG,\nNT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing\ncontents of FPMR will be retained.\n\nBefore this patch:\n\n| # ./fpmr-test\n| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n| SETREGSET(nt=0x40e, len=8) wrote 8 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n|\n| Attempting to write NT_ARM_FPMR (zero length)\n| SETREGSET(nt=0x40e, len=0) wrote 0 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0xffff800083963d50\n\nAfter this patch:\n\n| # ./fpmr-test\n| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n| SETREGSET(nt=0x40e, len=8) wrote 8 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n|\n| Attempting to write NT_ARM_FPMR (zero length)\n| SETREGSET(nt=0x40e, len=0) wrote 0 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d", "id": "GHSA-w46c-ww47-4hf8", "modified": "2025-02-03T15:32:01Z", "published": "2025-01-11T15:30:30Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57878" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/8ab73c34e3c5b580721696665eabd799346bc50b" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f5d71291841aecfe5d8435da2dfa7f58ccd18bc8" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "type": "CVSS_V3" } ] }
CERTFR-2025-AVI-0254
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Ubuntu 16.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 24.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 18.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 20.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 24.10", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 14.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 22.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-52880", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52880" }, { "name": "CVE-2024-38558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38558" }, { "name": "CVE-2024-53104", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53104" }, { "name": "CVE-2024-53140", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53140" }, { "name": "CVE-2024-53179", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53179" }, { "name": "CVE-2024-56551", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56551" }, { "name": "CVE-2024-56562", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56562" }, { "name": "CVE-2024-56566", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56566" }, { "name": "CVE-2024-56567", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56567" }, { "name": "CVE-2024-56576", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56576" }, { "name": "CVE-2024-56582", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56582" }, { "name": "CVE-2024-56599", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56599" }, { "name": "CVE-2024-56604", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56604" }, { "name": "CVE-2024-56605", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56605" }, { "name": "CVE-2024-56645", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56645" }, { "name": "CVE-2024-56667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56667" }, { "name": "CVE-2024-56570", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56570" }, { "name": "CVE-2024-56575", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56575" }, { "name": "CVE-2024-56598", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56598" }, { "name": "CVE-2024-56619", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56619" }, { "name": "CVE-2024-56631", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56631" }, { "name": "CVE-2024-36476", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36476" }, { "name": "CVE-2024-39282", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39282" }, { "name": "CVE-2024-45828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45828" }, { "name": "CVE-2024-47141", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47141" }, { "name": "CVE-2024-47143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47143" }, { "name": "CVE-2024-47809", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47809" }, { "name": "CVE-2024-48873", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48873" }, { "name": "CVE-2024-48881", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48881" }, { "name": "CVE-2024-49569", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49569" }, { "name": "CVE-2024-50051", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50051" }, { "name": "CVE-2024-52332", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52332" }, { "name": "CVE-2024-53685", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53685" }, { "name": "CVE-2024-53690", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53690" }, { "name": "CVE-2024-54680", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54680" }, { "name": "CVE-2024-55639", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55639" }, { "name": "CVE-2024-55881", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55881" }, { "name": "CVE-2024-55916", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55916" }, { "name": "CVE-2024-56369", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56369" }, { "name": "CVE-2024-56372", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56372" }, { "name": "CVE-2024-56557", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56557" }, { "name": "CVE-2024-56558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56558" }, { "name": "CVE-2024-56568", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56568" }, { "name": "CVE-2024-56569", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56569" }, { "name": "CVE-2024-56572", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56572" }, { "name": "CVE-2024-56573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56573" }, { "name": "CVE-2024-56574", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56574" }, { "name": "CVE-2024-56757", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56757" }, { "name": "CVE-2024-56577", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56577" }, { "name": "CVE-2024-56578", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56578" }, { "name": "CVE-2024-56584", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56584" }, { "name": "CVE-2024-56587", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56587" }, { "name": "CVE-2024-56588", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56588" }, { "name": "CVE-2024-56589", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56589" }, { "name": "CVE-2024-56590", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56590" }, { "name": "CVE-2024-56593", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56593" }, { "name": "CVE-2024-56594", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56594" }, { "name": "CVE-2024-56595", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56595" }, { "name": "CVE-2024-56596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56596" }, { "name": "CVE-2024-56597", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56597" }, { "name": "CVE-2024-56602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56602" }, { "name": "CVE-2024-56603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56603" }, { "name": "CVE-2024-56606", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56606" }, { "name": "CVE-2024-56607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56607" }, { "name": "CVE-2024-56609", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56609" }, { "name": "CVE-2024-56611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56611" }, { "name": "CVE-2024-56614", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56614" }, { "name": "CVE-2024-56615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56615" }, { "name": "CVE-2024-56616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56616" }, { "name": "CVE-2024-56617", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56617" }, { "name": "CVE-2024-56620", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56620" }, { "name": "CVE-2024-56622", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56622" }, { "name": "CVE-2024-56623", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56623" }, { "name": "CVE-2024-56625", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56625" }, { "name": "CVE-2024-56629", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56629" }, { "name": "CVE-2024-56630", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56630" }, { "name": "CVE-2024-56632", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56632" }, { "name": "CVE-2024-56634", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56634" }, { "name": "CVE-2024-56635", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56635" }, { "name": "CVE-2024-56636", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56636" }, { "name": "CVE-2024-56637", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56637" }, { "name": "CVE-2024-56641", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56641" }, { "name": "CVE-2024-56642", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56642" }, { "name": "CVE-2024-56643", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56643" }, { "name": "CVE-2024-56644", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56644" }, { "name": "CVE-2024-56648", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56648" }, { "name": "CVE-2024-56649", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56649" }, { "name": "CVE-2024-56651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56651" }, { "name": "CVE-2024-56654", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56654" }, { "name": "CVE-2024-56656", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56656" }, { "name": "CVE-2024-56659", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56659" }, { "name": "CVE-2024-56660", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56660" }, { "name": "CVE-2024-56662", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56662" }, { "name": "CVE-2024-56663", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56663" }, { "name": "CVE-2024-56664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664" }, { "name": "CVE-2024-56670", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56670" }, { "name": "CVE-2024-56672", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56672" }, { "name": "CVE-2024-56675", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56675" }, { "name": "CVE-2024-56709", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56709" }, { "name": "CVE-2024-56712", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56712" }, { "name": "CVE-2024-56716", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56716" }, { "name": "CVE-2024-56759", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56759" }, { "name": "CVE-2024-56760", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56760" }, { "name": "CVE-2024-56765", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56765" }, { "name": "CVE-2024-56766", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56766" }, { "name": "CVE-2024-56767", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56767" }, { "name": "CVE-2024-56769", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56769" }, { "name": "CVE-2024-56774", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56774" }, { "name": "CVE-2024-56775", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56775" }, { "name": "CVE-2024-56776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56776" }, { "name": "CVE-2024-56777", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56777" }, { "name": "CVE-2024-56778", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56778" }, { "name": "CVE-2024-56779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56779" }, { "name": "CVE-2024-56780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56780" }, { "name": "CVE-2024-56787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56787" }, { "name": "CVE-2024-57791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57791" }, { "name": "CVE-2024-57792", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57792" }, { "name": "CVE-2024-57793", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57793" }, { "name": "CVE-2024-57795", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57795" }, { "name": "CVE-2024-57798", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57798" }, { "name": "CVE-2024-57801", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57801" }, { "name": "CVE-2024-57804", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57804" }, { "name": "CVE-2024-57809", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57809" }, { "name": "CVE-2024-57838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57838" }, { "name": "CVE-2024-57849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57849" }, { "name": "CVE-2024-57850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57850" }, { "name": "CVE-2024-57857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57857" }, { "name": "CVE-2024-57874", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57874" }, { "name": "CVE-2024-57876", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57876" }, { "name": "CVE-2024-57887", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57887" }, { "name": "CVE-2024-57888", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57888" }, { "name": "CVE-2024-57890", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57890" }, { "name": "CVE-2024-57892", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57892" }, { "name": "CVE-2024-57893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57893" }, { "name": "CVE-2024-57896", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57896" }, { "name": "CVE-2024-57897", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57897" }, { "name": "CVE-2024-57899", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57899" }, { "name": "CVE-2024-57903", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57903" }, { "name": "CVE-2024-57904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57904" }, { "name": "CVE-2024-57906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57906" }, { "name": "CVE-2024-57907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57907" }, { "name": "CVE-2024-57908", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57908" }, { "name": "CVE-2024-57910", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57910" }, { "name": "CVE-2024-57911", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57911" }, { "name": "CVE-2024-57912", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57912" }, { "name": "CVE-2024-57913", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57913" }, { "name": "CVE-2024-57916", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57916" }, { "name": "CVE-2024-57926", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57926" }, { "name": "CVE-2024-57929", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57929" }, { "name": "CVE-2024-57932", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57932" }, { "name": "CVE-2024-57933", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57933" }, { "name": "CVE-2024-57935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57935" }, { "name": "CVE-2024-57940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57940" }, { "name": "CVE-2025-21632", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21632" }, { "name": "CVE-2025-21645", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21645" }, { "name": "CVE-2025-21646", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21646" }, { "name": "CVE-2025-21649", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21649" }, { "name": "CVE-2025-21650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21650" }, { "name": "CVE-2025-21651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21651" }, { "name": "CVE-2025-21656", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21656" }, { "name": "CVE-2025-21662", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21662" }, { "name": "CVE-2024-56592", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56592" }, { "name": "CVE-2024-56600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56600" }, { "name": "CVE-2024-56601", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56601" }, { "name": "CVE-2024-56608", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56608" }, { "name": "CVE-2024-56610", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56610" }, { "name": "CVE-2024-56650", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56650" }, { "name": "CVE-2024-56658", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56658" }, { "name": "CVE-2024-56665", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56665" }, { "name": "CVE-2024-56715", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56715" }, { "name": "CVE-2024-56763", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56763" }, { "name": "CVE-2024-57802", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57802" }, { "name": "CVE-2024-57882", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57882" }, { "name": "CVE-2024-57884", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57884" }, { "name": "CVE-2024-57917", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57917" }, { "name": "CVE-2024-57931", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57931" }, { "name": "CVE-2024-57938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57938" }, { "name": "CVE-2024-57946", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57946" }, { "name": "CVE-2025-21652", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21652" }, { "name": "CVE-2025-21653", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21653" }, { "name": "CVE-2025-21655", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21655" }, { "name": "CVE-2025-21663", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21663" }, { "name": "CVE-2025-21664", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21664" }, { "name": "CVE-2024-57925", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57925" }, { "name": "CVE-2024-57939", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57939" }, { "name": "CVE-2025-21631", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21631" }, { "name": "CVE-2025-21636", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21636" }, { "name": "CVE-2025-21637", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21637" }, { "name": "CVE-2025-21638", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21638" }, { "name": "CVE-2025-21639", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21639" }, { "name": "CVE-2025-21640", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21640" }, { "name": "CVE-2025-21647", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21647" }, { "name": "CVE-2025-21648", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21648" }, { "name": "CVE-2025-21660", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21660" }, { "name": "CVE-2024-56633", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56633" }, { "name": "CVE-2025-0927", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0927" }, { "name": "CVE-2024-56579", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56579" }, { "name": "CVE-2024-56647", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56647" }, { "name": "CVE-2024-57889", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57889" }, { "name": "CVE-2024-43098", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43098" }, { "name": "CVE-2024-47408", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47408" }, { "name": "CVE-2024-49571", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49571" }, { "name": "CVE-2024-53680", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53680" }, { "name": "CVE-2024-56581", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56581" }, { "name": "CVE-2024-56586", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56586" }, { "name": "CVE-2024-56626", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56626" }, { "name": "CVE-2024-56627", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56627" }, { "name": "CVE-2024-56640", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56640" }, { "name": "CVE-2024-56717", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56717" }, { "name": "CVE-2024-56718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56718" }, { "name": "CVE-2024-56770", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56770" }, { "name": "CVE-2024-56781", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56781" }, { "name": "CVE-2024-56783", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56783" }, { "name": "CVE-2024-56785", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56785" }, { "name": "CVE-2024-57807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57807" }, { "name": "CVE-2024-57841", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57841" }, { "name": "CVE-2024-57894", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57894" }, { "name": "CVE-2024-57900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57900" }, { "name": "CVE-2024-57901", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57901" }, { "name": "CVE-2024-57902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57902" }, { "name": "CVE-2025-21629", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21629" }, { "name": "CVE-2024-41932", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41932" }, { "name": "CVE-2024-41935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41935" }, { "name": "CVE-2024-47794", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47794" }, { "name": "CVE-2024-48875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48875" }, { "name": "CVE-2024-48876", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48876" }, { "name": "CVE-2024-49568", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49568" }, { "name": "CVE-2024-51729", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51729" }, { "name": "CVE-2024-52319", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52319" }, { "name": "CVE-2024-53681", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53681" }, { "name": "CVE-2024-53682", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53682" }, { "name": "CVE-2024-53687", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53687" }, { "name": "CVE-2024-54191", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54191" }, { "name": "CVE-2024-54193", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54193" }, { "name": "CVE-2024-54455", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54455" }, { "name": "CVE-2024-54460", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54460" }, { "name": "CVE-2024-54683", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54683" }, { "name": "CVE-2024-55641", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55641" }, { "name": "CVE-2024-55642", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55642" }, { "name": "CVE-2024-56368", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56368" }, { "name": "CVE-2024-56550", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56550" }, { "name": "CVE-2024-56552", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56552" }, { "name": "CVE-2024-56559", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56559" }, { "name": "CVE-2024-56561", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56561" }, { "name": "CVE-2024-56563", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56563" }, { "name": "CVE-2024-56564", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56564" }, { "name": "CVE-2024-56565", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56565" }, { "name": "CVE-2024-56580", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56580" }, { "name": "CVE-2024-56583", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56583" }, { "name": "CVE-2024-56591", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56591" }, { "name": "CVE-2024-56613", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56613" }, { "name": "CVE-2024-56618", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56618" }, { "name": "CVE-2024-56621", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56621" }, { "name": "CVE-2024-56624", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56624" }, { "name": "CVE-2024-56638", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56638" }, { "name": "CVE-2024-56639", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56639" }, { "name": "CVE-2024-56646", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56646" }, { "name": "CVE-2024-56652", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56652" }, { "name": "CVE-2024-56653", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56653" }, { "name": "CVE-2024-56655", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56655" }, { "name": "CVE-2024-56657", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56657" }, { "name": "CVE-2024-56669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56669" }, { "name": "CVE-2024-56671", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56671" }, { "name": "CVE-2024-56673", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56673" }, { "name": "CVE-2024-56710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56710" }, { "name": "CVE-2024-56711", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56711" }, { "name": "CVE-2024-56713", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56713" }, { "name": "CVE-2024-56714", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56714" }, { "name": "CVE-2024-56719", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56719" }, { "name": "CVE-2024-56758", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56758" }, { "name": "CVE-2024-56761", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56761" }, { "name": "CVE-2024-56764", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56764" }, { "name": "CVE-2024-56768", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56768" }, { "name": "CVE-2024-56771", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56771" }, { "name": "CVE-2024-56772", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56772" }, { "name": "CVE-2024-56773", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56773" }, { "name": "CVE-2024-56782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56782" }, { "name": "CVE-2024-56784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56784" }, { "name": "CVE-2024-56786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56786" }, { "name": "CVE-2024-57799", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57799" }, { "name": "CVE-2024-57805", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57805" }, { "name": "CVE-2024-57806", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57806" }, { "name": "CVE-2024-57839", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57839" }, { "name": "CVE-2024-57843", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57843" }, { "name": "CVE-2024-57872", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57872" }, { "name": "CVE-2024-57875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57875" }, { "name": "CVE-2024-57878", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57878" }, { "name": "CVE-2024-57879", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57879" }, { "name": "CVE-2024-57880", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57880" }, { "name": "CVE-2024-57881", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57881" }, { "name": "CVE-2024-57883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57883" }, { "name": "CVE-2024-57885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57885" }, { "name": "CVE-2024-57886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57886" }, { "name": "CVE-2024-57895", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57895" }, { "name": "CVE-2024-57898", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57898" }, { "name": "CVE-2024-57905", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57905" }, { "name": "CVE-2024-57918", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57918" }, { "name": "CVE-2024-57919", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57919" }, { "name": "CVE-2024-57921", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57921" }, { "name": "CVE-2024-57924", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57924" }, { "name": "CVE-2024-57934", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57934" }, { "name": "CVE-2024-57944", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57944" }, { "name": "CVE-2024-57945", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57945" }, { "name": "CVE-2024-58087", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58087" }, { "name": "CVE-2025-21633", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21633" }, { "name": "CVE-2025-21634", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21634" }, { "name": "CVE-2025-21635", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21635" }, { "name": "CVE-2025-21642", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21642" }, { "name": "CVE-2025-21643", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21643" }, { "name": "CVE-2025-21644", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21644" }, { "name": "CVE-2025-21654", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21654" }, { "name": "CVE-2025-21658", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21658" }, { "name": "CVE-2025-21659", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21659" }, { "name": "CVE-2025-21661", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21661" }, { "name": "CVE-2025-21834", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21834" } ], "initial_release_date": "2025-03-28T00:00:00", "last_revision_date": "2025-03-28T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0254", "revisions": [ { "description": "Version initiale", "revision_date": "2025-03-28T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu", "vendor_advisories": [ { "published_at": "2025-03-26", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0110-1", "url": "https://ubuntu.com/security/notices/LSN-0110-1" }, { "published_at": "2025-03-27", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7382-1", "url": "https://ubuntu.com/security/notices/USN-7382-1" }, { "published_at": "2025-03-27", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7380-1", "url": "https://ubuntu.com/security/notices/USN-7380-1" }, { "published_at": "2025-03-27", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7379-1", "url": "https://ubuntu.com/security/notices/USN-7379-1" }, { "published_at": "2025-03-27", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7381-1", "url": "https://ubuntu.com/security/notices/USN-7381-1" } ] }
wid-sec-w-2025-0047
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und weitere nicht spezifizierte Angriffe zu starten.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0047 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0047.json" }, { "category": "self", "summary": "WID-SEC-2025-0047 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0047" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-41149", "url": "https://lore.kernel.org/linux-cve-announce/2025011141-CVE-2024-41149-7e9b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-41932", "url": "https://lore.kernel.org/linux-cve-announce/2025011116-CVE-2024-41932-ed84@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-41935", "url": "https://lore.kernel.org/linux-cve-announce/2025011118-CVE-2024-41935-e11d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-43098", "url": "https://lore.kernel.org/linux-cve-announce/2025011118-CVE-2024-43098-e732@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-45828", "url": "https://lore.kernel.org/linux-cve-announce/2025011119-CVE-2024-45828-8cbd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46896", "url": "https://lore.kernel.org/linux-cve-announce/2025011141-CVE-2024-46896-8e7c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47141", "url": "https://lore.kernel.org/linux-cve-announce/2025011119-CVE-2024-47141-13f5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47143", "url": "https://lore.kernel.org/linux-cve-announce/2025011119-CVE-2024-47143-37ba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47408", "url": "https://lore.kernel.org/linux-cve-announce/2025011141-CVE-2024-47408-e686@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47794", "url": "https://lore.kernel.org/linux-cve-announce/2025011120-CVE-2024-47794-09e9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47809", "url": "https://lore.kernel.org/linux-cve-announce/2025011120-CVE-2024-47809-7b40@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-48873", "url": "https://lore.kernel.org/linux-cve-announce/2025011120-CVE-2024-48873-75a9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-48875", "url": "https://lore.kernel.org/linux-cve-announce/2025011121-CVE-2024-48875-5b79@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-48876", "url": "https://lore.kernel.org/linux-cve-announce/2025011121-CVE-2024-48876-da61@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-48881", "url": "https://lore.kernel.org/linux-cve-announce/2025011121-CVE-2024-48881-c4e5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49568", "url": "https://lore.kernel.org/linux-cve-announce/2025011142-CVE-2024-49568-e5f6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49569", "url": "https://lore.kernel.org/linux-cve-announce/2025011122-CVE-2024-49569-c532@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49571", "url": "https://lore.kernel.org/linux-cve-announce/2025011142-CVE-2024-49571-c86d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49573", "url": "https://lore.kernel.org/linux-cve-announce/2025011142-CVE-2024-49573-fa46@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50051", "url": "https://lore.kernel.org/linux-cve-announce/2025011122-CVE-2024-50051-d822@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-51729", "url": "https://lore.kernel.org/linux-cve-announce/2025011143-CVE-2024-51729-799d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-52319", "url": "https://lore.kernel.org/linux-cve-announce/2025011143-CVE-2024-52319-61ca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-52332", "url": "https://lore.kernel.org/linux-cve-announce/2025011122-CVE-2024-52332-9d2f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53680", "url": "https://lore.kernel.org/linux-cve-announce/2025011123-CVE-2024-53680-88d4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53682", "url": "https://lore.kernel.org/linux-cve-announce/2025011157-CVE-2024-53682-263d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53685", "url": "https://lore.kernel.org/linux-cve-announce/2025011143-CVE-2024-53685-e6c3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53687", "url": "https://lore.kernel.org/linux-cve-announce/2025011157-CVE-2024-53687-5f05@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53689", "url": "https://lore.kernel.org/linux-cve-announce/2025011158-CVE-2024-53689-c526@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53690", "url": "https://lore.kernel.org/linux-cve-announce/2025011144-CVE-2024-53690-8ad8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54191", "url": "https://lore.kernel.org/linux-cve-announce/2025011158-CVE-2024-54191-eeef@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54193", "url": "https://lore.kernel.org/linux-cve-announce/2025011144-CVE-2024-54193-9ce6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54455", "url": "https://lore.kernel.org/linux-cve-announce/2025011145-CVE-2024-54455-0e8e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54460", "url": "https://lore.kernel.org/linux-cve-announce/2025011158-CVE-2024-54460-c8c8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54680", "url": "https://lore.kernel.org/linux-cve-announce/2025011145-CVE-2024-54680-db98@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54683", "url": "https://lore.kernel.org/linux-cve-announce/2025011159-CVE-2024-54683-042e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-55639", "url": "https://lore.kernel.org/linux-cve-announce/2025011159-CVE-2024-55639-b3d2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-55641", "url": "https://lore.kernel.org/linux-cve-announce/2025011159-CVE-2024-55641-fa58@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-55642", "url": "https://lore.kernel.org/linux-cve-announce/2025011100-CVE-2024-55642-29a8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-55881", "url": "https://lore.kernel.org/linux-cve-announce/2025011145-CVE-2024-55881-ad68@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-55916", "url": "https://lore.kernel.org/linux-cve-announce/2025011146-CVE-2024-55916-3a1f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56368", "url": "https://lore.kernel.org/linux-cve-announce/2025011146-CVE-2024-56368-e3cd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56369", "url": "https://lore.kernel.org/linux-cve-announce/2025011146-CVE-2024-56369-be56@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56372", "url": "https://lore.kernel.org/linux-cve-announce/2025011147-CVE-2024-56372-99e3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56788", "url": "https://lore.kernel.org/linux-cve-announce/2025011147-CVE-2024-56788-7a74@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57791", "url": "https://lore.kernel.org/linux-cve-announce/2025011147-CVE-2024-57791-7bc8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57792", "url": "https://lore.kernel.org/linux-cve-announce/2025011150-CVE-2024-57792-0002@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57793", "url": "https://lore.kernel.org/linux-cve-announce/2025011150-CVE-2024-57793-4d57@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57798", "url": "https://lore.kernel.org/linux-cve-announce/2025011151-CVE-2024-57798-68b5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57799", "url": "https://lore.kernel.org/linux-cve-announce/2025011151-CVE-2024-57799-ae66@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57800", "url": "https://lore.kernel.org/linux-cve-announce/2025011152-CVE-2024-57800-699a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57804", "url": "https://lore.kernel.org/linux-cve-announce/2025011152-CVE-2024-57804-4bad@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57805", "url": "https://lore.kernel.org/linux-cve-announce/2025011152-CVE-2024-57805-fbae@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57806", "url": "https://lore.kernel.org/linux-cve-announce/2025011153-CVE-2024-57806-0afb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57807", "url": "https://lore.kernel.org/linux-cve-announce/2025011153-CVE-2024-57807-b595@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57809", "url": "https://lore.kernel.org/linux-cve-announce/2025011103-CVE-2024-57809-a6be@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57838", "url": "https://lore.kernel.org/linux-cve-announce/2025011105-CVE-2024-57838-4111@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57839", "url": "https://lore.kernel.org/linux-cve-announce/2025011101-CVE-2024-57839-daf6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57843", "url": "https://lore.kernel.org/linux-cve-announce/2025011103-CVE-2024-57843-1c15@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57849", "url": "https://lore.kernel.org/linux-cve-announce/2025011103-CVE-2024-57849-64db@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57850", "url": "https://lore.kernel.org/linux-cve-announce/2025011104-CVE-2024-57850-7e8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57872", "url": "https://lore.kernel.org/linux-cve-announce/2025011104-CVE-2024-57872-28ee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57874", "url": "https://lore.kernel.org/linux-cve-announce/2025011113-CVE-2024-57874-539d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57875", "url": "https://lore.kernel.org/linux-cve-announce/2025011107-CVE-2024-57875-7902@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57876", "url": "https://lore.kernel.org/linux-cve-announce/2025011107-CVE-2024-57876-1d02@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57877", "url": "https://lore.kernel.org/linux-cve-announce/2025011108-CVE-2024-57877-ee49@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57878", "url": "https://lore.kernel.org/linux-cve-announce/2025011108-CVE-2024-57878-465c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57879", "url": "https://lore.kernel.org/linux-cve-announce/2025011131-CVE-2024-57879-7fa8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57880", "url": "https://lore.kernel.org/linux-cve-announce/2025011134-CVE-2024-57880-c009@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57881", "url": "https://lore.kernel.org/linux-cve-announce/2025011146-CVE-2024-57881-7516@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23124", "url": "https://lore.kernel.org/linux-cve-announce/2025011104-CVE-2025-23124-6e63@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23125", "url": "https://lore.kernel.org/linux-cve-announce/2025011105-CVE-2025-23125-069a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23126", "url": "https://lore.kernel.org/linux-cve-announce/2025011105-CVE-2025-23126-4c4f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23127", "url": "https://lore.kernel.org/linux-cve-announce/2025011105-CVE-2025-23127-2b8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23128", "url": "https://lore.kernel.org/linux-cve-announce/2025011106-CVE-2025-23128-2d6e@gregkh/#t" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5860 vom 2025-02-08", "url": "https://lists.debian.org/debian-security-announce/2025/msg00023.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0428-1 vom 2025-02-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0499-1 vom 2025-02-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0517-1 vom 2025-02-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0557-1 vom 2025-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0555-1 vom 2025-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0556-1 vom 2025-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0577-1 vom 2025-02-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0576-1 vom 2025-02-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0517-2 vom 2025-02-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0603-1 vom 2025-02-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4075 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4076 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0771-1 vom 2025-03-03", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6X627UISONPV7CQLLHUDVJCDEIODQO4O/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2474 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2474" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2473 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2473" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-2473 vom 2025-03-11", "url": "https://linux.oracle.com/errata/ELSA-2025-2473.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20152 vom 2025-03-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20152.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0577-2 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-082 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-082.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0867-1 vom 2025-03-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2710 vom 2025-03-20", "url": "https://access.redhat.com/errata/RHSA-2025:2710" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7387-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7382-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7382-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7381-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7381-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7379-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7379-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7380-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7380-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7391-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7393-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7392-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7392-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7392-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7379-2 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7379-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7392-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7401-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7402-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7403-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7403-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-2 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7402-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7407-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7406-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-2 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7406-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-3 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7406-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7413-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-4 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7406-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-3 vom 2025-04-04", "url": "https://ubuntu.com/security/notices/USN-7402-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7421-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-4 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7402-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7420-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7420-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-6 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7406-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-5 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7406-5" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0111-1 vom 2025-04-16", "url": "https://ubuntu.com/security/notices/LSN-0111-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-5 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7402-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7453-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7452-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7449-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7450-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7451-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7449-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7458-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7463-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7459-1" }, { "category": "external", "summary": "IBM Security Bulletin 7231915 vom 2025-04-26", "url": "https://www.ibm.com/support/pages/node/7231915" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7459-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7468-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7475-1 vom 2025-05-02", "url": "https://ubuntu.com/security/notices/USN-7475-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7514-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7513-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7515-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7513-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7513-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7515-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7522-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7523-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7524-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8248 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8248" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-4 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7513-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-5 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7513-5" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0112-1 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/LSN-0112-1" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30", "url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06", "url": "https://ubuntu.com/security/notices/USN-7553-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0113-1 vom 2025-07-10", "url": "https://ubuntu.com/security/notices/LSN-0113-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02387-1 vom 2025-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021861.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20480 vom 2025-07-18", "url": "https://linux.oracle.com/errata/ELSA-2025-20480.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02388-1 vom 2025-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021860.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02389-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021882.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02411-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DEKG43SVEEUNQXJBCRXWGSWJ6NQ36NUC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02412-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021866.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02390-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021881.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02403-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXLF63OLKSA5LWF3BYMVRASA55GHVYJY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02413-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021865.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02410-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7JYI4RKW2E7EB4ZJ6UB45TTF2H6PEYR/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02420-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021886.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02449-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOIECZ42HAJGKZ7TVGI4LLLNAG27ZF7L/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02433-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021883.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02421-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021885.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02437-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCEZBA2U7C5F2MCQC3AIBIKAHNQBPFOI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02440-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON72ZMOEO6E3K3KZFRVFHX5LUYA6RAXJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02459-1 vom 2025-07-22", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNBGONL5CBCKJ2ZQN6XVJFDFNJMHMLDW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20519-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022032.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20518-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022033.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20517-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022034.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20525-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022027.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20526-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022026.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20527-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20540-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022104.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20541-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022103.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20544-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20545-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022099.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-12752 vom 2025-08-07", "url": "http://linux.oracle.com/errata/ELSA-2025-12752.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-1 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-2 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-3 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7727-3" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10", "url": "https://linux.oracle.com/errata/ELSA-2025-20553.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7755-1 vom 2025-09-17", "url": "https://ubuntu.com/security/notices/USN-7755-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7755-2 vom 2025-09-17", "url": "https://ubuntu.com/security/notices/USN-7755-2" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-09-17T22:00:00.000+00:00", "generator": { "date": "2025-09-18T07:17:09.754+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0047", "initial_release_date": "2025-01-12T23:00:00.000+00:00", "revision_history": [ { "date": "2025-01-12T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-01-26T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-09T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-02-11T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-16T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-17T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-20T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-09T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-10T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-13T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-16T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-19T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-02T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-06T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-07T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-15T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-16T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-22T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-23T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-27T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-01T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-05T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-19T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "53", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "56", "summary": "Referenz(en) aufgenommen:" }, { "date": "2025-08-03T22:00:00.000+00:00", "number": "57", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "58", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-06T22:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-19T22:00:00.000+00:00", "number": "60", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-28T22:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-09T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-09-17T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "64" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Avamar", "product": { "name": "Dell Avamar", "product_id": "T039664", "product_identification_helper": { "cpe": "cpe:/a:dell:avamar:-" } } }, { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP11 IF04", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04", "product_id": "T043169" } }, { "category": "product_version", "name": "7.5.0 UP11 IF04", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11 IF04", "product_id": "T043169-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T046484", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "Container Platform \u003c4.14.49", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.49", "product_id": "T042010" } }, { "category": "product_version", "name": "Container Platform 4.14.49", "product": { "name": "Red Hat OpenShift Container Platform 4.14.49", "product_id": "T042010-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.49" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-41149", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-41149" }, { "cve": "CVE-2024-41932", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-41932" }, { "cve": "CVE-2024-41935", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-41935" }, { "cve": "CVE-2024-43098", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-43098" }, { "cve": "CVE-2024-45828", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-45828" }, { "cve": "CVE-2024-46896", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-46896" }, { "cve": "CVE-2024-47141", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47141" }, { "cve": "CVE-2024-47143", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47143" }, { "cve": "CVE-2024-47408", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47408" }, { "cve": "CVE-2024-47794", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47794" }, { "cve": "CVE-2024-47809", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-47809" }, { "cve": "CVE-2024-48873", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-48873" }, { "cve": "CVE-2024-48875", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-48875" }, { "cve": "CVE-2024-48876", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-48876" }, { "cve": "CVE-2024-48881", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-48881" }, { "cve": "CVE-2024-49568", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-49568" }, { "cve": "CVE-2024-49569", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-49569" }, { "cve": "CVE-2024-49571", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-49571" }, { "cve": "CVE-2024-49573", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-49573" }, { "cve": "CVE-2024-50051", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-50051" }, { "cve": "CVE-2024-51729", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-51729" }, { "cve": "CVE-2024-52319", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-52319" }, { "cve": "CVE-2024-52332", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-52332" }, { "cve": "CVE-2024-53680", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53680" }, { "cve": "CVE-2024-53682", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53682" }, { "cve": "CVE-2024-53685", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53685" }, { "cve": "CVE-2024-53687", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53687" }, { "cve": "CVE-2024-53689", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53689" }, { "cve": "CVE-2024-53690", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-53690" }, { "cve": "CVE-2024-54191", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54191" }, { "cve": "CVE-2024-54193", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54193" }, { "cve": "CVE-2024-54455", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54455" }, { "cve": "CVE-2024-54460", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54460" }, { "cve": "CVE-2024-54680", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54680" }, { "cve": "CVE-2024-54683", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-54683" }, { "cve": "CVE-2024-55639", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-55639" }, { "cve": "CVE-2024-55641", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-55641" }, { "cve": "CVE-2024-55642", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-55642" }, { "cve": "CVE-2024-55881", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-55881" }, { "cve": "CVE-2024-55916", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-55916" }, { "cve": "CVE-2024-56368", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-56368" }, { "cve": "CVE-2024-56369", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-56369" }, { "cve": "CVE-2024-56372", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-56372" }, { "cve": "CVE-2024-56788", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-56788" }, { "cve": "CVE-2024-57791", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57791" }, { "cve": "CVE-2024-57792", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57792" }, { "cve": "CVE-2024-57793", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57793" }, { "cve": "CVE-2024-57798", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57798" }, { "cve": "CVE-2024-57799", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57799" }, { "cve": "CVE-2024-57800", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57800" }, { "cve": "CVE-2024-57804", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57804" }, { "cve": "CVE-2024-57805", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57805" }, { "cve": "CVE-2024-57806", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57806" }, { "cve": "CVE-2024-57807", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57807" }, { "cve": "CVE-2024-57809", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57809" }, { "cve": "CVE-2024-57838", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57838" }, { "cve": "CVE-2024-57839", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57839" }, { "cve": "CVE-2024-57843", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57843" }, { "cve": "CVE-2024-57849", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57849" }, { "cve": "CVE-2024-57850", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57850" }, { "cve": "CVE-2024-57872", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57872" }, { "cve": "CVE-2024-57874", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57874" }, { "cve": "CVE-2024-57875", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57875" }, { "cve": "CVE-2024-57876", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57876" }, { "cve": "CVE-2024-57877", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57877" }, { "cve": "CVE-2024-57878", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57878" }, { "cve": "CVE-2024-57879", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57879" }, { "cve": "CVE-2024-57880", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57880" }, { "cve": "CVE-2024-57881", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2024-57881" }, { "cve": "CVE-2025-23124", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2025-23124" }, { "cve": "CVE-2025-23125", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2025-23125" }, { "cve": "CVE-2025-23126", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2025-23126" }, { "cve": "CVE-2025-23127", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2025-23127" }, { "cve": "CVE-2025-23128", "product_status": { "known_affected": [ "T043169", "2951", "T002207", "67646", "T000126", "T034583", "T046484", "398363", "T004914", "T042010", "T039664" ] }, "release_date": "2025-01-12T23:00:00.000+00:00", "title": "CVE-2025-23128" } ] }
fkie_cve-2024-57878
Vulnerability from fkie_nvd
6.1 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | 6.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF8BDA69-3016-4248-8055-EA7662336040", "versionEndExcluding": "6.12.5", "versionStartIncluding": "6.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: ptrace: fix partial SETREGSET for NT_ARM_FPMR\n\nCurrently fpmr_set() doesn\u0027t initialize the temporary \u0027fpmr\u0027 variable,\nand a SETREGSET call with a length of zero will leave this\nuninitialized. Consequently an arbitrary value will be written back to\ntarget-\u003ethread.uw.fpmr, potentially leaking up to 64 bits of memory from\nthe kernel stack. The read is limited to a specific slot on the stack,\nand the issue does not provide a write mechanism.\n\nFix this by initializing the temporary value before copying the regset\nfrom userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG,\nNT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing\ncontents of FPMR will be retained.\n\nBefore this patch:\n\n| # ./fpmr-test\n| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n| SETREGSET(nt=0x40e, len=8) wrote 8 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n|\n| Attempting to write NT_ARM_FPMR (zero length)\n| SETREGSET(nt=0x40e, len=0) wrote 0 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0xffff800083963d50\n\nAfter this patch:\n\n| # ./fpmr-test\n| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n| SETREGSET(nt=0x40e, len=8) wrote 8 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n|\n| Attempting to write NT_ARM_FPMR (zero length)\n| SETREGSET(nt=0x40e, len=0) wrote 0 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d" }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: correcci\u00f3n de SETREGSET parcial para NT_ARM_FPMR Actualmente, fpmr_set() no inicializa la variable temporal \u0027fpmr\u0027, y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, se volver\u00e1 a escribir un valor arbitrario en target-\u0026gt;thread.uw.fpmr, lo que podr\u00eda provocar una p\u00e9rdida de hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Corrija esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1n los contenidos existentes de FPMR. Antes de este parche: | # ./fpmr-test | Intentando escribir NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Le\u00eddo NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Intentando escribir NT_ARM_FPMR (longitud cero) | SETREGSET(nt=0x40e, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Leer NT_ARM_FPMR::fpmr = 0xffff800083963d50 Despu\u00e9s de este parche: | # ./fpmr-test | Intentando escribir NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Leer NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Intentando escribir NT_ARM_FPMR (longitud cero) | SETREGSET(nt=0x40e, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) leer 8 bytes | Leer NT_ARM_FPMR::fpmr = 0x900d900d900d900d" } ], "id": "CVE-2024-57878", "lastModified": "2025-10-01T20:17:59.500", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-01-11T15:15:08.190", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/8ab73c34e3c5b580721696665eabd799346bc50b" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/f5d71291841aecfe5d8435da2dfa7f58ccd18bc8" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-908" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-908" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.