Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-46801 (GCVE-0-2024-46801)
Vulnerability from cvelistv5 – Published: 2024-09-18 07:12 – Updated: 2025-05-04 09:34
VLAI?
EPSS
Title
libfs: fix get_stashed_dentry()
Summary
In the Linux kernel, the following vulnerability has been resolved:
libfs: fix get_stashed_dentry()
get_stashed_dentry() tries to optimistically retrieve a stashed dentry
from a provided location. It needs to ensure to hold rcu lock before it
dereference the stashed location to prevent UAF issues. Use
rcu_dereference() instead of READ_ONCE() it's effectively equivalent
with some lockdep bells and whistles and it communicates clearly that
this expects rcu protection.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-46801",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-29T14:21:32.435301Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-29T14:21:44.290Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/libfs.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "03e2a1209a83a380df34a72f7d6d1bc6c74132c7",
"status": "affected",
"version": "07fd7c329839cf0b8c7766883d830a1a0d12d1dd",
"versionType": "git"
},
{
"lessThan": "4e32c25b58b945f976435bbe51f39b32d714052e",
"status": "affected",
"version": "07fd7c329839cf0b8c7766883d830a1a0d12d1dd",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/libfs.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.9"
},
{
"lessThan": "6.9",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.10.*",
"status": "unaffected",
"version": "6.10.10",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.11",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.10.10",
"versionStartIncluding": "6.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.11",
"versionStartIncluding": "6.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibfs: fix get_stashed_dentry()\n\nget_stashed_dentry() tries to optimistically retrieve a stashed dentry\nfrom a provided location. It needs to ensure to hold rcu lock before it\ndereference the stashed location to prevent UAF issues. Use\nrcu_dereference() instead of READ_ONCE() it\u0027s effectively equivalent\nwith some lockdep bells and whistles and it communicates clearly that\nthis expects rcu protection."
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T09:34:39.031Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/03e2a1209a83a380df34a72f7d6d1bc6c74132c7"
},
{
"url": "https://git.kernel.org/stable/c/4e32c25b58b945f976435bbe51f39b32d714052e"
}
],
"title": "libfs: fix get_stashed_dentry()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2024-46801",
"datePublished": "2024-09-18T07:12:55.150Z",
"dateReserved": "2024-09-11T15:12:18.280Z",
"dateUpdated": "2025-05-04T09:34:39.031Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.9\", \"versionEndExcluding\": \"6.10.10\", \"matchCriteriaId\": \"2CB7114B-59C6-4708-AE2C-B7C2D0BA0FA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B3CE743-2126-47A3-8B7C-822B502CF119\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DEB27E7-30AA-45CC-8934-B89263EF3551\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0005AEF-856E-47EB-BFE4-90C46899394D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"39889A68-6D34-47A6-82FC-CD0BF23D6754\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8383ABF-1457-401F-9B61-EE50F4C61F4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"B77A9280-37E6-49AD-B559-5B23A3B1DC3D\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nlibfs: fix get_stashed_dentry()\\n\\nget_stashed_dentry() tries to optimistically retrieve a stashed dentry\\nfrom a provided location. It needs to ensure to hold rcu lock before it\\ndereference the stashed location to prevent UAF issues. Use\\nrcu_dereference() instead of READ_ONCE() it\u0027s effectively equivalent\\nwith some lockdep bells and whistles and it communicates clearly that\\nthis expects rcu protection.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: libfs: fix get_stashed_dentry() get_stashed_dentry() intenta recuperar de forma optimista un dentry almacenado en cach\\u00e9 desde una ubicaci\\u00f3n proporcionada. Debe asegurarse de mantener el bloqueo de rcu antes de desreferenciar la ubicaci\\u00f3n almacenada para evitar problemas de UAF. Use rcu_dereference() en lugar de READ_ONCE(), es efectivamente equivalente con algunas funciones adicionales de lockdep y comunica claramente que esto espera protecci\\u00f3n de rcu.\"}]",
"id": "CVE-2024-46801",
"lastModified": "2024-09-20T17:18:17.810",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2024-09-18T08:15:06.633",
"references": "[{\"url\": \"https://git.kernel.org/stable/c/03e2a1209a83a380df34a72f7d6d1bc6c74132c7\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/4e32c25b58b945f976435bbe51f39b32d714052e\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}]",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-46801\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-09-18T08:15:06.633\",\"lastModified\":\"2024-09-20T17:18:17.810\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nlibfs: fix get_stashed_dentry()\\n\\nget_stashed_dentry() tries to optimistically retrieve a stashed dentry\\nfrom a provided location. It needs to ensure to hold rcu lock before it\\ndereference the stashed location to prevent UAF issues. Use\\nrcu_dereference() instead of READ_ONCE() it\u0027s effectively equivalent\\nwith some lockdep bells and whistles and it communicates clearly that\\nthis expects rcu protection.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: libfs: fix get_stashed_dentry() get_stashed_dentry() intenta recuperar de forma optimista un dentry almacenado en cach\u00e9 desde una ubicaci\u00f3n proporcionada. Debe asegurarse de mantener el bloqueo de rcu antes de desreferenciar la ubicaci\u00f3n almacenada para evitar problemas de UAF. Use rcu_dereference() en lugar de READ_ONCE(), es efectivamente equivalente con algunas funciones adicionales de lockdep y comunica claramente que esto espera protecci\u00f3n de rcu.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.9\",\"versionEndExcluding\":\"6.10.10\",\"matchCriteriaId\":\"2CB7114B-59C6-4708-AE2C-B7C2D0BA0FA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3CE743-2126-47A3-8B7C-822B502CF119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEB27E7-30AA-45CC-8934-B89263EF3551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0005AEF-856E-47EB-BFE4-90C46899394D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"39889A68-6D34-47A6-82FC-CD0BF23D6754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8383ABF-1457-401F-9B61-EE50F4C61F4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B77A9280-37E6-49AD-B559-5B23A3B1DC3D\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/03e2a1209a83a380df34a72f7d6d1bc6c74132c7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4e32c25b58b945f976435bbe51f39b32d714052e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-46801\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-29T14:21:32.435301Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-29T14:21:33.587Z\"}}], \"cna\": {\"title\": \"libfs: fix get_stashed_dentry()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"07fd7c329839cf0b8c7766883d830a1a0d12d1dd\", \"lessThan\": \"03e2a1209a83a380df34a72f7d6d1bc6c74132c7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"07fd7c329839cf0b8c7766883d830a1a0d12d1dd\", \"lessThan\": \"4e32c25b58b945f976435bbe51f39b32d714052e\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/libfs.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.9\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.9\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.10.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/libfs.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/03e2a1209a83a380df34a72f7d6d1bc6c74132c7\"}, {\"url\": \"https://git.kernel.org/stable/c/4e32c25b58b945f976435bbe51f39b32d714052e\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nlibfs: fix get_stashed_dentry()\\n\\nget_stashed_dentry() tries to optimistically retrieve a stashed dentry\\nfrom a provided location. It needs to ensure to hold rcu lock before it\\ndereference the stashed location to prevent UAF issues. Use\\nrcu_dereference() instead of READ_ONCE() it\u0027s effectively equivalent\\nwith some lockdep bells and whistles and it communicates clearly that\\nthis expects rcu protection.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10.10\", \"versionStartIncluding\": \"6.9\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11\", \"versionStartIncluding\": \"6.9\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:34:39.031Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-46801\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:34:39.031Z\", \"dateReserved\": \"2024-09-11T15:12:18.280Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-18T07:12:55.150Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
BDU:2025-03583
Vulnerability from fstec - Published: 06.09.2024
VLAI Severity ?
Title
Уязвимость функции simple_inode_init_ts() файловой системы ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость функции simple_inode_init_ts() файловой системы ядра операционной системы Linux связана с повторным использованием ранее освобожденной памяти. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Severity ?
Vendor
Сообщество свободного программного обеспечения
Software Name
Linux
Software Version
от 6.9 до 6.10.9 включительно (Linux)
Possible Mitigations
Использование рекомендаций:
Для Linux:
https://git.kernel.org/stable/c/03e2a1209a83a380df34a72f7d6d1bc6c74132c7
https://lore.kernel.org/linux-cve-announce/2024091857-CVE-2024-46801-3cb7@gregkh/
https://git.kernel.org/linus/4e32c25b58b945f976435bbe51f39b32d714052e
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.10
Компенсирующие меры:
В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Reference
https://git.kernel.org/stable/c/03e2a1209a83a380df34a72f7d6d1bc6c74132c7
https://www.cve.org/CVERecord?id=CVE-2024-46801
https://lore.kernel.org/linux-cve-announce/2024091857-CVE-2024-46801-3cb7@gregkh/
https://git.kernel.org/linus/4e32c25b58b945f976435bbe51f39b32d714052e
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.10
CWE
CWE-416
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 6.9 \u0434\u043e 6.10.9 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/stable/c/03e2a1209a83a380df34a72f7d6d1bc6c74132c7\nhttps://lore.kernel.org/linux-cve-announce/2024091857-CVE-2024-46801-3cb7@gregkh/\nhttps://git.kernel.org/linus/4e32c25b58b945f976435bbe51f39b32d714052e\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.10\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "06.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "01.04.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "01.04.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-03583",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-46801",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.9 \u0434\u043e 6.10.9 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 simple_inode_init_ts() \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 simple_inode_init_ts() \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u044b\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0440\u0430\u043d\u0435\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u043d\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.kernel.org/stable/c/03e2a1209a83a380df34a72f7d6d1bc6c74132c7\nhttps://www.cve.org/CVERecord?id=CVE-2024-46801\nhttps://lore.kernel.org/linux-cve-announce/2024091857-CVE-2024-46801-3cb7@gregkh/\nhttps://git.kernel.org/linus/4e32c25b58b945f976435bbe51f39b32d714052e\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.10",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
WID-SEC-W-2024-2173
Vulnerability from csaf_certbund - Published: 2024-09-17 22:00 - Updated: 2026-01-19 23:00Summary
Linux Kernel: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff: Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen oder einen unspezifischen Angriff durchzuführen.
Betroffene Betriebssysteme: - Linux
References
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder einen unspezifischen Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-2173 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2173.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-2173 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2173"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement vom 2024-09-17",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-070 vom 2024-10-02",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-070.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-071 vom 2024-10-02",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-071.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0013 vom 2024-10-03",
"url": "https://oss.oracle.com/pipermail/el-errata/2024-October/016481.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-086 vom 2024-10-02",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-086.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5782 vom 2024-10-03",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-055 vom 2024-10-02",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-055.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3912 vom 2024-10-07",
"url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3563-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3567-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3565-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3585-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019586.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3587-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12782 vom 2024-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-12782.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-12779.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7088-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04",
"url": "https://ubuntu.com/security/notices/USN-7088-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06",
"url": "https://ubuntu.com/security/notices/USN-7088-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11",
"url": "https://ubuntu.com/security/notices/USN-7100-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12813.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7100-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12815.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7088-5"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2695 vom 2024-11-15",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2695.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2696 vom 2024-11-15",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2696.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7120-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7120-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7119-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7120-2 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7120-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7123-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7120-3 vom 2024-11-21",
"url": "https://ubuntu.com/security/notices/USN-7120-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25",
"url": "https://ubuntu.com/security/notices/USN-7121-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09",
"url": "https://linux.oracle.com/errata/ELSA-2024-12868.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09",
"url": "https://ubuntu.com/security/notices/USN-7144-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10",
"url": "https://ubuntu.com/security/notices/USN-7148-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7159-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7156-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7155-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7154-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17",
"url": "https://linux.oracle.com/errata/ELSA-2024-12884.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7166-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7159-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7159-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-4 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7159-4"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4008 vom 2025-01-03",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-5 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7159-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7154-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7196-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7195-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7194-1"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2024-062 vom 2025-01-10",
"url": "https://cloud.google.com/kubernetes-engine/security-bulletins#gcp-2025-002-gke"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20018 vom 2025-01-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20018.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14",
"url": "https://ubuntu.com/security/notices/USN-7195-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7181933 vom 2025-01-29",
"url": "https://www.ibm.com/support/pages/node/7181933"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7294-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7295-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7294-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7294-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03",
"url": "https://ubuntu.com/security/notices/USN-7294-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7387-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7388-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7390-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7393-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7389-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7401-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7407-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7413-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7421-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7458-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7459-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5907 vom 2025-04-27",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00069.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7459-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-4341 vom 2025-05-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-4341.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13",
"url": "https://ubuntu.com/security/notices/USN-7506-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:6966"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1573-1 vom 2025-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01627-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020866.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8056 vom 2025-05-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-8056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5925 vom 2025-05-24",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00088.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7592-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7592-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-095 vom 2025-06-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-095.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-077 vom 2025-06-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-077.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-3 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-4 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7598-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7598-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-3 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7608-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-2 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7608-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01",
"url": "https://ubuntu.com/security/notices/USN-7607-1"
},
{
"category": "external",
"summary": "SEM 2025.2.1 release notes vom 2025-07-02",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7607-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-1 vom 2025-07-01",
"url": "https://ubuntu.com/security/notices/USN-7608-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-4 vom 2025-07-03",
"url": "https://ubuntu.com/security/notices/USN-7608-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-5 vom 2025-07-04",
"url": "https://ubuntu.com/security/notices/USN-7591-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7627-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-5 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7608-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08",
"url": "https://ubuntu.com/security/notices/USN-7627-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7607-3"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-078 vom 2025-07-10",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-6 vom 2025-07-11",
"url": "https://ubuntu.com/security/notices/USN-7608-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02308-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021805.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02320-1 vom 2025-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02322-1 vom 2025-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021810.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-6 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7591-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7655-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7654-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25",
"url": "https://ubuntu.com/security/notices/USN-7671-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02537-1 vom 2025-07-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021978.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7671-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7654-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-7 vom 2025-07-30",
"url": "https://ubuntu.com/security/notices/USN-7608-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04",
"url": "https://ubuntu.com/security/notices/USN-7671-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7686-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4271 vom 2025-08-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7712-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7711-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7712-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20669-1 vom 2025-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20653-1 vom 2025-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022432.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03272-1 vom 2025-09-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022589.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03290-1 vom 2025-09-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022602.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03301-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022605.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20756-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022703.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20739-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022711.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03382-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022721.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03602-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022908.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20518 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20518"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:2264-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:20518 vom 2025-11-21",
"url": "https://errata.build.resf.org/RLSA-2025:20518"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20518 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-20518-0.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0149-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-01-19T23:00:00.000+00:00",
"generator": {
"date": "2026-01-20T08:35:08.916+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2024-2173",
"initial_release_date": "2024-09-17T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-09-17T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon, ORACLE und Debian aufgenommen"
},
{
"date": "2024-10-07T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-10-08T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-10T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-17T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-21T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-25T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-28T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-02T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-09T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-12-12T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-22T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-02T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Google aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE und IBM aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-27T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-03T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-07T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-27T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-28T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-05-25T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Debian, Amazon und SUSE aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-17T22:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-06-24T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2025-07-13T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "91",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-10T22:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-18T22:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "108"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Cloud Platform",
"product": {
"name": "Google Cloud Platform",
"product_id": "393401",
"product_identification_helper": {
"cpe": "cpe:/a:google:cloud_platform:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM InfoSphere Guardium",
"product": {
"name": "IBM InfoSphere Guardium",
"product_id": "T002366",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_guardium:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T037716",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager \u003c2025.2.1",
"product_id": "T044986"
}
},
{
"category": "product_version",
"name": "2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager 2025.2.1",
"product_id": "T044986-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-46714",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46714"
},
{
"cve": "CVE-2024-46715",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46715"
},
{
"cve": "CVE-2024-46716",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46716"
},
{
"cve": "CVE-2024-46717",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46717"
},
{
"cve": "CVE-2024-46718",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46718"
},
{
"cve": "CVE-2024-46719",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46719"
},
{
"cve": "CVE-2024-46720",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46720"
},
{
"cve": "CVE-2024-46721",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46721"
},
{
"cve": "CVE-2024-46722",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46722"
},
{
"cve": "CVE-2024-46723",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46723"
},
{
"cve": "CVE-2024-46724",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46724"
},
{
"cve": "CVE-2024-46725",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46725"
},
{
"cve": "CVE-2024-46726",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46726"
},
{
"cve": "CVE-2024-46727",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46727"
},
{
"cve": "CVE-2024-46728",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46728"
},
{
"cve": "CVE-2024-46729",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46729"
},
{
"cve": "CVE-2024-46730",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46730"
},
{
"cve": "CVE-2024-46731",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46731"
},
{
"cve": "CVE-2024-46732",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46732"
},
{
"cve": "CVE-2024-46733",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46733"
},
{
"cve": "CVE-2024-46734",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46734"
},
{
"cve": "CVE-2024-46735",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46735"
},
{
"cve": "CVE-2024-46736",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46736"
},
{
"cve": "CVE-2024-46737",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46737"
},
{
"cve": "CVE-2024-46738",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46738"
},
{
"cve": "CVE-2024-46739",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46739"
},
{
"cve": "CVE-2024-46740",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46740"
},
{
"cve": "CVE-2024-46741",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46741"
},
{
"cve": "CVE-2024-46742",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46742"
},
{
"cve": "CVE-2024-46743",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46743"
},
{
"cve": "CVE-2024-46744",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46744"
},
{
"cve": "CVE-2024-46745",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46745"
},
{
"cve": "CVE-2024-46746",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46746"
},
{
"cve": "CVE-2024-46747",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46747"
},
{
"cve": "CVE-2024-46748",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46748"
},
{
"cve": "CVE-2024-46749",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46749"
},
{
"cve": "CVE-2024-46750",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46750"
},
{
"cve": "CVE-2024-46751",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46751"
},
{
"cve": "CVE-2024-46752",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46752"
},
{
"cve": "CVE-2024-46753",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46753"
},
{
"cve": "CVE-2024-46754",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46754"
},
{
"cve": "CVE-2024-46755",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46755"
},
{
"cve": "CVE-2024-46756",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46756"
},
{
"cve": "CVE-2024-46757",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46757"
},
{
"cve": "CVE-2024-46758",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46758"
},
{
"cve": "CVE-2024-46759",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46759"
},
{
"cve": "CVE-2024-46760",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46760"
},
{
"cve": "CVE-2024-46761",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46761"
},
{
"cve": "CVE-2024-46762",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46762"
},
{
"cve": "CVE-2024-46763",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46763"
},
{
"cve": "CVE-2024-46764",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46764"
},
{
"cve": "CVE-2024-46765",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46765"
},
{
"cve": "CVE-2024-46766",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46766"
},
{
"cve": "CVE-2024-46767",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46767"
},
{
"cve": "CVE-2024-46768",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46768"
},
{
"cve": "CVE-2024-46769",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46769"
},
{
"cve": "CVE-2024-46770",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46770"
},
{
"cve": "CVE-2024-46771",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46771"
},
{
"cve": "CVE-2024-46772",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46772"
},
{
"cve": "CVE-2024-46773",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46773"
},
{
"cve": "CVE-2024-46774",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46774"
},
{
"cve": "CVE-2024-46775",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46775"
},
{
"cve": "CVE-2024-46776",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46776"
},
{
"cve": "CVE-2024-46777",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46777"
},
{
"cve": "CVE-2024-46778",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46778"
},
{
"cve": "CVE-2024-46779",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46779"
},
{
"cve": "CVE-2024-46780",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46780"
},
{
"cve": "CVE-2024-46781",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46781"
},
{
"cve": "CVE-2024-46782",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46782"
},
{
"cve": "CVE-2024-46783",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46783"
},
{
"cve": "CVE-2024-46784",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46784"
},
{
"cve": "CVE-2024-46785",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46785"
},
{
"cve": "CVE-2024-46786",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46786"
},
{
"cve": "CVE-2024-46787",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46787"
},
{
"cve": "CVE-2024-46788",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46788"
},
{
"cve": "CVE-2024-46789",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46789"
},
{
"cve": "CVE-2024-46790",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46790"
},
{
"cve": "CVE-2024-46791",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46791"
},
{
"cve": "CVE-2024-46792",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46792"
},
{
"cve": "CVE-2024-46793",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46793"
},
{
"cve": "CVE-2024-46794",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46794"
},
{
"cve": "CVE-2024-46795",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46795"
},
{
"cve": "CVE-2024-46796",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46796"
},
{
"cve": "CVE-2024-46797",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46797"
},
{
"cve": "CVE-2024-46798",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46798"
},
{
"cve": "CVE-2024-46799",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46799"
},
{
"cve": "CVE-2024-46800",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46800"
},
{
"cve": "CVE-2024-46801",
"product_status": {
"known_affected": [
"T037716",
"T044986",
"2951",
"T002207",
"67646",
"T000126",
"T002366",
"398363",
"393401",
"T004914",
"T032255"
]
},
"release_date": "2024-09-17T22:00:00.000+00:00",
"title": "CVE-2024-46801"
}
]
}
GHSA-786C-R55J-68WJ
Vulnerability from github – Published: 2024-09-18 09:30 – Updated: 2024-09-20 18:32
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
libfs: fix get_stashed_dentry()
get_stashed_dentry() tries to optimistically retrieve a stashed dentry from a provided location. It needs to ensure to hold rcu lock before it dereference the stashed location to prevent UAF issues. Use rcu_dereference() instead of READ_ONCE() it's effectively equivalent with some lockdep bells and whistles and it communicates clearly that this expects rcu protection.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2024-46801"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-09-18T08:15:06Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibfs: fix get_stashed_dentry()\n\nget_stashed_dentry() tries to optimistically retrieve a stashed dentry\nfrom a provided location. It needs to ensure to hold rcu lock before it\ndereference the stashed location to prevent UAF issues. Use\nrcu_dereference() instead of READ_ONCE() it\u0027s effectively equivalent\nwith some lockdep bells and whistles and it communicates clearly that\nthis expects rcu protection.",
"id": "GHSA-786c-r55j-68wj",
"modified": "2024-09-20T18:32:26Z",
"published": "2024-09-18T09:30:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-46801"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/03e2a1209a83a380df34a72f7d6d1bc6c74132c7"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/4e32c25b58b945f976435bbe51f39b32d714052e"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2024-46801
Vulnerability from fkie_nvd - Published: 2024-09-18 08:15 - Updated: 2024-09-20 17:18
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
libfs: fix get_stashed_dentry()
get_stashed_dentry() tries to optimistically retrieve a stashed dentry
from a provided location. It needs to ensure to hold rcu lock before it
dereference the stashed location to prevent UAF issues. Use
rcu_dereference() instead of READ_ONCE() it's effectively equivalent
with some lockdep bells and whistles and it communicates clearly that
this expects rcu protection.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.11 | |
| linux | linux_kernel | 6.11 | |
| linux | linux_kernel | 6.11 | |
| linux | linux_kernel | 6.11 | |
| linux | linux_kernel | 6.11 | |
| linux | linux_kernel | 6.11 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB7114B-59C6-4708-AE2C-B7C2D0BA0FA2",
"versionEndExcluding": "6.10.10",
"versionStartIncluding": "6.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibfs: fix get_stashed_dentry()\n\nget_stashed_dentry() tries to optimistically retrieve a stashed dentry\nfrom a provided location. It needs to ensure to hold rcu lock before it\ndereference the stashed location to prevent UAF issues. Use\nrcu_dereference() instead of READ_ONCE() it\u0027s effectively equivalent\nwith some lockdep bells and whistles and it communicates clearly that\nthis expects rcu protection."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: libfs: fix get_stashed_dentry() get_stashed_dentry() intenta recuperar de forma optimista un dentry almacenado en cach\u00e9 desde una ubicaci\u00f3n proporcionada. Debe asegurarse de mantener el bloqueo de rcu antes de desreferenciar la ubicaci\u00f3n almacenada para evitar problemas de UAF. Use rcu_dereference() en lugar de READ_ONCE(), es efectivamente equivalente con algunas funciones adicionales de lockdep y comunica claramente que esto espera protecci\u00f3n de rcu."
}
],
"id": "CVE-2024-46801",
"lastModified": "2024-09-20T17:18:17.810",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-09-18T08:15:06.633",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/03e2a1209a83a380df34a72f7d6d1bc6c74132c7"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/4e32c25b58b945f976435bbe51f39b32d714052e"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…