Action not permitted
Modal body text goes here.
cve-2018-5333
Vulnerability from cvelistv5
Published
2018-01-11 07:00
Modified
2024-08-05 05:33
Severity ?
EPSS score ?
Summary
In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:33:43.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3617-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "USN-3617-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "USN-3583-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3583-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d11f77f84b27cef452cee332f4e469503084737" }, { "name": "USN-3632-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3632-1/" }, { "name": "USN-3583-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3583-1/" }, { "name": "102510", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102510" }, { "name": "RHSA-2018:0470", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0470" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "USN-3617-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3617-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737" }, { "name": "USN-3619-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3619-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-11T00:00:00", "descriptions": [ { "lang": "en", "value": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-22T18:06:29", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3617-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "USN-3617-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "USN-3583-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3583-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d11f77f84b27cef452cee332f4e469503084737" }, { "name": "USN-3632-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3632-1/" }, { "name": "USN-3583-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3583-1/" }, { "name": "102510", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102510" }, { "name": "RHSA-2018:0470", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0470" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "USN-3617-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3617-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737" }, { "name": "USN-3619-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3619-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-5333", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4187", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3617-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "USN-3617-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "USN-3583-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3583-2/" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d11f77f84b27cef452cee332f4e469503084737", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d11f77f84b27cef452cee332f4e469503084737" }, { "name": "USN-3632-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3632-1/" }, { "name": "USN-3583-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3583-1/" }, { "name": "102510", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102510" }, { "name": "RHSA-2018:0470", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0470" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "USN-3617-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-2/" }, { "name": "https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737" }, { "name": "USN-3619-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-1/" }, { "name": "http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-5333", "datePublished": "2018-01-11T07:00:00", "dateReserved": "2018-01-11T00:00:00", "dateUpdated": "2024-08-05T05:33:43.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-5333\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-01-11T07:29:00.263\",\"lastModified\":\"2020-01-22T19:15:10.687\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux hasta la versi\u00f3n 4.14.13, la funci\u00f3n rds_cmsg_atomic en net/rds/rdma.c gestiona de manera incorrecta los casos en los que fracasa la asignaci\u00f3n de p\u00e1ginas o cuando se proporciona una direcci\u00f3n no v\u00e1lida, lo que conduce a una desreferencia de puntero NULL en rds_atomic_free_op.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":4.9},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.14.13\",\"matchCriteriaId\":\"664475BB-B9FD-4E3F-AFCF-7E11350BE23E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d11f77f84b27cef452cee332f4e469503084737\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/102510\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0470\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3583-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3583-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3617-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3617-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3617-3/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3619-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3619-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3632-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4187\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
wid-sec-w-2022-0532
Vulnerability from csaf_certbund
Published
2018-05-01 22:00
Modified
2023-05-18 22:00
Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Debian ist eine Linux-Distribution, die ausschließlich Freie Software enthält.
Oracle Linux ist ein Open Source Betriebssystem, welches unter der GNU General Public License (GPL) verfügbar ist.
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, einen Denial of Service Angriff durchzuführen, Sicherheitsmechanismen zu umgehen, vertrauliche Daten einzusehen oder seine Privilegien zu erweitern.
Betroffene Betriebssysteme
- Linux
- Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Debian ist eine Linux-Distribution, die ausschlie\u00dflich Freie Software enth\u00e4lt.\r\nOracle Linux ist ein Open Source Betriebssystem, welches unter der GNU General Public License (GPL) verf\u00fcgbar ist.\r\nDer Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, einen Denial of Service Angriff durchzuf\u00fchren, Sicherheitsmechanismen zu umgehen, vertrauliche Daten einzusehen oder seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0532 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2022-0532.json" }, { "category": "self", "summary": "WID-SEC-2022-0532 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0532" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2232-1 vom 2023-05-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014918.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1992-1 vom 2023-04-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014572.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1897-1 vom 2023-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014485.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1848-1 vom 2023-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014466.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3698-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3698-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3697-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3697-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3696-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3696-2" }, { "category": "external", "summary": "Debian Security Advisory DSA-4187-1 vom 2018-05-01", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "category": "external", "summary": "Debian Security Advisory DSA-4188-1 vom 2018-05-01", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4088 vom 2018-05-01", "url": "https://linux.oracle.com/errata/ELSA-2018-4088.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4087 vom 2018-05-01", "url": "https://linux.oracle.com/errata/ELSA-2018-4087.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4089 vom 2018-05-02", "url": "http://linux.oracle.com/errata/ELSA-2018-4089.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1173-1 vom 2018-05-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1172-1 vom 2018-05-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181172-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1318 vom 2018-05-09", "url": "http://www.auscert.org.au/bulletins/62478" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1355 vom 2018-05-09", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1318 vom 2018-05-09", "url": "http://linux.oracle.com/errata/ELSA-2018-1318.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1217-1 vom 2018-05-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181217-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1238-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181238-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1225-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181225-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1240-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181240-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1230-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181230-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1223-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181223-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1228-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181228-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1236-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181236-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1239-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181239-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1231-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181231-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1229-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181229-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1237-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181237-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1232-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181232-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1227-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181227-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1234-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181234-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1233-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181233-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1226-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181226-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1235-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181235-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1222-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181222-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1224-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181224-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1263-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181263-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1221-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181221-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1220-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181220-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1249-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181249-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1246-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181246-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1252-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181252-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1260-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181260-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1270-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181270-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1262-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181262-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1242-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181242-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1268-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181268-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1248-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181248-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1258-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181258-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1272-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181272-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1250-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181250-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1253-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181253-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1241-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181241-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1259-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181259-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1256-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181256-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1245-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181245-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1264-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181264-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1254-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181254-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1266-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181266-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1269-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181269-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1251-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181251-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1255-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181255-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1273-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181273-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1243-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181243-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1244-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181244-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1261-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181261-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1267-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181267-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1247-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181247-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1257-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181257-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1374 vom 2018-05-16", "url": "https://access.redhat.com/errata/RHSA-2018:1374" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1309-1 vom 2018-05-17", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181309-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1629 vom 2018-05-22", "url": "http://linux.oracle.com/errata/ELSA-2018-1629.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4114 vom 2018-05-23", "url": "http://linux.oracle.com/errata/ELSA-2018-4114.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1366-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1375-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181375-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1376-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1386-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181386-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1368-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181368-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1374-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181374-1.html" }, { "category": "external", "summary": "Oraclevm-errata OVMSA-2018-0223 vom 2018-05-23", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-May/000858.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1465-1 vom 2018-05-30", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181465-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1498-1 vom 2018-06-05", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181498-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1508-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181508-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1551-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181551-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1525-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181525-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1536-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181536-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1511-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181511-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1545-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181545-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1522-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181522-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1530-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181530-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1534-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181534-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1524-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181524-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1505-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181505-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1510-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181510-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1516-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181516-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1523-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181523-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1532-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181532-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1531-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181531-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1521-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181521-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1518-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181518-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1506-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181506-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1548-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181548-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1514-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181514-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1541-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181541-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1546-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181546-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1519-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181519-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1509-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181509-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1528-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181528-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1537-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181537-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1513-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181513-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1512-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181512-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1538-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181538-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1517-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181517-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1535-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181535-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1529-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181529-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1549-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181549-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1540-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181540-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1520-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181520-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1526-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181526-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1533-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181533-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1539-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181539-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1543-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181543-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1571-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181571-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1570-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181570-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1567-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181567-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1636-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181636-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1644-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181644-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1639-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181639-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1645-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181645-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1641-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181641-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1640-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181640-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1637-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181637-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1648-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181648-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1642-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181642-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1643-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181643-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4145 vom 2018-06-16", "url": "http://linux.oracle.com/errata/ELSA-2018-4145.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4134 vom 2018-06-16", "url": "http://linux.oracle.com/errata/ELSA-2018-4134.html" }, { "category": "external", "summary": "Red Hat Security Advisory", "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1762-1 vom 2018-06-20", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181762-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1761-1 vom 2018-06-20", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181761-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1772-1 vom 2018-06-21", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181772-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1816-1 vom 2018-06-26", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1854 vom 2018-06-26", "url": "http://linux.oracle.com/errata/ELSA-2018-1854.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4161 vom 2018-07-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4161.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4164 vom 2018-07-11", "url": "http://linux.oracle.com/errata/ELSA-2018-4164.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2162 vom 2018-07-11", "url": "http://linux.oracle.com/errata/ELSA-2018-2162.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2082-1 vom 2018-07-28", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182082-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2092-1 vom 2018-07-28", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2150-1 vom 2018-08-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182150-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2222-1 vom 2018-08-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182222-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4193 vom 2018-08-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4193.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2384 vom 2018-08-15", "url": "http://linux.oracle.com/errata/ELSA-2018-2384.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2390 vom 2018-08-15", "url": "http://linux.oracle.com/errata/ELSA-2018-2390.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-14", "url": "http://rhn.redhat.com/errata/RHSA-2018-2390.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-14", "url": "http://rhn.redhat.com/errata/RHSA-2018-2384.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2387 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2388 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2389 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2395 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2391 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2392 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2393 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2394 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2396 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2332-1 vom 2018-08-15", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182332-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2366-1 vom 2018-08-16", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182366-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4200 vom 2018-08-17", "url": "http://linux.oracle.com/errata/ELSA-2018-4200.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2637-1 vom 2018-09-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182637-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2631-1 vom 2018-09-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182631-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4211 vom 2018-09-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4211.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4308 vom 2018-10-01", "url": "https://www.debian.org/security/2018/dsa-4308" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3003-1 vom 2018-10-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3004-1 vom 2018-10-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183004-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3084-1 vom 2018-10-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183084-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4242 vom 2018-10-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4242.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4245 vom 2018-10-11", "url": "http://linux.oracle.com/errata/ELSA-2018-4245.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4250 vom 2018-10-13", "url": "http://linux.oracle.com/errata/ELSA-2018-4250.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2948 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:3096 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:3083 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3589-1 vom 2018-11-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183589-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3593-1 vom 2018-11-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183593-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-3083 vom 2018-11-06", "url": "http://linux.oracle.com/errata/ELSA-2018-3083.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3659-1 vom 2018-11-08", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183659-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4268 vom 2018-11-08", "url": "http://linux.oracle.com/errata/ELSA-2018-4268.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4269 vom 2018-11-08", "url": "http://linux.oracle.com/errata/ELSA-2018-4269.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4285 vom 2018-11-21", "url": "http://linux.oracle.com/errata/ELSA-2018-4285.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3934-1 vom 2018-11-29", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183934-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3961-1 vom 2018-12-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183961-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4301 vom 2018-12-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4301.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4304 vom 2018-12-12", "url": "http://linux.oracle.com/errata/ELSA-2018-4304.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:4069-1 vom 2018-12-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184069-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:4072-1 vom 2018-12-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184072-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4315 vom 2019-01-03", "url": "http://linux.oracle.com/errata/ELSA-2019-4315.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4316 vom 2019-01-04", "url": "http://linux.oracle.com/errata/ELSA-2019-4316.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4317 vom 2019-01-05", "url": "http://linux.oracle.com/errata/ELSA-2019-4317.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2018-252 vom 2020-01-07", "url": "https://downloads.avaya.com/css/P8/documents/101051981" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0095-1 vom 2019-01-16", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190095-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3880-2 vom 2019-02-05", "url": "https://usn.ubuntu.com/3880-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3910-1 vom 2019-03-16", "url": "https://usn.ubuntu.com/3910-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3910-1 vom 2019-03-16", "url": "https://usn.ubuntu.com/3910-2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:0641 vom 2019-03-26", "url": "https://access.redhat.com/errata/RHSA-2019:0641" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4596 vom 2019-04-01", "url": "http://linux.oracle.com/errata/ELSA-2019-4596.html" }, { "category": "external", "summary": "ORACLE OVMSA-2019-0014 vom 2019-05-03", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-May/000936.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1190 vom 2019-05-15", "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1170 vom 2019-05-15", "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1487 vom 2019-06-18", "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1483 vom 2019-06-18", "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2029 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2043 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4742 vom 2019-08-10", "url": "http://linux.oracle.com/errata/ELSA-2019-4742.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2029 vom 2019-08-14", "url": "http://linux.oracle.com/errata/ELSA-2019-2029.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2430-1 vom 2019-09-23", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192430-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2450-1 vom 2019-09-24", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0036 vom 2020-01-07", "url": "https://access.redhat.com/errata/RHSA-2020:0036" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4163-1 vom 2019-10-22", "url": "https://usn.ubuntu.com/4163-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4163-2 vom 2019-10-23", "url": "https://usn.ubuntu.com/4163-2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:4154 vom 2019-12-10", "url": "https://access.redhat.com/errata/RHSA-2019:4154" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:4159 vom 2019-12-10", "url": "https://access.redhat.com/errata/RHSA-2019:4159" }, { "category": "external", "summary": "Debian Security Advisory DLA 2148 vom 2020-04-01", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1587-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1603-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1599-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1602-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006932.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1604-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1602-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1599-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006924.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1605-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006930.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1605-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1671-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1656-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1663-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1646-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1754-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1758-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1775-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2156-1 vom 2020-08-07", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2323 vom 2020-08-12", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202008/msg00019.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4486-1 vom 2020-09-02", "url": "https://usn.ubuntu.com/4486-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2478-1 vom 2020-09-03", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2487-1 vom 2020-09-04", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2861-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2862-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08", "url": "http://linux.oracle.com/errata/ELSA-2021-9473.html" }, { "category": "external", "summary": "ORACLE OVMSA-2021-0035 vom 2021-10-12", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1988 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1975 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "external", "summary": "Debian Security Advisory DLA-3065 vom 2022-07-01", "url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9969 vom 2022-11-01", "url": "https://linux.oracle.com/errata/ELSA-2022-9969.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:50:57.999+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0532", "initial_release_date": "2018-05-01T22:00:00.000+00:00", "revision_history": [ { "date": "2018-05-01T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2018-05-01T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2018-05-02T22:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2018-05-08T22:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2018-05-10T22:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2018-05-13T22:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2018-05-15T22:00:00.000+00:00", "number": "7", "summary": "New remediations available" }, { "date": "2018-05-16T22:00:00.000+00:00", "number": "8", "summary": "New remediations available" }, { "date": "2018-05-21T22:00:00.000+00:00", "number": "9", "summary": "New remediations available" }, { "date": "2018-05-22T22:00:00.000+00:00", "number": "10", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "11", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "13", "summary": "Version nicht vorhanden" }, { "date": "2018-05-29T22:00:00.000+00:00", "number": "14", "summary": "New remediations available" }, { "date": "2018-06-05T22:00:00.000+00:00", "number": "15", "summary": "New remediations available" }, { "date": "2018-06-06T22:00:00.000+00:00", "number": "16", "summary": "New remediations available" }, { "date": "2018-06-07T22:00:00.000+00:00", "number": "17", "summary": "New remediations available" }, { "date": "2018-06-11T22:00:00.000+00:00", "number": "18", "summary": "New remediations available" }, { "date": "2018-06-17T22:00:00.000+00:00", "number": "19", "summary": "New remediations available" }, { "date": "2018-06-18T22:00:00.000+00:00", "number": "20", "summary": "New remediations available" }, { "date": "2018-06-19T22:00:00.000+00:00", "number": "21", "summary": "Added references" }, { "date": "2018-06-21T22:00:00.000+00:00", "number": "22", "summary": "New remediations available" }, { "date": "2018-06-24T22:00:00.000+00:00", "number": "23", "summary": "Added references" }, { "date": "2018-06-27T22:00:00.000+00:00", "number": "24", "summary": "Added references" }, { "date": "2018-07-10T22:00:00.000+00:00", "number": "25", "summary": "New remediations available" }, { "date": "2018-07-29T22:00:00.000+00:00", "number": "26", "summary": "New remediations available" }, { "date": "2018-08-01T22:00:00.000+00:00", "number": "27", "summary": "New remediations available" }, { "date": "2018-08-06T22:00:00.000+00:00", "number": "28", "summary": "New remediations available" }, { "date": "2018-08-09T22:00:00.000+00:00", "number": "29", "summary": "New remediations available" }, { "date": "2018-08-14T22:00:00.000+00:00", "number": "30", "summary": "New remediations available" }, { "date": "2018-08-14T22:00:00.000+00:00", "number": "31", "summary": "New remediations available" }, { "date": "2018-08-15T22:00:00.000+00:00", "number": "32", "summary": "New remediations available" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "33", "summary": "New remediations available" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "34", "summary": "Version nicht vorhanden" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "35", "summary": "Version nicht vorhanden" }, { "date": "2018-08-27T22:00:00.000+00:00", "number": "36", "summary": "Added references" }, { "date": "2018-09-06T22:00:00.000+00:00", "number": "37", "summary": "New remediations available" }, { "date": "2018-09-10T22:00:00.000+00:00", "number": "38", "summary": "New remediations available" }, { "date": "2018-10-01T22:00:00.000+00:00", "number": "39", "summary": "New remediations available" }, { "date": "2018-10-04T22:00:00.000+00:00", "number": "40", "summary": "New remediations available" }, { "date": "2018-10-09T22:00:00.000+00:00", "number": "41", "summary": "New remediations available" }, { "date": "2018-10-10T22:00:00.000+00:00", "number": "42", "summary": "New remediations available" }, { "date": "2018-10-14T22:00:00.000+00:00", "number": "43", "summary": "New remediations available" }, { "date": "2018-10-30T23:00:00.000+00:00", "number": "44", "summary": "New remediations available" }, { "date": "2018-10-31T23:00:00.000+00:00", "number": "45", "summary": "New remediations available" }, { "date": "2018-11-05T23:00:00.000+00:00", "number": "46", "summary": "New remediations available" }, { "date": "2018-11-07T23:00:00.000+00:00", "number": "47", "summary": "New remediations available" }, { "date": "2018-11-08T23:00:00.000+00:00", "number": "48", "summary": "New remediations available" }, { "date": "2018-11-20T23:00:00.000+00:00", "number": "49", "summary": "New remediations available" }, { "date": "2018-11-28T23:00:00.000+00:00", "number": "50", "summary": "New remediations available" }, { "date": "2018-12-02T23:00:00.000+00:00", "number": "51", "summary": "New remediations available" }, { "date": "2018-12-03T23:00:00.000+00:00", "number": "52", "summary": "Minor corrections" }, { "date": "2018-12-09T23:00:00.000+00:00", "number": "53", "summary": "New remediations available" }, { "date": "2018-12-11T23:00:00.000+00:00", "number": "54", "summary": "New remediations available" }, { "date": "2018-12-12T23:00:00.000+00:00", "number": "55", "summary": "New remediations available" }, { "date": "2019-01-03T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-01-06T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-01-15T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-02-04T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-03-17T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-03-25T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-03-31T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-05-05T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2019-05-15T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-06-17T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-08-06T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-08-11T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-08-13T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-09-23T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-09-24T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-10-21T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-10-22T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-12-09T23:00:00.000+00:00", "number": "73", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-12-09T23:00:00.000+00:00", "number": "74", "summary": "Version nicht vorhanden" }, { "date": "2020-01-06T23:00:00.000+00:00", "number": "75", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-01-07T23:00:00.000+00:00", "number": "76", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-04-01T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-06-09T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-11T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-18T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-25T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-08-06T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-08-12T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-09-01T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2020-09-03T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-09-06T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-08-29T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-10-10T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-10-11T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-03T22:00:00.000+00:00", "number": "91", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-11-01T23:00:00.000+00:00", "number": "92", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-04-16T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-18T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-24T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "96" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "6368", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux 7", "product": { "name": "Oracle Linux 7", "product_id": "287065", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:7" } } }, { "category": "product_name", "name": "Oracle Linux 6", "product": { "name": "Oracle Linux 6", "product_id": "T002988", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:6" } } }, { "category": "product_name", "name": "Oracle Linux 5", "product": { "name": "Oracle Linux 5", "product_id": "T003616", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:5" } } }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "product_name", "name": "Linux" }, { "category": "product_name", "name": "Oracle VM", "product": { "name": "Oracle VM", "product_id": "T011119", "product_identification_helper": { "cpe": "cpe:/a:oracle:vm:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9016", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2015-9016" }, { "cve": "CVE-2017-0861", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-0861" }, { "cve": "CVE-2017-13166", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-13166" }, { "cve": "CVE-2017-13220", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-13220" }, { "cve": "CVE-2017-16526", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-16526" }, { "cve": "CVE-2017-16911", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-16911" }, { "cve": "CVE-2017-16912", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-16912" }, { "cve": "CVE-2017-16913", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-16913" }, { "cve": "CVE-2017-16914", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-16914" }, { "cve": "CVE-2017-17975", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-17975" }, { "cve": "CVE-2017-18017", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18017" }, { "cve": "CVE-2017-18193", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18193" }, { "cve": "CVE-2017-18203", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18203" }, { "cve": "CVE-2017-18216", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18216" }, { "cve": "CVE-2017-18218", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18218" }, { "cve": "CVE-2017-18222", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18222" }, { "cve": "CVE-2017-18224", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18224" }, { "cve": "CVE-2017-18232", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18232" }, { "cve": "CVE-2017-18241", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18241" }, { "cve": "CVE-2017-18257", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18257" }, { "cve": "CVE-2017-5715", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-5753" }, { "cve": "CVE-2018-1000004", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1000199", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1000199" }, { "cve": "CVE-2018-10323", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1065", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1065" }, { "cve": "CVE-2018-1066", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1066" }, { "cve": "CVE-2018-1068", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1092", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1092" }, { "cve": "CVE-2018-1093", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1093" }, { "cve": "CVE-2018-1108", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1108" }, { "cve": "CVE-2018-5332", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-5333" }, { "cve": "CVE-2018-5750", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-5750" }, { "cve": "CVE-2018-5803", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-5803" }, { "cve": "CVE-2018-6927", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-6927" }, { "cve": "CVE-2018-7480", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7480" }, { "cve": "CVE-2018-7492", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7492" }, { "cve": "CVE-2018-7566", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7566" }, { "cve": "CVE-2018-7740", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7740" }, { "cve": "CVE-2018-7757", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7757" }, { "cve": "CVE-2018-7995", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7995" }, { "cve": "CVE-2018-8087", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8781", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-8822" } ] }
ghsa-fgqv-475c-x2p6
Vulnerability from github
Published
2022-05-13 01:28
Modified
2022-05-13 01:28
Severity ?
Details
In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.
{ "affected": [], "aliases": [ "CVE-2018-5333" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-01-11T07:29:00Z", "severity": "MODERATE" }, "details": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "id": "GHSA-fgqv-475c-x2p6", "modified": "2022-05-13T01:28:46Z", "published": "2022-05-13T01:28:46Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5333" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0470" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3583-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3583-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3617-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3617-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3617-3" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3619-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3619-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3632-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d11f77f84b27cef452cee332f4e469503084737" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/102510" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2018_0470
Vulnerability from csaf_redhat
Published
2018-03-12 15:03
Modified
2024-11-22 11:45
Summary
Red Hat Security Advisory: Red Hat Enterprise MRG Realtime 2.5 security and enhancement update
Notes
Topic
Updated Red Hat Enterprise Messaging, Realtime, and Grid (MRG) Realtime packages that fix multiple security issues and add one enhancement are now available for Red Hat Enterprise MRG 2.5.
Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details
Red Hat Enterprise MRG is a next-generation IT infrastructure for enterprise computing. MRG offers increased performance, reliability, interoperability, and faster computing for enterprise customers.
Security Fix(es):
* kernel: rds_message_alloc_sgs() function doesn't validate value used during DMA page allocation causes heap out-of-bounds write (CVE-2018-5332, Moderate)
* kernel: Null pointer dereference in rds_atomic_free_op() allows denial-of-service (CVE-2018-5333, Moderate)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Enhancement(s):
* The kernel-rt packages have been upgraded to version 3.10.0-693.21.1, which provides a number of security and bug fixes over the previous version. (BZ#1537669)
All Red Hat Enterprise MRG Realtime users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add this enhancement.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Red Hat Enterprise Messaging, Realtime, and Grid (MRG) Realtime packages that fix multiple security issues and add one enhancement are now available for Red Hat Enterprise MRG 2.5.\n\nRed Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise MRG is a next-generation IT infrastructure for enterprise computing. MRG offers increased performance, reliability, interoperability, and faster computing for enterprise customers.\n\nSecurity Fix(es):\n\n* kernel: rds_message_alloc_sgs() function doesn\u0027t validate value used during DMA page allocation causes heap out-of-bounds write (CVE-2018-5332, Moderate) \n\n* kernel: Null pointer dereference in rds_atomic_free_op() allows denial-of-service (CVE-2018-5333, Moderate)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nEnhancement(s):\n\n* The kernel-rt packages have been upgraded to version 3.10.0-693.21.1, which provides a number of security and bug fixes over the previous version. (BZ#1537669)\n\nAll Red Hat Enterprise MRG Realtime users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add this enhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0470", "url": "https://access.redhat.com/errata/RHSA-2018:0470" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1533890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533890" }, { "category": "external", "summary": "1533891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533891" }, { "category": "external", "summary": "1537669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537669" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0470.json" } ], "title": "Red Hat Security Advisory: Red Hat Enterprise MRG Realtime 2.5 security and enhancement update", "tracking": { "current_release_date": "2024-11-22T11:45:44+00:00", "generator": { "date": "2024-11-22T11:45:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0470", "initial_release_date": "2018-03-12T15:03:01+00:00", "revision_history": [ { "date": "2018-03-12T15:03:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-12T15:03:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:45:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.21.1.rt56.607.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.21.1.rt56.607.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.21.1.rt56.607.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src", "product_id": "kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.21.1.rt56.607.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5332", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-01-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1533890" } ], "notes": [ { "category": "description", "text": "In the Linux kernel through 4.14.13, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size() function in \u0027net/rds/rdma.c\u0027) and thus to a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: rds_message_alloc_sgs() function doesn\u0027t validate value used during DMA page allocation causes heap out-of-bounds write", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. Future Linux kernel updates for the respective releases may address this issue.\n\nThis issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 7, its real-time kernel, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE, as a code with the flaw is not built and shipped with the products listed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "RHBZ#1533890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5332", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5332" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5332", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5332" } ], "release_date": "2018-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-12T15:03:01+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the system must be restarted for the changes to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0470" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: rds_message_alloc_sgs() function doesn\u0027t validate value used during DMA page allocation causes heap out-of-bounds write" }, { "cve": "CVE-2018-5333", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-01-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1533891" } ], "notes": [ { "category": "description", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic() function in \u0027net/rds/rdma.c\u0027 mishandles cases where page pinning fails or an invalid address is supplied by a user. This can lead to a NULL pointer dereference in rds_atomic_free_op() and thus to a system panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in rds_atomic_free_op() allowing denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. Future Linux kernel updates for the respective releases may address this issue.\n\nThis issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE, as a code with the flaw is not built and shipped with the products listed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "RHBZ#1533891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5333", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5333" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5333", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5333" } ], "release_date": "2018-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-12T15:03:01+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the system must be restarted for the changes to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0470" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.21.1.rt56.607.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.21.1.rt56.607.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Null pointer dereference in rds_atomic_free_op() allowing denial-of-service" } ] }
gsd-2018-5333
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-5333", "description": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "id": "GSD-2018-5333", "references": [ "https://www.suse.com/security/cve/CVE-2018-5333.html", "https://www.debian.org/security/2018/dsa-4187", "https://access.redhat.com/errata/RHSA-2018:0470", "https://ubuntu.com/security/CVE-2018-5333", "https://linux.oracle.com/cve/CVE-2018-5333.html", "https://packetstormsecurity.com/files/cve/CVE-2018-5333" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-5333" ], "details": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "id": "GSD-2018-5333", "modified": "2023-12-13T01:22:39.765328Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-5333", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4187", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3617-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "USN-3617-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "USN-3583-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3583-2/" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d11f77f84b27cef452cee332f4e469503084737", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d11f77f84b27cef452cee332f4e469503084737" }, { "name": "USN-3632-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3632-1/" }, { "name": "USN-3583-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3583-1/" }, { "name": "102510", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102510" }, { "name": "RHSA-2018:0470", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0470" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "USN-3617-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-2/" }, { "name": "https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737" }, { "name": "USN-3619-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-1/" }, { "name": "http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.14.13", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-5333" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d11f77f84b27cef452cee332f4e469503084737", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d11f77f84b27cef452cee332f4e469503084737" }, { "name": "102510", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102510" }, { "name": "RHSA-2018:0470", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0470" }, { "name": "USN-3583-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3583-2/" }, { "name": "USN-3583-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3583-1/" }, { "name": "USN-3617-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3617-2/" }, { "name": "USN-3617-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3619-1/" }, { "name": "USN-3617-3", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "USN-3619-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "USN-3632-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3632-1/" }, { "name": "DSA-4187", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2020-01-22T19:15Z", "publishedDate": "2018-01-11T07:29Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.