Action not permitted
Modal body text goes here.
cve-2018-8822
Vulnerability from cvelistv5
Published
2018-03-20 00:00
Modified
2024-08-05 07:02
Severity ?
EPSS score ?
Summary
Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3654-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3654-1/" }, { "name": "103476", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103476" }, { "name": "DSA-4188", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "tags": [ "x_transferred" ], "url": "https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html" }, { "name": "USN-3653-2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3653-2/" }, { "name": "USN-3655-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3655-1/" }, { "name": "USN-3654-2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3654-2/" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "USN-3655-2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3655-2/" }, { "name": "USN-3656-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3656-1/" }, { "name": "USN-3653-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3653-1/" }, { "name": "USN-3657-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3657-1/" }, { "name": "[oss-security] 20221227 Re: Details on this supposed Linux Kernel ksmbd RCE", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/12/27/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-03-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-27T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4187", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3654-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3654-1/" }, { "name": "103476", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/103476" }, { "name": "DSA-4188", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "url": "https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html" }, { "name": "USN-3653-2", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3653-2/" }, { "name": "USN-3655-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3655-1/" }, { "name": "USN-3654-2", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3654-2/" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "USN-3655-2", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3655-2/" }, { "name": "USN-3656-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3656-1/" }, { "name": "USN-3653-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3653-1/" }, { "name": "USN-3657-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3657-1/" }, { "name": "[oss-security] 20221227 Re: Details on this supposed Linux Kernel ksmbd RCE", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/12/27/3" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-8822", "datePublished": "2018-03-20T00:00:00", "dateReserved": "2018-03-20T00:00:00", "dateUpdated": "2024-08-05T07:02:26.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-8822\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-03-20T17:29:00.423\",\"lastModified\":\"2024-03-28T16:08:31.410\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.\"},{\"lang\":\"es\",\"value\":\"Manipulaci\u00f3n incorrecta de longitud de b\u00fafer en la funci\u00f3n ncp_read_kernel en fs/ncpfs/ncplib_kernel.c en el kernel de Linux hasta la versi\u00f3n 4.15.11 y en drivers/staging/ncpfs/ncplib_kernel.c en el kernel de Linux 4.16-rc hasta 4.16-rc6 podr\u00eda ser explotada por servidores NCPFS maliciosos para cerrar inesperadamente el kernel o ejecutar c\u00f3digo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.2},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.12\",\"versionEndExcluding\":\"3.2.102\",\"matchCriteriaId\":\"9002FDD9-8A8C-4E06-8DE5-7CF6C79B117A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3\",\"versionEndExcluding\":\"3.16.57\",\"matchCriteriaId\":\"0786B96E-E04C-4D2B-B358-CCE006BAED46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"3.18.103\",\"matchCriteriaId\":\"F9906D89-2D98-4380-9A65-798B12332FC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.19\",\"versionEndExcluding\":\"4.1.52\",\"matchCriteriaId\":\"DC20C495-C297-4CEE-9034-4FE81754FE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2\",\"versionEndExcluding\":\"4.4.125\",\"matchCriteriaId\":\"BB766B8A-0C15-4949-BC7E-C624A8FB122A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.91\",\"matchCriteriaId\":\"086C29F5-DF5E-43B2-8E7D-EBA453B571D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.31\",\"matchCriteriaId\":\"9E6E5A35-1967-44F6-9D8F-83A08D60DB2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.15.14\",\"matchCriteriaId\":\"A8ED8E8A-0A8C-4F47-9BFF-69DB613F2C35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc:*:*:*:*:*:*\",\"matchCriteriaId\":\"47F1FC1E-886E-4D29-89F6-ACE3BA4C6ABC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7161042-96AB-4B27-85D1-284F7F975B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"023AC641-A30A-4814-8EEE-E8290134B8E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B70E4A9-D27F-4318-85DF-30CE6E86194B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E280740-2FD3-459D-AF37-624DC6171F8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA2A106F-944D-42C5-BB4B-E81B97A57CDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B14098E0-F40A-4C8E-B285-E96E6E604582\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2022/12/27/3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/103476\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3653-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3653-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3654-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3654-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3655-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3655-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3656-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3657-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4187\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4188\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
gsd-2018-8822
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-8822", "description": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "id": "GSD-2018-8822", "references": [ "https://www.suse.com/security/cve/CVE-2018-8822.html", "https://www.debian.org/security/2018/dsa-4188", "https://www.debian.org/security/2018/dsa-4187", "https://ubuntu.com/security/CVE-2018-8822" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-8822" ], "details": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "id": "GSD-2018-8822", "modified": "2023-12-13T01:22:34.847057Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8822", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4187", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3654-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3654-1/" }, { "name": "103476", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103476" }, { "name": "DSA-4188", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "https://www.mail-archive.com/netdev@vger.kernel.org/msg223373.html", "refsource": "CONFIRM", "url": "https://www.mail-archive.com/netdev@vger.kernel.org/msg223373.html" }, { "name": "USN-3653-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3653-2/" }, { "name": "USN-3655-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3655-1/" }, { "name": "USN-3654-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3654-2/" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "USN-3655-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3655-2/" }, { "name": "USN-3656-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3656-1/" }, { "name": "USN-3653-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3653-1/" }, { "name": "USN-3657-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3657-1/" }, { "name": "[oss-security] 20221227 Re: Details on this supposed Linux Kernel ksmbd RCE", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/12/27/3" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9002FDD9-8A8C-4E06-8DE5-7CF6C79B117A", "versionEndExcluding": "3.2.102", "versionStartIncluding": "2.6.12", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0786B96E-E04C-4D2B-B358-CCE006BAED46", "versionEndExcluding": "3.16.57", "versionStartIncluding": "3.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9906D89-2D98-4380-9A65-798B12332FC9", "versionEndExcluding": "3.18.103", "versionStartIncluding": "3.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC20C495-C297-4CEE-9034-4FE81754FE98", "versionEndExcluding": "4.1.52", "versionStartIncluding": "3.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB766B8A-0C15-4949-BC7E-C624A8FB122A", "versionEndExcluding": "4.4.125", "versionStartIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "086C29F5-DF5E-43B2-8E7D-EBA453B571D8", "versionEndExcluding": "4.9.91", "versionStartIncluding": "4.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E6E5A35-1967-44F6-9D8F-83A08D60DB2F", "versionEndExcluding": "4.14.31", "versionStartIncluding": "4.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8ED8E8A-0A8C-4F47-9BFF-69DB613F2C35", "versionEndExcluding": "4.15.14", "versionStartIncluding": "4.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.16:rc:*:*:*:*:*:*", "matchCriteriaId": "47F1FC1E-886E-4D29-89F6-ACE3BA4C6ABC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "C7161042-96AB-4B27-85D1-284F7F975B07", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*", "matchCriteriaId": "023AC641-A30A-4814-8EEE-E8290134B8E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*", "matchCriteriaId": "9B70E4A9-D27F-4318-85DF-30CE6E86194B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*", "matchCriteriaId": "5E280740-2FD3-459D-AF37-624DC6171F8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*", "matchCriteriaId": "CA2A106F-944D-42C5-BB4B-E81B97A57CDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*", "matchCriteriaId": "B14098E0-F40A-4C8E-B285-E96E6E604582", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code." }, { "lang": "es", "value": "Manipulaci\u00f3n incorrecta de longitud de b\u00fafer en la funci\u00f3n ncp_read_kernel en fs/ncpfs/ncplib_kernel.c en el kernel de Linux hasta la versi\u00f3n 4.15.11 y en drivers/staging/ncpfs/ncplib_kernel.c en el kernel de Linux 4.16-rc hasta 4.16-rc6 podr\u00eda ser explotada por servidores NCPFS maliciosos para cerrar inesperadamente el kernel o ejecutar c\u00f3digo." } ], "id": "CVE-2018-8822", "lastModified": "2024-03-28T16:08:31.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-20T17:29:00.423", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/12/27/3" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103476" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3653-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3653-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3654-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3654-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3655-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3655-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3656-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3657-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
wid-sec-w-2022-0532
Vulnerability from csaf_certbund
Published
2018-05-01 22:00
Modified
2023-05-18 22:00
Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Debian ist eine Linux-Distribution, die ausschließlich Freie Software enthält.
Oracle Linux ist ein Open Source Betriebssystem, welches unter der GNU General Public License (GPL) verfügbar ist.
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, einen Denial of Service Angriff durchzuführen, Sicherheitsmechanismen zu umgehen, vertrauliche Daten einzusehen oder seine Privilegien zu erweitern.
Betroffene Betriebssysteme
- Linux
- Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Debian ist eine Linux-Distribution, die ausschlie\u00dflich Freie Software enth\u00e4lt.\r\nOracle Linux ist ein Open Source Betriebssystem, welches unter der GNU General Public License (GPL) verf\u00fcgbar ist.\r\nDer Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, einen Denial of Service Angriff durchzuf\u00fchren, Sicherheitsmechanismen zu umgehen, vertrauliche Daten einzusehen oder seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0532 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2022-0532.json" }, { "category": "self", "summary": "WID-SEC-2022-0532 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0532" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2232-1 vom 2023-05-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014918.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1992-1 vom 2023-04-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014572.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1897-1 vom 2023-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014485.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1848-1 vom 2023-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014466.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3698-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3698-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3697-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3697-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3696-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3696-2" }, { "category": "external", "summary": "Debian Security Advisory DSA-4187-1 vom 2018-05-01", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "category": "external", "summary": "Debian Security Advisory DSA-4188-1 vom 2018-05-01", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4088 vom 2018-05-01", "url": "https://linux.oracle.com/errata/ELSA-2018-4088.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4087 vom 2018-05-01", "url": "https://linux.oracle.com/errata/ELSA-2018-4087.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4089 vom 2018-05-02", "url": "http://linux.oracle.com/errata/ELSA-2018-4089.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1173-1 vom 2018-05-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1172-1 vom 2018-05-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181172-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1318 vom 2018-05-09", "url": "http://www.auscert.org.au/bulletins/62478" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1355 vom 2018-05-09", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1318 vom 2018-05-09", "url": "http://linux.oracle.com/errata/ELSA-2018-1318.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1217-1 vom 2018-05-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181217-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1238-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181238-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1225-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181225-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1240-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181240-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1230-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181230-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1223-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181223-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1228-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181228-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1236-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181236-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1239-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181239-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1231-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181231-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1229-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181229-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1237-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181237-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1232-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181232-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1227-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181227-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1234-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181234-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1233-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181233-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1226-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181226-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1235-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181235-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1222-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181222-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1224-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181224-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1263-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181263-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1221-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181221-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1220-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181220-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1249-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181249-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1246-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181246-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1252-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181252-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1260-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181260-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1270-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181270-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1262-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181262-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1242-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181242-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1268-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181268-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1248-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181248-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1258-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181258-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1272-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181272-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1250-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181250-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1253-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181253-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1241-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181241-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1259-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181259-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1256-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181256-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1245-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181245-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1264-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181264-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1254-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181254-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1266-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181266-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1269-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181269-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1251-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181251-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1255-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181255-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1273-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181273-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1243-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181243-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1244-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181244-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1261-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181261-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1267-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181267-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1247-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181247-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1257-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181257-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1374 vom 2018-05-16", "url": "https://access.redhat.com/errata/RHSA-2018:1374" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1309-1 vom 2018-05-17", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181309-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1629 vom 2018-05-22", "url": "http://linux.oracle.com/errata/ELSA-2018-1629.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4114 vom 2018-05-23", "url": "http://linux.oracle.com/errata/ELSA-2018-4114.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1366-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1375-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181375-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1376-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1386-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181386-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1368-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181368-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1374-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181374-1.html" }, { "category": "external", "summary": "Oraclevm-errata OVMSA-2018-0223 vom 2018-05-23", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-May/000858.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1465-1 vom 2018-05-30", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181465-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1498-1 vom 2018-06-05", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181498-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1508-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181508-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1551-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181551-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1525-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181525-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1536-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181536-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1511-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181511-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1545-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181545-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1522-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181522-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1530-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181530-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1534-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181534-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1524-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181524-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1505-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181505-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1510-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181510-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1516-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181516-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1523-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181523-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1532-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181532-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1531-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181531-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1521-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181521-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1518-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181518-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1506-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181506-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1548-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181548-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1514-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181514-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1541-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181541-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1546-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181546-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1519-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181519-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1509-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181509-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1528-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181528-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1537-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181537-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1513-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181513-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1512-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181512-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1538-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181538-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1517-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181517-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1535-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181535-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1529-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181529-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1549-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181549-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1540-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181540-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1520-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181520-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1526-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181526-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1533-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181533-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1539-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181539-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1543-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181543-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1571-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181571-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1570-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181570-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1567-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181567-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1636-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181636-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1644-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181644-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1639-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181639-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1645-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181645-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1641-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181641-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1640-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181640-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1637-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181637-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1648-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181648-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1642-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181642-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1643-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181643-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4145 vom 2018-06-16", "url": "http://linux.oracle.com/errata/ELSA-2018-4145.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4134 vom 2018-06-16", "url": "http://linux.oracle.com/errata/ELSA-2018-4134.html" }, { "category": "external", "summary": "Red Hat Security Advisory", "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1762-1 vom 2018-06-20", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181762-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1761-1 vom 2018-06-20", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181761-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1772-1 vom 2018-06-21", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181772-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1816-1 vom 2018-06-26", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1854 vom 2018-06-26", "url": "http://linux.oracle.com/errata/ELSA-2018-1854.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4161 vom 2018-07-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4161.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4164 vom 2018-07-11", "url": "http://linux.oracle.com/errata/ELSA-2018-4164.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2162 vom 2018-07-11", "url": "http://linux.oracle.com/errata/ELSA-2018-2162.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2082-1 vom 2018-07-28", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182082-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2092-1 vom 2018-07-28", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2150-1 vom 2018-08-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182150-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2222-1 vom 2018-08-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182222-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4193 vom 2018-08-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4193.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2384 vom 2018-08-15", "url": "http://linux.oracle.com/errata/ELSA-2018-2384.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2390 vom 2018-08-15", "url": "http://linux.oracle.com/errata/ELSA-2018-2390.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-14", "url": "http://rhn.redhat.com/errata/RHSA-2018-2390.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-14", "url": "http://rhn.redhat.com/errata/RHSA-2018-2384.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2387 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2388 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2389 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2395 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2391 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2392 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2393 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2394 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2396 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2332-1 vom 2018-08-15", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182332-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2366-1 vom 2018-08-16", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182366-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4200 vom 2018-08-17", "url": "http://linux.oracle.com/errata/ELSA-2018-4200.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2637-1 vom 2018-09-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182637-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2631-1 vom 2018-09-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182631-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4211 vom 2018-09-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4211.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4308 vom 2018-10-01", "url": "https://www.debian.org/security/2018/dsa-4308" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3003-1 vom 2018-10-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3004-1 vom 2018-10-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183004-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3084-1 vom 2018-10-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183084-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4242 vom 2018-10-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4242.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4245 vom 2018-10-11", "url": "http://linux.oracle.com/errata/ELSA-2018-4245.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4250 vom 2018-10-13", "url": "http://linux.oracle.com/errata/ELSA-2018-4250.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2948 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:3096 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:3083 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3589-1 vom 2018-11-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183589-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3593-1 vom 2018-11-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183593-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-3083 vom 2018-11-06", "url": "http://linux.oracle.com/errata/ELSA-2018-3083.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3659-1 vom 2018-11-08", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183659-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4268 vom 2018-11-08", "url": "http://linux.oracle.com/errata/ELSA-2018-4268.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4269 vom 2018-11-08", "url": "http://linux.oracle.com/errata/ELSA-2018-4269.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4285 vom 2018-11-21", "url": "http://linux.oracle.com/errata/ELSA-2018-4285.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3934-1 vom 2018-11-29", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183934-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3961-1 vom 2018-12-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183961-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4301 vom 2018-12-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4301.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4304 vom 2018-12-12", "url": "http://linux.oracle.com/errata/ELSA-2018-4304.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:4069-1 vom 2018-12-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184069-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:4072-1 vom 2018-12-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184072-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4315 vom 2019-01-03", "url": "http://linux.oracle.com/errata/ELSA-2019-4315.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4316 vom 2019-01-04", "url": "http://linux.oracle.com/errata/ELSA-2019-4316.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4317 vom 2019-01-05", "url": "http://linux.oracle.com/errata/ELSA-2019-4317.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2018-252 vom 2020-01-07", "url": "https://downloads.avaya.com/css/P8/documents/101051981" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0095-1 vom 2019-01-16", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190095-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3880-2 vom 2019-02-05", "url": "https://usn.ubuntu.com/3880-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3910-1 vom 2019-03-16", "url": "https://usn.ubuntu.com/3910-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3910-1 vom 2019-03-16", "url": "https://usn.ubuntu.com/3910-2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:0641 vom 2019-03-26", "url": "https://access.redhat.com/errata/RHSA-2019:0641" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4596 vom 2019-04-01", "url": "http://linux.oracle.com/errata/ELSA-2019-4596.html" }, { "category": "external", "summary": "ORACLE OVMSA-2019-0014 vom 2019-05-03", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-May/000936.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1190 vom 2019-05-15", "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1170 vom 2019-05-15", "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1487 vom 2019-06-18", "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1483 vom 2019-06-18", "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2029 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2043 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4742 vom 2019-08-10", "url": "http://linux.oracle.com/errata/ELSA-2019-4742.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2029 vom 2019-08-14", "url": "http://linux.oracle.com/errata/ELSA-2019-2029.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2430-1 vom 2019-09-23", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192430-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2450-1 vom 2019-09-24", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0036 vom 2020-01-07", "url": "https://access.redhat.com/errata/RHSA-2020:0036" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4163-1 vom 2019-10-22", "url": "https://usn.ubuntu.com/4163-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4163-2 vom 2019-10-23", "url": "https://usn.ubuntu.com/4163-2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:4154 vom 2019-12-10", "url": "https://access.redhat.com/errata/RHSA-2019:4154" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:4159 vom 2019-12-10", "url": "https://access.redhat.com/errata/RHSA-2019:4159" }, { "category": "external", "summary": "Debian Security Advisory DLA 2148 vom 2020-04-01", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1587-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1603-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1599-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1602-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006932.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1604-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1602-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1599-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006924.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1605-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006930.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1605-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1671-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1656-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1663-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1646-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1754-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1758-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1775-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2156-1 vom 2020-08-07", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2323 vom 2020-08-12", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202008/msg00019.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4486-1 vom 2020-09-02", "url": "https://usn.ubuntu.com/4486-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2478-1 vom 2020-09-03", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2487-1 vom 2020-09-04", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2861-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2862-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08", "url": "http://linux.oracle.com/errata/ELSA-2021-9473.html" }, { "category": "external", "summary": "ORACLE OVMSA-2021-0035 vom 2021-10-12", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1988 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1975 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "external", "summary": "Debian Security Advisory DLA-3065 vom 2022-07-01", "url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9969 vom 2022-11-01", "url": "https://linux.oracle.com/errata/ELSA-2022-9969.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:50:57.999+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0532", "initial_release_date": "2018-05-01T22:00:00.000+00:00", "revision_history": [ { "date": "2018-05-01T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2018-05-01T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2018-05-02T22:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2018-05-08T22:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2018-05-10T22:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2018-05-13T22:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2018-05-15T22:00:00.000+00:00", "number": "7", "summary": "New remediations available" }, { "date": "2018-05-16T22:00:00.000+00:00", "number": "8", "summary": "New remediations available" }, { "date": "2018-05-21T22:00:00.000+00:00", "number": "9", "summary": "New remediations available" }, { "date": "2018-05-22T22:00:00.000+00:00", "number": "10", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "11", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "13", "summary": "Version nicht vorhanden" }, { "date": "2018-05-29T22:00:00.000+00:00", "number": "14", "summary": "New remediations available" }, { "date": "2018-06-05T22:00:00.000+00:00", "number": "15", "summary": "New remediations available" }, { "date": "2018-06-06T22:00:00.000+00:00", "number": "16", "summary": "New remediations available" }, { "date": "2018-06-07T22:00:00.000+00:00", "number": "17", "summary": "New remediations available" }, { "date": "2018-06-11T22:00:00.000+00:00", "number": "18", "summary": "New remediations available" }, { "date": "2018-06-17T22:00:00.000+00:00", "number": "19", "summary": "New remediations available" }, { "date": "2018-06-18T22:00:00.000+00:00", "number": "20", "summary": "New remediations available" }, { "date": "2018-06-19T22:00:00.000+00:00", "number": "21", "summary": "Added references" }, { "date": "2018-06-21T22:00:00.000+00:00", "number": "22", "summary": "New remediations available" }, { "date": "2018-06-24T22:00:00.000+00:00", "number": "23", "summary": "Added references" }, { "date": "2018-06-27T22:00:00.000+00:00", "number": "24", "summary": "Added references" }, { "date": "2018-07-10T22:00:00.000+00:00", "number": "25", "summary": "New remediations available" }, { "date": "2018-07-29T22:00:00.000+00:00", "number": "26", "summary": "New remediations available" }, { "date": "2018-08-01T22:00:00.000+00:00", "number": "27", "summary": "New remediations available" }, { "date": "2018-08-06T22:00:00.000+00:00", "number": "28", "summary": "New remediations available" }, { "date": "2018-08-09T22:00:00.000+00:00", "number": "29", "summary": "New remediations available" }, { "date": "2018-08-14T22:00:00.000+00:00", "number": "30", "summary": "New remediations available" }, { "date": "2018-08-14T22:00:00.000+00:00", "number": "31", "summary": "New remediations available" }, { "date": "2018-08-15T22:00:00.000+00:00", "number": "32", "summary": "New remediations available" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "33", "summary": "New remediations available" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "34", "summary": "Version nicht vorhanden" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "35", "summary": "Version nicht vorhanden" }, { "date": "2018-08-27T22:00:00.000+00:00", "number": "36", "summary": "Added references" }, { "date": "2018-09-06T22:00:00.000+00:00", "number": "37", "summary": "New remediations available" }, { "date": "2018-09-10T22:00:00.000+00:00", "number": "38", "summary": "New remediations available" }, { "date": "2018-10-01T22:00:00.000+00:00", "number": "39", "summary": "New remediations available" }, { "date": "2018-10-04T22:00:00.000+00:00", "number": "40", "summary": "New remediations available" }, { "date": "2018-10-09T22:00:00.000+00:00", "number": "41", "summary": "New remediations available" }, { "date": "2018-10-10T22:00:00.000+00:00", "number": "42", "summary": "New remediations available" }, { "date": "2018-10-14T22:00:00.000+00:00", "number": "43", "summary": "New remediations available" }, { "date": "2018-10-30T23:00:00.000+00:00", "number": "44", "summary": "New remediations available" }, { "date": "2018-10-31T23:00:00.000+00:00", "number": "45", "summary": "New remediations available" }, { "date": "2018-11-05T23:00:00.000+00:00", "number": "46", "summary": "New remediations available" }, { "date": "2018-11-07T23:00:00.000+00:00", "number": "47", "summary": "New remediations available" }, { "date": "2018-11-08T23:00:00.000+00:00", "number": "48", "summary": "New remediations available" }, { "date": "2018-11-20T23:00:00.000+00:00", "number": "49", "summary": "New remediations available" }, { "date": "2018-11-28T23:00:00.000+00:00", "number": "50", "summary": "New remediations available" }, { "date": "2018-12-02T23:00:00.000+00:00", "number": "51", "summary": "New remediations available" }, { "date": "2018-12-03T23:00:00.000+00:00", "number": "52", "summary": "Minor corrections" }, { "date": "2018-12-09T23:00:00.000+00:00", "number": "53", "summary": "New remediations available" }, { "date": "2018-12-11T23:00:00.000+00:00", "number": "54", "summary": "New remediations available" }, { "date": "2018-12-12T23:00:00.000+00:00", "number": "55", "summary": "New remediations available" }, { "date": "2019-01-03T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-01-06T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-01-15T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-02-04T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-03-17T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-03-25T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-03-31T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-05-05T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2019-05-15T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-06-17T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-08-06T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-08-11T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-08-13T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-09-23T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-09-24T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-10-21T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-10-22T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-12-09T23:00:00.000+00:00", "number": "73", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-12-09T23:00:00.000+00:00", "number": "74", "summary": "Version nicht vorhanden" }, { "date": "2020-01-06T23:00:00.000+00:00", "number": "75", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-01-07T23:00:00.000+00:00", "number": "76", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-04-01T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-06-09T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-11T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-18T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-25T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-08-06T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-08-12T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-09-01T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2020-09-03T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-09-06T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-08-29T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-10-10T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-10-11T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-03T22:00:00.000+00:00", "number": "91", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-11-01T23:00:00.000+00:00", "number": "92", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-04-16T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-18T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-24T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "96" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "6368", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux 7", "product": { "name": "Oracle Linux 7", "product_id": "287065", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:7" } } }, { "category": "product_name", "name": "Oracle Linux 6", "product": { "name": "Oracle Linux 6", "product_id": "T002988", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:6" } } }, { "category": "product_name", "name": "Oracle Linux 5", "product": { "name": "Oracle Linux 5", "product_id": "T003616", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:5" } } }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "product_name", "name": "Linux" }, { "category": "product_name", "name": "Oracle VM", "product": { "name": "Oracle VM", "product_id": "T011119", "product_identification_helper": { "cpe": "cpe:/a:oracle:vm:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9016", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2015-9016" }, { "cve": "CVE-2017-0861", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-0861" }, { "cve": "CVE-2017-13166", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-13166" }, { "cve": "CVE-2017-13220", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-13220" }, { "cve": "CVE-2017-16526", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-16526" }, { "cve": "CVE-2017-16911", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-16911" }, { "cve": "CVE-2017-16912", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-16912" }, { "cve": "CVE-2017-16913", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-16913" }, { "cve": "CVE-2017-16914", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-16914" }, { "cve": "CVE-2017-17975", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-17975" }, { "cve": "CVE-2017-18017", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18017" }, { "cve": "CVE-2017-18193", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18193" }, { "cve": "CVE-2017-18203", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18203" }, { "cve": "CVE-2017-18216", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18216" }, { "cve": "CVE-2017-18218", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18218" }, { "cve": "CVE-2017-18222", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18222" }, { "cve": "CVE-2017-18224", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18224" }, { "cve": "CVE-2017-18232", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18232" }, { "cve": "CVE-2017-18241", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18241" }, { "cve": "CVE-2017-18257", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-18257" }, { "cve": "CVE-2017-5715", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2017-5753" }, { "cve": "CVE-2018-1000004", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1000199", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1000199" }, { "cve": "CVE-2018-10323", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1065", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1065" }, { "cve": "CVE-2018-1066", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1066" }, { "cve": "CVE-2018-1068", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1092", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1092" }, { "cve": "CVE-2018-1093", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1093" }, { "cve": "CVE-2018-1108", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-1108" }, { "cve": "CVE-2018-5332", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-5333" }, { "cve": "CVE-2018-5750", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-5750" }, { "cve": "CVE-2018-5803", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-5803" }, { "cve": "CVE-2018-6927", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-6927" }, { "cve": "CVE-2018-7480", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7480" }, { "cve": "CVE-2018-7492", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7492" }, { "cve": "CVE-2018-7566", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7566" }, { "cve": "CVE-2018-7740", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7740" }, { "cve": "CVE-2018-7757", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7757" }, { "cve": "CVE-2018-7995", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-7995" }, { "cve": "CVE-2018-8087", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8781", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00Z", "title": "CVE-2018-8822" } ] }
ghsa-h62p-crx4-36fq
Vulnerability from github
Published
2022-05-14 01:29
Modified
2024-03-28 18:30
Severity ?
Details
Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.
{ "affected": [], "aliases": [ "CVE-2018-8822" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-03-20T17:29:00Z", "severity": "HIGH" }, "details": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "id": "GHSA-h62p-crx4-36fq", "modified": "2024-03-28T18:30:46Z", "published": "2022-05-14T01:29:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8822" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3653-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3653-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3654-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3654-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3655-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3655-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3656-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3657-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "type": "WEB", "url": "https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html" }, { "type": "WEB", "url": "https://www.mail-archive.com/netdev@vger.kernel.org/msg223373.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/12/27/3" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/103476" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.