Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-47075 (GCVE-0-2021-47075)
Vulnerability from cvelistv5 – Published: 2024-03-01 21:15 – Updated: 2025-05-04 07:03
VLAI?
EPSS
Title
nvmet: fix memory leak in nvmet_alloc_ctrl()
Summary
In the Linux kernel, the following vulnerability has been resolved:
nvmet: fix memory leak in nvmet_alloc_ctrl()
When creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger
than cntlid_max of the subsystem, and jumps to the
"out_free_changed_ns_list" label, but the ctrl->sqs lack of be freed.
Fix this by jumping to the "out_free_sqs" label.
Severity ?
5.3 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
94a39d61f80fcd679debda11e1ca02b88d90e67e , < 4720f29acb3fe67aa8aa71e6b675b079d193aaeb
(git)
Affected: 94a39d61f80fcd679debda11e1ca02b88d90e67e , < afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a (git) Affected: 94a39d61f80fcd679debda11e1ca02b88d90e67e , < fec356a61aa3d3a66416b4321f1279e09e0f256f (git) |
||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2021-47075",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-05T15:41:37.390042Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-06T21:34:27.643Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-04T05:24:39.501Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/nvme/target/core.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "4720f29acb3fe67aa8aa71e6b675b079d193aaeb",
"status": "affected",
"version": "94a39d61f80fcd679debda11e1ca02b88d90e67e",
"versionType": "git"
},
{
"lessThan": "afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a",
"status": "affected",
"version": "94a39d61f80fcd679debda11e1ca02b88d90e67e",
"versionType": "git"
},
{
"lessThan": "fec356a61aa3d3a66416b4321f1279e09e0f256f",
"status": "affected",
"version": "94a39d61f80fcd679debda11e1ca02b88d90e67e",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/nvme/target/core.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.7"
},
{
"lessThan": "5.7",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.40",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"version": "5.12.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "5.13",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.40",
"versionStartIncluding": "5.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.12.7",
"versionStartIncluding": "5.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.13",
"versionStartIncluding": "5.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix memory leak in nvmet_alloc_ctrl()\n\nWhen creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger\nthan cntlid_max of the subsystem, and jumps to the\n\"out_free_changed_ns_list\" label, but the ctrl-\u003esqs lack of be freed.\nFix this by jumping to the \"out_free_sqs\" label."
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T07:03:39.701Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb"
},
{
"url": "https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a"
},
{
"url": "https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f"
}
],
"title": "nvmet: fix memory leak in nvmet_alloc_ctrl()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2021-47075",
"datePublished": "2024-03-01T21:15:12.739Z",
"dateReserved": "2024-02-29T22:33:44.297Z",
"dateUpdated": "2025-05-04T07:03:39.701Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-47075\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-03-01T22:15:47.170\",\"lastModified\":\"2025-03-19T16:09:56.997\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnvmet: fix memory leak in nvmet_alloc_ctrl()\\n\\nWhen creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger\\nthan cntlid_max of the subsystem, and jumps to the\\n\\\"out_free_changed_ns_list\\\" label, but the ctrl-\u003esqs lack of be freed.\\nFix this by jumping to the \\\"out_free_sqs\\\" label.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: repara la p\u00e9rdida de memoria en nvmet_alloc_ctrl() Al crear ctrl en nvmet_alloc_ctrl(), si cntlid_min es mayor que cntlid_max del subsistema y salta a la etiqueta \\\"out_free_changed_ns_list\\\", pero el ctrl-\u0026gt;sqs falta para liberarse. Solucione este problema saltando a la etiqueta \\\"out_free_sqs\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.7\",\"versionEndExcluding\":\"5.10.40\",\"matchCriteriaId\":\"A08070AB-8918-463D-B6C3-0E1A14F0D0CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.12.7\",\"matchCriteriaId\":\"E8F2CE30-38B0-4716-B12B-A139B0F9C5C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"96AC23B2-D46A-49D9-8203-8E1BEDCA8532\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:24:39.501Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47075\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-05T15:41:37.390042Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:14.970Z\"}}], \"cna\": {\"title\": \"nvmet: fix memory leak in nvmet_alloc_ctrl()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"94a39d61f80fcd679debda11e1ca02b88d90e67e\", \"lessThan\": \"4720f29acb3fe67aa8aa71e6b675b079d193aaeb\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"94a39d61f80fcd679debda11e1ca02b88d90e67e\", \"lessThan\": \"afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"94a39d61f80fcd679debda11e1ca02b88d90e67e\", \"lessThan\": \"fec356a61aa3d3a66416b4321f1279e09e0f256f\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/nvme/target/core.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.7\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.7\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.40\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/nvme/target/core.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb\"}, {\"url\": \"https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a\"}, {\"url\": \"https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnvmet: fix memory leak in nvmet_alloc_ctrl()\\n\\nWhen creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger\\nthan cntlid_max of the subsystem, and jumps to the\\n\\\"out_free_changed_ns_list\\\" label, but the ctrl-\u003esqs lack of be freed.\\nFix this by jumping to the \\\"out_free_sqs\\\" label.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.40\", \"versionStartIncluding\": \"5.7\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.12.7\", \"versionStartIncluding\": \"5.7\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.13\", \"versionStartIncluding\": \"5.7\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T07:03:39.701Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-47075\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T07:03:39.701Z\", \"dateReserved\": \"2024-02-29T22:33:44.297Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-03-01T21:15:12.739Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
BDU:2025-07272
Vulnerability from fstec - Published: 19.05.2021
VLAI Severity ?
Title
Уязвимость функции nvmet_alloc_ctrl() модуля drivers/nvme/target/core.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость функции nvmet_alloc_ctrl() модуля drivers/nvme/target/core.c ядра операционной системы Linux связана с ошибками в настройках безопасности. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании
Severity ?
Vendor
Сообщество свободного программного обеспечения
Software Name
Linux
Software Version
от 5.11 до 5.12.6 включительно (Linux), от 5.7 до 5.10.39 включительно (Linux)
Possible Mitigations
В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Linux:
https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb
https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a
https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f
https://git.kernel.org/linus/fec356a61aa3d3a66416b4321f1279e09e0f256f
https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47075-8d12@gregkh/T/#u
Reference
https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47075-8d12@gregkh/T/#u
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47075
https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb
https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a
https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f
https://git.kernel.org/linus/fec356a61aa3d3a66416b4321f1279e09e0f256f
https://www.cve.org/CVERecord?id=CVE-2021-47075
https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47075-8d12@gregkh/
https://git.linuxtesting.ru/pub/scm/linux/kernel/git/lvc/linux-stable.git/commit/?h=v5.10.176-lvc1&id=4720f29acb3fe67aa8aa71e6b675b079d193aaeb
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.40
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.7
CWE
CWE-402
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 5.11 \u0434\u043e 5.12.6 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 5.7 \u0434\u043e 5.10.39 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb\nhttps://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a\nhttps://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f\nhttps://git.kernel.org/linus/fec356a61aa3d3a66416b4321f1279e09e0f256f\nhttps://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47075-8d12@gregkh/T/#u",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "19.05.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "25.06.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "23.06.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-07272",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-47075",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.11 \u0434\u043e 5.12.6 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.7 \u0434\u043e 5.10.39 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 nvmet_alloc_ctrl() \u043c\u043e\u0434\u0443\u043b\u044f drivers/nvme/target/core.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041f\u0435\u0440\u0435\u0432\u043e\u0434 \u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0432 \u043d\u043e\u0432\u0443\u044e \u043e\u0431\u043b\u0430\u0441\u0442\u044c (\u00ab\u0423\u0442\u0435\u0447\u043a\u0430 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432\u00bb) (CWE-402)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 nvmet_alloc_ctrl() \u043c\u043e\u0434\u0443\u043b\u044f drivers/nvme/target/core.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0432 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430\u0445 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47075-8d12@gregkh/T/#u\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47075\nhttps://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb\nhttps://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a\nhttps://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f\nhttps://git.kernel.org/linus/fec356a61aa3d3a66416b4321f1279e09e0f256f\nhttps://www.cve.org/CVERecord?id=CVE-2021-47075\nhttps://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47075-8d12@gregkh/\nhttps://git.linuxtesting.ru/pub/scm/linux/kernel/git/lvc/linux-stable.git/commit/?h=v5.10.176-lvc1\u0026id=4720f29acb3fe67aa8aa71e6b675b079d193aaeb\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.40\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.7",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-402",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,3)"
}
GSD-2021-47075
Vulnerability from gsd - Updated: 2024-03-01 06:04Details
In the Linux kernel, the following vulnerability has been resolved:
nvmet: fix memory leak in nvmet_alloc_ctrl()
When creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger
than cntlid_max of the subsystem, and jumps to the
"out_free_changed_ns_list" label, but the ctrl->sqs lack of be freed.
Fix this by jumping to the "out_free_sqs" label.
Aliases
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-47075"
],
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix memory leak in nvmet_alloc_ctrl()\n\nWhen creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger\nthan cntlid_max of the subsystem, and jumps to the\n\"out_free_changed_ns_list\" label, but the ctrl-\u003esqs lack of be freed.\nFix this by jumping to the \"out_free_sqs\" label.",
"id": "GSD-2021-47075",
"modified": "2024-03-01T06:04:48.313995Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@kernel.org",
"ID": "CVE-2021-47075",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "94a39d61f80f",
"version_value": "4720f29acb3f"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"status": "affected",
"version": "5.7"
},
{
"lessThan": "5.7",
"status": "unaffected",
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.40",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"version": "5.12.7",
"versionType": "custom"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "5.13",
"versionType": "original_commit_for_fix"
}
]
}
}
]
}
}
]
},
"vendor_name": "Linux"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix memory leak in nvmet_alloc_ctrl()\n\nWhen creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger\nthan cntlid_max of the subsystem, and jumps to the\n\"out_free_changed_ns_list\" label, but the ctrl-\u003esqs lack of be freed.\nFix this by jumping to the \"out_free_sqs\" label."
}
]
},
"generator": {
"engine": "bippy-4986f5686161"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb"
},
{
"name": "https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a"
},
{
"name": "https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix memory leak in nvmet_alloc_ctrl()\n\nWhen creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger\nthan cntlid_max of the subsystem, and jumps to the\n\"out_free_changed_ns_list\" label, but the ctrl-\u003esqs lack of be freed.\nFix this by jumping to the \"out_free_sqs\" label."
}
],
"id": "CVE-2021-47075",
"lastModified": "2024-03-01T22:22:25.913",
"metrics": {},
"published": "2024-03-01T22:15:47.170",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
}
}
}
WID-SEC-W-2024-0534
Vulnerability from csaf_certbund - Published: 2024-03-03 23:00 - Updated: 2026-02-12 23:00Summary
Linux Kernel: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff: Ein lokaler Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand herbeizuführen oder einen nicht spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme: - Linux
References
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren oder einen nicht spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0534 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0534.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0534 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0534"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030141-CVE-2021-47069-5797@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030141-CVE-2021-47070-0525@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030141-CVE-2021-47071-cd46@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030141-CVE-2021-47072-52d4@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47073-704a@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47074-46a7@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47075-8d12@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47077-994b@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47078-71f9@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47079-3934@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030143-CVE-2021-47081-e590@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030251-CVE-2023-52518-bcfa@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030252-CVE-2022-48627-c7bf@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030252-CVE-2023-52559-680e@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030252-CVE-2023-52560-c3de@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52561-89b2@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52563-269f@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52564-88cb@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030254-CVE-2023-52565-07ce@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030254-CVE-2023-52566-69f0@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030254-CVE-2023-52567-38c1@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52568-b5c6@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52569-a9c1@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52570-0789@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52571-087e@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030255-CVE-2024-26621-9300@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030256-CVE-2023-52572-2b92@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030256-CVE-2023-52573-531c@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030256-CVE-2023-52574-a423@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030256-CVE-2023-52575-34bf@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030257-CVE-2023-52576-7ee2@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030257-CVE-2023-52577-2638@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030257-CVE-2023-52578-50cb@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030257-CVE-2023-52579-af56@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030258-CVE-2023-52580-c37e@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030258-CVE-2023-52581-2165@gregkh/"
},
{
"category": "external",
"summary": "CVE Announce auf lore.kernel.org vom 2024-03-03",
"url": "http://lore.kernel.org/linux-cve-announce/2024030258-CVE-2023-52582-07c8@gregkh/"
},
{
"category": "external",
"summary": "RedHat Bugzilla vom 2024-03-03",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267507"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-86jx-fj9h-9hp8"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-f8jx-pmvg-jgfh"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-fh4f-4w54-vgrf"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-h234-f9wp-jpmr"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-hr4c-2jrx-4v7g"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-j6qg-38wf-82gm"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-mvcc-fjcm-33jm"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-mx24-9c8c-52xx"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-r9r6-c43w-4hr8"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-vhp7-fvvc-gp4m"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-vvwp-xfww-2qhh"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-w2cg-jcf6-hrgr"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-x9q8-72p3-mmvx"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-xc3g-cm27-mcmg"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-03-03",
"url": "https://github.com/advisories/GHSA-xqf9-qrgq-fxfv"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0855-1 vom 2024-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0856-1 vom 2024-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0857-1 vom 2024-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0900-1 vom 2024-03-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0900-2 vom 2024-03-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0975-1 vom 2024-03-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0925-1 vom 2024-03-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0976-1 vom 2024-03-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0926-1 vom 2024-03-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0977-1 vom 2024-03-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1320-1 vom 2024-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018372.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1322-1 vom 2024-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018374.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1321-1 vom 2024-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018375.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1322-2 vom 2024-04-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1332-1 vom 2024-04-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018376.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1332-2 vom 2024-04-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1454-1 vom 2024-04-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018431.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1466-1 vom 2024-04-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018438.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2394 vom 2024-04-30",
"url": "https://access.redhat.com/errata/RHSA-2024:2394"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1480-1 vom 2024-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018444.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1490-1 vom 2024-05-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018445.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-198 vom 2024-05-08",
"url": "https://www.dell.com/support/kbdoc/000224827/dsa-2024-="
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1645-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018527.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1646-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018526.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1642-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018530.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1643-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018529.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1648-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018524.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1650-1 vom 2024-05-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1659-1 vom 2024-05-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018538.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6778-1 vom 2024-05-16",
"url": "https://ubuntu.com/security/notices/USN-6778-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6777-1 vom 2024-05-16",
"url": "https://ubuntu.com/security/notices/USN-6777-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6777-2 vom 2024-05-20",
"url": "https://ubuntu.com/security/notices/USN-6777-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1648-2 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018572.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6777-3 vom 2024-05-22",
"url": "https://ubuntu.com/security/notices/USN-6777-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2950 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2950"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3138 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3138"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6777-4 vom 2024-05-23",
"url": "https://ubuntu.com/security/notices/USN-6777-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3462 vom 2024-05-29",
"url": "https://access.redhat.com/errata/RHSA-2024:3462"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1870-1 vom 2024-05-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018634.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3530 vom 2024-05-31",
"url": "https://access.redhat.com/errata/RHSA-2024:3530"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3528 vom 2024-05-31",
"url": "https://access.redhat.com/errata/RHSA-2024:3528"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3529 vom 2024-05-31",
"url": "https://access.redhat.com/errata/RHSA-2024:3529"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3618 vom 2024-06-05",
"url": "https://access.redhat.com/errata/RHSA-2024:3618"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3627 vom 2024-06-05",
"url": "https://access.redhat.com/errata/RHSA-2024:3627"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-3618 vom 2024-06-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-3618.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7156774 vom 2024-06-07",
"url": "https://www.ibm.com/support/pages/node/7156774"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1979-1 vom 2024-06-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018685.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1983-1 vom 2024-06-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018700.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3810 vom 2024-06-11",
"url": "https://access.redhat.com/errata/RHSA-2024:3810"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6831-1 vom 2024-06-12",
"url": "https://ubuntu.com/security/notices/USN-6831-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2183-1 vom 2024-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018808.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2184-1 vom 2024-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018807.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2185-1 vom 2024-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018809.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3840 vom 2024-06-27",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4211 vom 2024-07-02",
"url": "https://access.redhat.com/errata/RHSA-2024:4211"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4211 vom 2024-07-03",
"url": "https://linux.oracle.com/errata/ELSA-2024-4211.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-022 vom 2024-07-03",
"url": "https://www.dell.com/support/kbdoc/de-de/000226633/dsa-2024-022-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6867-1 vom 2024-07-04",
"url": "https://ubuntu.com/security/notices/USN-6867-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4352 vom 2024-07-08",
"url": "https://access.redhat.com/errata/RHSA-2024:4352"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4321 vom 2024-07-10",
"url": "https://access.redhat.com/errata/RHSA-2024:4321"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6896-1 vom 2024-07-12",
"url": "https://ubuntu.com/security/notices/USN-6896-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4533 vom 2024-07-15",
"url": "https://access.redhat.com/errata/RHSA-2024:4533"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4211 vom 2024-07-15",
"url": "https://errata.build.resf.org/RLSA-2024:4211"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4554 vom 2024-07-16",
"url": "https://access.redhat.com/errata/RHSA-2024:4554"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4352 vom 2024-07-15",
"url": "https://errata.build.resf.org/RLSA-2024:4352"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6896-2 vom 2024-07-16",
"url": "https://ubuntu.com/security/notices/USN-6896-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4583 vom 2024-07-17",
"url": "https://access.redhat.com/errata/RHSA-2024:4583"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6896-3 vom 2024-07-17",
"url": "https://ubuntu.com/security/notices/USN-6896-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4583 vom 2024-07-19",
"url": "https://linux.oracle.com/errata/ELSA-2024-4583.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18",
"url": "https://access.redhat.com/errata/RHSA-2024:4631"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6896-4 vom 2024-07-19",
"url": "https://ubuntu.com/security/notices/USN-6896-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6896-5 vom 2024-07-23",
"url": "https://ubuntu.com/security/notices/USN-6896-5"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4823 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4823"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4831 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4831"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4583 vom 2024-07-26",
"url": "https://errata.build.resf.org/RLSA-2024:4583"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7162077 vom 2024-07-31",
"url": "https://www.ibm.com/support/pages/node/7162077"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06",
"url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12571 vom 2024-08-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-12571.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12570 vom 2024-08-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-12570.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0010 vom 2024-08-08",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-August/001098.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5255 vom 2024-08-13",
"url": "https://access.redhat.com/errata/RHSA-2024:5255"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-079 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-079.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2615 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2615.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1663-1 vom 2024-08-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MFQEXBT2XPZQJMUF7MN6ZVO5FXVY4NKK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1489-1 vom 2024-08-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/D5LYDXV5ACGHUYO5XWLWD5VAOA5HLJ7U/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1465-1 vom 2024-08-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5692 vom 2024-08-21",
"url": "https://access.redhat.com/errata/RHSA-2024:5692"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12606 vom 2024-09-03",
"url": "https://linux.oracle.com/errata/ELSA-2024-12606.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6206 vom 2024-09-03",
"url": "https://access.redhat.com/errata/RHSA-2024:6206"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0011 vom 2024-09-04",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-September/001099.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7167662 vom 2024-09-05",
"url": "https://www.ibm.com/support/pages/node/7167662"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7028-1 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7028-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6998 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6998"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6993 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7169778 vom 2024-09-24",
"url": "https://www.ibm.com/support/pages/node/7169778"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26",
"url": "https://linux.oracle.com/errata/ELSA-2024-7000.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7039-1 vom 2024-09-26",
"url": "https://ubuntu.com/security/notices/USN-7039-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12682 vom 2024-09-30",
"url": "http://linux.oracle.com/errata/ELSA-2024-12682.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30",
"url": "https://errata.build.resf.org/RLSA-2024:7001"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3565-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3585-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019586.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16",
"url": "https://ubuntu.com/security/notices/USN-7069-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7028-2 vom 2024-10-17",
"url": "https://ubuntu.com/security/notices/USN-7028-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17",
"url": "https://ubuntu.com/security/notices/USN-7069-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7088-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04",
"url": "https://ubuntu.com/security/notices/USN-7088-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06",
"url": "https://ubuntu.com/security/notices/USN-7088-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9498 vom 2024-11-13",
"url": "https://access.redhat.com/errata/RHSA-2024:9498"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9315"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9497 vom 2024-11-13",
"url": "https://access.redhat.com/errata/RHSA-2024:9497"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7088-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7110-1 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7110-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7119-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7123-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25",
"url": "https://ubuntu.com/security/notices/USN-7121-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10",
"url": "https://ubuntu.com/security/notices/USN-7148-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7159-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4313-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PCO2TL4OCZ4YUXTF7OMLI6WH3WKDUC2G/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4317-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7179045 vom 2024-12-16",
"url": "https://www.ibm.com/support/pages/node/7179045"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7159-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7159-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7166-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7166-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4388-1 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7166-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-4 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7159-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-5 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7159-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7186-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7195-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7186-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7194-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7185-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7185-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14",
"url": "https://ubuntu.com/security/notices/USN-7195-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0202-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BJBRXAP3YP5FGCBO64GJZN6ZQOUKD53F/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0230-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2025-2895 vom 2025-02-13",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25398"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7183378 vom 2025-02-14",
"url": "https://www.ibm.com/support/pages/node/7183378"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7332-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2490 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2490"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0833-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020502.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-2 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7332-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7342-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7342-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7344-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0833-1 vom 2025-03-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVOTJPDFQQWPNLUFPKTQVNNMK5RQPZGP/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0835-1 vom 2025-03-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LBO7AHILADM6B4UZWMWGQKE6YTZU2AGF/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-3 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7332-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-2 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7344-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0853-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020506.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2705 vom 2025-03-18",
"url": "https://access.redhat.com/errata/RHSA-2025:2705"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0945-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2696 vom 2025-03-19",
"url": "https://access.redhat.com/errata/RHSA-2025:2696"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4342 vom 2025-04-30",
"url": "https://access.redhat.com/errata/RHSA-2025:4342"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20319 vom 2025-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-20319.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10701 vom 2025-07-09",
"url": "https://access.redhat.com/errata/RHSA-2025:10701"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7655-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7654-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7654-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7686-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-109 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-109.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-104 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-104.html"
},
{
"category": "external",
"summary": "Dell Security Update vom 2025-10-02",
"url": "https://www.dell.com/support/kbdoc/000376224"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7246320 vom 2025-10-06",
"url": "https://www.ibm.com/support/pages/node/7246320"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-112 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7853-2 vom 2025-10-30",
"url": "https://ubuntu.com/security/notices/USN-7853-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7853-3 vom 2025-11-07",
"url": "https://ubuntu.com/security/notices/USN-7853-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7865-1 vom 2025-11-10",
"url": "https://ubuntu.com/security/notices/USN-7865-1"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20251114-0011 vom 2025-11-14",
"url": "https://security.netapp.com/advisory/NTAP-20251114-0011"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7875-1 vom 2025-11-19",
"url": "https://ubuntu.com/security/notices/USN-7875-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7937-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7937-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-12T23:00:00.000+00:00",
"generator": {
"date": "2026-02-13T08:08:39.452+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2024-0534",
"initial_release_date": "2024-03-03T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-03-12T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-03-14T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-03-17T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-03-24T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-04-16T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-04-18T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-04-21T22:00:00.000+00:00",
"number": "8",
"summary": "Doppelte Eintragung korrigiert"
},
{
"date": "2024-04-28T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-01T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-02T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-07T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-05-14T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-15T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-16T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-05-20T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-05-23T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-02T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-04T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-06T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-06-09T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-06-10T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-11T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2024-06-12T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-06-24T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-27T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-07-01T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-02T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Oracle Linux und Dell aufgenommen"
},
{
"date": "2024-07-03T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-07T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-14T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-07-15T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2024-07-16T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-07-17T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-18T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2024-07-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-24T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-28T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-08-08T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2024-08-15T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-18T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-19T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-21T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-02T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-04T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2024-09-05T22:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-11T22:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-22T22:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Red Hat, IBM und SUSE aufgenommen"
},
{
"date": "2024-09-25T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-26T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-29T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-30T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-10T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-17T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-25T23:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-12-12T23:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-22T23:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-03-05T23:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-11T23:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-13T23:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-19T23:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "110",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "111",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "112",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "113",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "114",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "115",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "116",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "117",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "118",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-09T23:00:00.000+00:00",
"number": "119",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "120",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "121",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "122",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "123",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "123"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T034392",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
},
{
"category": "product_version",
"name": "virtual",
"product": {
"name": "Dell NetWorker virtual",
"product_id": "T034583",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual"
}
}
},
{
"category": "product_version_range",
"name": "\u003c19.11",
"product": {
"name": "Dell NetWorker \u003c19.11",
"product_id": "T035785"
}
},
{
"category": "product_version",
"name": "19.11",
"product": {
"name": "Dell NetWorker 19.11",
"product_id": "T035785-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:19.11"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
"product_id": "T045879"
}
},
{
"category": "product_version",
"name": "8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.4.0.0",
"product_id": "T045879-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
"product_id": "T045881"
}
},
{
"category": "product_version",
"name": "7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.70",
"product_id": "T045881-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
"product_id": "T047343"
}
},
{
"category": "product_version",
"name": "7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.40",
"product_id": "T047343-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
"product_id": "T047344"
}
},
{
"category": "product_version",
"name": "8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.1.10",
"product_id": "T047344-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
}
}
}
],
"category": "product_name",
"name": "PowerProtect Data Domain"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "EMC Avamar",
"product": {
"name": "EMC Avamar",
"product_id": "T014381",
"product_identification_helper": {
"cpe": "cpe:/a:emc:avamar:-"
}
}
}
],
"category": "vendor",
"name": "EMC"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "24.0.0",
"product": {
"name": "IBM Business Automation Workflow 24.0.0",
"product_id": "T036570",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:24.0.0"
}
}
}
],
"category": "product_name",
"name": "Business Automation Workflow"
},
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
},
{
"category": "product_version",
"name": "12.1",
"product": {
"name": "IBM Security Guardium 12.1",
"product_id": "T041237",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.1"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.16.3",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.16.3",
"product_id": "T037795"
}
},
{
"category": "product_version",
"name": "10.1.16.3",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.16.3",
"product_id": "T037795-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.16.3"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.5",
"product": {
"name": "IBM Storage Scale \u003c6.1.9.5",
"product_id": "T039851"
}
},
{
"category": "product_version",
"name": "6.1.9.5",
"product": {
"name": "IBM Storage Scale 6.1.9.5",
"product_id": "T039851-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_scale:6.1.9.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.2.0",
"product": {
"name": "IBM Storage Scale \u003c6.2.2.0",
"product_id": "T039852"
}
},
{
"category": "product_version",
"name": "6.2.2.0",
"product": {
"name": "IBM Storage Scale 6.2.2.0",
"product_id": "T039852-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_scale:6.2.2.0"
}
}
}
],
"category": "product_name",
"name": "Storage Scale"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.8",
"product": {
"name": "IBM Storage Scale System \u003c6.1.9.8",
"product_id": "T047416"
}
},
{
"category": "product_version",
"name": "6.1.9.8",
"product": {
"name": "IBM Storage Scale System 6.1.9.8",
"product_id": "T047416-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.3.1",
"product": {
"name": "IBM Storage Scale System \u003c6.2.3.1",
"product_id": "T047418"
}
},
{
"category": "product_version",
"name": "6.2.3.1",
"product": {
"name": "IBM Storage Scale System 6.2.3.1",
"product_id": "T047418-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.2.3.1"
}
}
}
],
"category": "product_name",
"name": "Storage Scale System"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp AFF",
"product": {
"name": "NetApp AFF",
"product_id": "T020536",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:aff:-"
}
}
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T033208",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47069",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47069"
},
{
"cve": "CVE-2021-47070",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47070"
},
{
"cve": "CVE-2021-47071",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47071"
},
{
"cve": "CVE-2021-47072",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47072"
},
{
"cve": "CVE-2021-47073",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47073"
},
{
"cve": "CVE-2021-47074",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47074"
},
{
"cve": "CVE-2021-47075",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47075"
},
{
"cve": "CVE-2021-47076",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47076"
},
{
"cve": "CVE-2021-47077",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47077"
},
{
"cve": "CVE-2021-47078",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47078"
},
{
"cve": "CVE-2021-47079",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47079"
},
{
"cve": "CVE-2021-47080",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47080"
},
{
"cve": "CVE-2021-47081",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2021-47081"
},
{
"cve": "CVE-2022-48627",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2022-48627"
},
{
"cve": "CVE-2022-48628",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2022-48628"
},
{
"cve": "CVE-2023-52505",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52505"
},
{
"cve": "CVE-2023-52518",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52518"
},
{
"cve": "CVE-2023-52519",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52519"
},
{
"cve": "CVE-2023-52520",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52520"
},
{
"cve": "CVE-2023-52521",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52521"
},
{
"cve": "CVE-2023-52522",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52522"
},
{
"cve": "CVE-2023-52523",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52523"
},
{
"cve": "CVE-2023-52524",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52524"
},
{
"cve": "CVE-2023-52525",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52525"
},
{
"cve": "CVE-2023-52526",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52526"
},
{
"cve": "CVE-2023-52527",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52527"
},
{
"cve": "CVE-2023-52528",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52528"
},
{
"cve": "CVE-2023-52529",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52529"
},
{
"cve": "CVE-2023-52531",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52531"
},
{
"cve": "CVE-2023-52532",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52532"
},
{
"cve": "CVE-2023-52559",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52559"
},
{
"cve": "CVE-2023-52560",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52560"
},
{
"cve": "CVE-2023-52561",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52561"
},
{
"cve": "CVE-2023-52562",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52562"
},
{
"cve": "CVE-2023-52563",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52563"
},
{
"cve": "CVE-2023-52564",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52564"
},
{
"cve": "CVE-2023-52565",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52565"
},
{
"cve": "CVE-2023-52566",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52566"
},
{
"cve": "CVE-2023-52567",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52567"
},
{
"cve": "CVE-2023-52568",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52568"
},
{
"cve": "CVE-2023-52569",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52569"
},
{
"cve": "CVE-2023-52570",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52570"
},
{
"cve": "CVE-2023-52571",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52571"
},
{
"cve": "CVE-2023-52572",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52572"
},
{
"cve": "CVE-2023-52573",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52573"
},
{
"cve": "CVE-2023-52574",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52574"
},
{
"cve": "CVE-2023-52575",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52575"
},
{
"cve": "CVE-2023-52576",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52576"
},
{
"cve": "CVE-2023-52577",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52577"
},
{
"cve": "CVE-2023-52578",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52578"
},
{
"cve": "CVE-2023-52579",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52579"
},
{
"cve": "CVE-2023-52580",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52580"
},
{
"cve": "CVE-2023-52581",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52581"
},
{
"cve": "CVE-2023-52582",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2023-52582"
},
{
"cve": "CVE-2024-26621",
"product_status": {
"known_affected": [
"67646",
"T011540",
"T034583",
"T004914",
"T039852",
"T037795",
"T039851",
"T021415",
"T031092",
"T024663",
"T047343",
"398363",
"T045881",
"T047344",
"T033208",
"T032255",
"T035785",
"T047416",
"T014381",
"T036570",
"2951",
"T002207",
"T034392",
"T045879",
"T020536",
"T000126",
"T047418",
"T041237"
]
},
"release_date": "2024-03-03T23:00:00.000+00:00",
"title": "CVE-2024-26621"
}
]
}
GHSA-F5X9-85F3-F3R4
Vulnerability from github – Published: 2024-03-02 00:31 – Updated: 2024-11-07 00:30
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
nvmet: fix memory leak in nvmet_alloc_ctrl()
When creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger than cntlid_max of the subsystem, and jumps to the "out_free_changed_ns_list" label, but the ctrl->sqs lack of be freed. Fix this by jumping to the "out_free_sqs" label.
Severity ?
5.3 (Medium)
{
"affected": [],
"aliases": [
"CVE-2021-47075"
],
"database_specific": {
"cwe_ids": [
"CWE-401"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-03-01T22:15:47Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix memory leak in nvmet_alloc_ctrl()\n\nWhen creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger\nthan cntlid_max of the subsystem, and jumps to the\n\"out_free_changed_ns_list\" label, but the ctrl-\u003esqs lack of be freed.\nFix this by jumping to the \"out_free_sqs\" label.",
"id": "GHSA-f5x9-85f3-f3r4",
"modified": "2024-11-07T00:30:35Z",
"published": "2024-03-02T00:31:31Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47075"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2021-47075
Vulnerability from fkie_nvd - Published: 2024-03-01 22:15 - Updated: 2025-03-19 16:09
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
nvmet: fix memory leak in nvmet_alloc_ctrl()
When creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger
than cntlid_max of the subsystem, and jumps to the
"out_free_changed_ns_list" label, but the ctrl->sqs lack of be freed.
Fix this by jumping to the "out_free_sqs" label.
References
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f | Patch |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 5.13 | |
| linux | linux_kernel | 5.13 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A08070AB-8918-463D-B6C3-0E1A14F0D0CB",
"versionEndExcluding": "5.10.40",
"versionStartIncluding": "5.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F2CE30-38B0-4716-B12B-A139B0F9C5C9",
"versionEndExcluding": "5.12.7",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix memory leak in nvmet_alloc_ctrl()\n\nWhen creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger\nthan cntlid_max of the subsystem, and jumps to the\n\"out_free_changed_ns_list\" label, but the ctrl-\u003esqs lack of be freed.\nFix this by jumping to the \"out_free_sqs\" label."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: repara la p\u00e9rdida de memoria en nvmet_alloc_ctrl() Al crear ctrl en nvmet_alloc_ctrl(), si cntlid_min es mayor que cntlid_max del subsistema y salta a la etiqueta \"out_free_changed_ns_list\", pero el ctrl-\u0026gt;sqs falta para liberarse. Solucione este problema saltando a la etiqueta \"out_free_sqs\"."
}
],
"id": "CVE-2021-47075",
"lastModified": "2025-03-19T16:09:56.997",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-03-01T22:15:47.170",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…