Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-47190 (GCVE-0-2021-47190)
Vulnerability from cvelistv5 – Published: 2024-04-10 18:56 – Updated: 2025-05-04 07:06
VLAI?
EPSS
Title
perf bpf: Avoid memory leak from perf_env__insert_btf()
Summary
In the Linux kernel, the following vulnerability has been resolved:
perf bpf: Avoid memory leak from perf_env__insert_btf()
perf_env__insert_btf() doesn't insert if a duplicate BTF id is
encountered and this causes a memory leak. Modify the function to return
a success/error value and then free the memory if insertion didn't
happen.
v2. Adds a return -1 when the insertion error occurs in
perf_env__fetch_btf. This doesn't affect anything as the result is
never checked.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
3792cb2ff43b1b193136a03ce1336462a827d792 , < 642fc22210a5e59d40b1e4d56d21ec3effd401f2
(git)
Affected: 3792cb2ff43b1b193136a03ce1336462a827d792 , < 11589d3144bc4e272e0aae46ce8156162e99babc (git) Affected: 3792cb2ff43b1b193136a03ce1336462a827d792 , < ab7c3d8d81c511ddfb27823fb07081c96422b56e (git) Affected: 3792cb2ff43b1b193136a03ce1336462a827d792 , < 4924b1f7c46711762fd0e65c135ccfbcfd6ded1f (git) |
||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T05:32:07.210Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-47190",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-10T15:50:08.099272Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T17:33:38.595Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"tools/perf/util/bpf-event.c",
"tools/perf/util/env.c",
"tools/perf/util/env.h"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "642fc22210a5e59d40b1e4d56d21ec3effd401f2",
"status": "affected",
"version": "3792cb2ff43b1b193136a03ce1336462a827d792",
"versionType": "git"
},
{
"lessThan": "11589d3144bc4e272e0aae46ce8156162e99babc",
"status": "affected",
"version": "3792cb2ff43b1b193136a03ce1336462a827d792",
"versionType": "git"
},
{
"lessThan": "ab7c3d8d81c511ddfb27823fb07081c96422b56e",
"status": "affected",
"version": "3792cb2ff43b1b193136a03ce1336462a827d792",
"versionType": "git"
},
{
"lessThan": "4924b1f7c46711762fd0e65c135ccfbcfd6ded1f",
"status": "affected",
"version": "3792cb2ff43b1b193136a03ce1336462a827d792",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"tools/perf/util/bpf-event.c",
"tools/perf/util/env.c",
"tools/perf/util/env.h"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.1"
},
{
"lessThan": "5.1",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.162",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.82",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "5.16",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.162",
"versionStartIncluding": "5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.82",
"versionStartIncluding": "5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.5",
"versionStartIncluding": "5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.16",
"versionStartIncluding": "5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf bpf: Avoid memory leak from perf_env__insert_btf()\n\nperf_env__insert_btf() doesn\u0027t insert if a duplicate BTF id is\nencountered and this causes a memory leak. Modify the function to return\na success/error value and then free the memory if insertion didn\u0027t\nhappen.\n\nv2. Adds a return -1 when the insertion error occurs in\n perf_env__fetch_btf. This doesn\u0027t affect anything as the result is\n never checked."
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T07:06:04.188Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2"
},
{
"url": "https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc"
},
{
"url": "https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e"
},
{
"url": "https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f"
}
],
"title": "perf bpf: Avoid memory leak from perf_env__insert_btf()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2021-47190",
"datePublished": "2024-04-10T18:56:28.815Z",
"dateReserved": "2024-03-25T09:12:14.113Z",
"dateUpdated": "2025-05-04T07:06:04.188Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-47190",
"date": "2026-04-14",
"epss": "0.0001",
"percentile": "0.01161"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-47190\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-04-10T19:15:47.617\",\"lastModified\":\"2025-01-07T17:11:50.810\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nperf bpf: Avoid memory leak from perf_env__insert_btf()\\n\\nperf_env__insert_btf() doesn\u0027t insert if a duplicate BTF id is\\nencountered and this causes a memory leak. Modify the function to return\\na success/error value and then free the memory if insertion didn\u0027t\\nhappen.\\n\\nv2. Adds a return -1 when the insertion error occurs in\\n perf_env__fetch_btf. This doesn\u0027t affect anything as the result is\\n never checked.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf bpf: Evitar p\u00e9rdida de memoria de perf_env__insert_btf() perf_env__insert_btf() no se inserta si se encuentra un ID de BTF duplicado y esto provoca una p\u00e9rdida de memoria. Modifique la funci\u00f3n para que devuelva un valor de \u00e9xito/error y luego libere la memoria si la inserci\u00f3n no ocurri\u00f3. v2. Agrega un retorno -1 cuando ocurre el error de inserci\u00f3n en perf_env__fetch_btf. Esto no afecta a nada ya que el resultado nunca se verifica.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.1\",\"versionEndExcluding\":\"5.4.162\",\"matchCriteriaId\":\"1EA79351-9450-4ADC-97B7-02437D35FBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.82\",\"matchCriteriaId\":\"AE501832-500C-4EF1-9489-5C13674F619D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.5\",\"matchCriteriaId\":\"2128A085-4C0C-4C1E-9E9C-0DD868E2170F\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:32:07.210Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47190\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:50:08.099272Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:17.827Z\"}}], \"cna\": {\"title\": \"perf bpf: Avoid memory leak from perf_env__insert_btf()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3792cb2ff43b\", \"lessThan\": \"642fc22210a5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3792cb2ff43b\", \"lessThan\": \"11589d3144bc\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3792cb2ff43b\", \"lessThan\": \"ab7c3d8d81c5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3792cb2ff43b\", \"lessThan\": \"4924b1f7c467\", \"versionType\": \"git\"}], \"programFiles\": [\"tools/perf/util/bpf-event.c\", \"tools/perf/util/env.c\", \"tools/perf/util/env.h\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.1\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.1\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.4.162\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.82\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"5.16\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"tools/perf/util/bpf-event.c\", \"tools/perf/util/env.c\", \"tools/perf/util/env.h\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2\"}, {\"url\": \"https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc\"}, {\"url\": \"https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e\"}, {\"url\": \"https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f\"}], \"x_generator\": {\"engine\": \"bippy-c8e10e5f6187\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nperf bpf: Avoid memory leak from perf_env__insert_btf()\\n\\nperf_env__insert_btf() doesn\u0027t insert if a duplicate BTF id is\\nencountered and this causes a memory leak. Modify the function to return\\na success/error value and then free the memory if insertion didn\u0027t\\nhappen.\\n\\nv2. Adds a return -1 when the insertion error occurs in\\n perf_env__fetch_btf. This doesn\u0027t affect anything as the result is\\n never checked.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-11-04T11:36:29.984Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-47190\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-04T11:36:29.984Z\", \"dateReserved\": \"2024-03-25T09:12:14.113Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-04-10T18:56:28.815Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
WID-SEC-W-2024-0851
Vulnerability from csaf_certbund - Published: 2024-04-10 22:00 - Updated: 2025-10-30 23:00Summary
Linux Kernel: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff: Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen oder unbekannte Auswirkungen zu verursachen.
Betroffene Betriebssysteme: - Linux
References
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0851 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0851.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0851 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0851"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041004-CVE-2021-47209-1cf6@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041004-CVE-2021-47210-1d37@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041004-CVE-2021-47211-cde3@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041005-CVE-2021-47212-01d8@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041005-CVE-2021-47213-c84f@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041005-CVE-2021-47214-59f9@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041005-CVE-2021-47215-2718@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041006-CVE-2021-47216-1700@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041006-CVE-2021-47217-a7d0@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041006-CVE-2021-47218-cdc8@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041006-CVE-2021-47219-c09e@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041006-CVE-2024-26815-7f4e@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041029-CVE-2021-47181-13bb@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041032-CVE-2021-47182-377e@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041033-CVE-2021-47183-e130@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041033-CVE-2021-47184-7544@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041033-CVE-2021-47185-c363@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041033-CVE-2021-47186-7287@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041034-CVE-2021-47187-b158@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041034-CVE-2021-47188-092a@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041034-CVE-2021-47189-a3f4@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041034-CVE-2021-47190-0261@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041034-CVE-2021-47191-ec4f@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041035-CVE-2021-47192-3d45@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041035-CVE-2021-47193-c4b0@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041035-CVE-2021-47194-51cd@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041035-CVE-2021-47195-38e8@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041036-CVE-2021-47196-d1b8@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041036-CVE-2021-47197-aaec@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041036-CVE-2021-47198-2426@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041036-CVE-2021-47199-604a@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47200-ae55@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47201-d7c8@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47202-58b2@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47203-ff72@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47204-82d1@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041038-CVE-2021-47205-3f43@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041038-CVE-2021-47206-fe4c@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041038-CVE-2021-47207-7ac9@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041039-CVE-2024-26816-5054@gregkh/T/"
},
{
"category": "external",
"summary": "Kernel CVE Announcement vom 2024-04-10",
"url": "https://lore.kernel.org/linux-cve-announce/2024041006-CVE-2024-26815-7f4e@gregkh/T/#u"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-F93CDD8831 vom 2024-04-15",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-f93cdd8831"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1454-1 vom 2024-04-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018431.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1490-1 vom 2024-05-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018445.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5680 vom 2024-05-06",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00089.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5681 vom 2024-05-06",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00090.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1641-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1648-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018524.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1647-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018525.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1646-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018526.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1644-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018528.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1642-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018530.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1643-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018529.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1645-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018527.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1650-1 vom 2024-05-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1659-1 vom 2024-05-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1648-2 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018572.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1870-1 vom 2024-05-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018634.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3618 vom 2024-06-05",
"url": "https://access.redhat.com/errata/RHSA-2024:3618"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12377 vom 2024-06-05",
"url": "https://oss.oracle.com/pipermail/el-errata/2024-June/015802.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3627 vom 2024-06-05",
"url": "https://access.redhat.com/errata/RHSA-2024:3627"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12385 vom 2024-06-05",
"url": "https://oss.oracle.com/pipermail/el-errata/2024-June/015806.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12385 vom 2024-06-05",
"url": "https://oss.oracle.com/pipermail/el-errata/2024-June/015807.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6817-1 vom 2024-06-08",
"url": "https://ubuntu.com/security/notices/USN-6817-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6816-1 vom 2024-06-08",
"url": "https://ubuntu.com/security/notices/USN-6816-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6821-2 vom 2024-06-10",
"url": "https://ubuntu.com/security/notices/USN-6821-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1979-1 vom 2024-06-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018685.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6817-2 vom 2024-06-11",
"url": "https://ubuntu.com/security/notices/USN-6817-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6821-3 vom 2024-06-11",
"url": "https://ubuntu.com/security/notices/USN-6821-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1983-1 vom 2024-06-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018700.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2008-1 vom 2024-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018706.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6821-4 vom 2024-06-14",
"url": "https://ubuntu.com/security/notices/USN-6821-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6817-3 vom 2024-06-14",
"url": "https://ubuntu.com/security/notices/USN-6817-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2135-1 vom 2024-06-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018783.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2185-1 vom 2024-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018809.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2184-1 vom 2024-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018807.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2183-1 vom 2024-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018808.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3842 vom 2024-06-25",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3840 vom 2024-06-27",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-022 vom 2024-07-03",
"url": "https://www.dell.com/support/kbdoc/de-de/000226633/dsa-2024-022-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6871-1 vom 2024-07-04",
"url": "https://ubuntu.com/security/notices/USN-6871-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6878-1 vom 2024-07-04",
"url": "https://ubuntu.com/security/notices/USN-6878-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2360-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018907.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2381-1 vom 2024-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018916.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6892-1 vom 2024-07-10",
"url": "https://ubuntu.com/security/notices/USN-6892-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6893-1 vom 2024-07-11",
"url": "https://ubuntu.com/security/notices/USN-6893-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6896-1 vom 2024-07-12",
"url": "https://ubuntu.com/security/notices/USN-6896-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6898-1 vom 2024-07-15",
"url": "https://ubuntu.com/security/notices/USN-6898-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2493-1 vom 2024-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018984.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6893-2 vom 2024-07-16",
"url": "https://ubuntu.com/security/notices/USN-6893-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6896-2 vom 2024-07-16",
"url": "https://ubuntu.com/security/notices/USN-6896-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6896-3 vom 2024-07-17",
"url": "https://ubuntu.com/security/notices/USN-6896-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6898-2 vom 2024-07-17",
"url": "https://ubuntu.com/security/notices/USN-6898-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6896-4 vom 2024-07-19",
"url": "https://ubuntu.com/security/notices/USN-6896-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6898-3 vom 2024-07-19",
"url": "https://ubuntu.com/security/notices/USN-6898-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6893-3 vom 2024-07-23",
"url": "https://ubuntu.com/security/notices/USN-6893-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6896-5 vom 2024-07-23",
"url": "https://ubuntu.com/security/notices/USN-6896-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6898-4 vom 2024-07-23",
"url": "https://ubuntu.com/security/notices/USN-6898-4"
},
{
"category": "external",
"summary": "SEM 2024.2.1 release notes vom 2024-07-23",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2024-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6918-1 vom 2024-07-26",
"url": "https://ubuntu.com/security/notices/USN-6918-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6917-1 vom 2024-07-26",
"url": "https://ubuntu.com/security/notices/USN-6917-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6919-1 vom 2024-07-26",
"url": "https://ubuntu.com/security/notices/USN-6919-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6927-1 vom 2024-07-30",
"url": "https://ubuntu.com/security/notices/USN-6927-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6938-1 vom 2024-07-31",
"url": "https://ubuntu.com/security/notices/USN-6938-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7162077 vom 2024-07-31",
"url": "https://www.ibm.com/support/pages/node/7162077"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06",
"url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2895-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2893-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2923-1 vom 2024-08-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2948-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1489-1 vom 2024-08-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/D5LYDXV5ACGHUYO5XWLWD5VAOA5HLJ7U/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1663-1 vom 2024-08-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MFQEXBT2XPZQJMUF7MN6ZVO5FXVY4NKK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1465-1 vom 2024-08-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12606 vom 2024-09-03",
"url": "https://linux.oracle.com/errata/ELSA-2024-12606.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0011 vom 2024-09-04",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-September/001099.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7022-1 vom 2024-09-18",
"url": "https://ubuntu.com/security/notices/USN-7022-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7028-1 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7028-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7039-1 vom 2024-09-26",
"url": "https://ubuntu.com/security/notices/USN-7039-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7022-2 vom 2024-10-01",
"url": "https://ubuntu.com/security/notices/USN-7022-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7022-3 vom 2024-10-10",
"url": "https://ubuntu.com/security/notices/USN-7022-3"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7028-2 vom 2024-10-17",
"url": "https://ubuntu.com/security/notices/USN-7028-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7088-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04",
"url": "https://ubuntu.com/security/notices/USN-7088-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06",
"url": "https://ubuntu.com/security/notices/USN-7088-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9315"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7088-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7119-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0203-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOWH4UGAPWTJ6YHNMWYKOS2OKUX53GLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0231-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7393-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7391-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7401-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7413-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7463-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13",
"url": "https://ubuntu.com/security/notices/USN-7506-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7516-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7517-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7518-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7516-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7517-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7516-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
"url": "https://ubuntu.com/security/notices/USN-7516-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7517-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7516-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-9"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06",
"url": "https://ubuntu.com/security/notices/USN-7553-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01995-1 vom 2025-06-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021572.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-2 vom 2025-06-19",
"url": "https://ubuntu.com/security/notices/USN-7585-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-1 vom 2025-06-19",
"url": "https://ubuntu.com/security/notices/USN-7585-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-3 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7585-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-4 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7585-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-5 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7585-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-6 vom 2025-07-03",
"url": "https://ubuntu.com/security/notices/USN-7585-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-7 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7585-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7640-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11810 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11810"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-104 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-104.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-404 vom 2025-10-31",
"url": "https://www.dell.com/support/kbdoc/000385435"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-30T23:00:00.000+00:00",
"generator": {
"date": "2025-10-31T10:08:36.338+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-0851",
"initial_release_date": "2024-04-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-04-15T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-04-28T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-02T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-06T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-05-14T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-15T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-04T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-05T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-06-09T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-06-10T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-06-11T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-06-12T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-16T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-06-23T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-24T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-25T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-06-27T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-07-02T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-07-03T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-04T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-11T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-14T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-15T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-16T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-17T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-18T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-22T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-23T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2024-07-28T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu und IBM aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-14T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-15T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-18T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-19T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-02T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-04T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-22T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-26T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-01T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-17T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-11T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-05T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "87"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c19.11",
"product": {
"name": "Dell NetWorker \u003c19.11",
"product_id": "T035785"
}
},
{
"category": "product_version",
"name": "19.11",
"product": {
"name": "Dell NetWorker 19.11",
"product_id": "T035785-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:19.11"
}
}
},
{
"category": "product_version",
"name": "Virtual Edition",
"product": {
"name": "Dell NetWorker Virtual Edition",
"product_id": "T048226",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual_edition"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "EMC Avamar",
"product": {
"name": "EMC Avamar",
"product_id": "T014381",
"product_identification_helper": {
"cpe": "cpe:/a:emc:avamar:-"
}
}
}
],
"category": "vendor",
"name": "EMC"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T033646",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2024.2",
"product": {
"name": "SolarWinds Security Event Manager \u003c2024.2",
"product_id": "T034244"
}
},
{
"category": "product_version",
"name": "2024.2",
"product": {
"name": "SolarWinds Security Event Manager 2024.2",
"product_id": "T034244-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2024.2"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47182",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47182"
},
{
"cve": "CVE-2021-47183",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47183"
},
{
"cve": "CVE-2021-47184",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47184"
},
{
"cve": "CVE-2021-47185",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47185"
},
{
"cve": "CVE-2021-47186",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47186"
},
{
"cve": "CVE-2021-47187",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47187"
},
{
"cve": "CVE-2021-47188",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47188"
},
{
"cve": "CVE-2021-47189",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47189"
},
{
"cve": "CVE-2021-47190",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47190"
},
{
"cve": "CVE-2021-47191",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47191"
},
{
"cve": "CVE-2021-47192",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47192"
},
{
"cve": "CVE-2021-47193",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47193"
},
{
"cve": "CVE-2021-47194",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47194"
},
{
"cve": "CVE-2021-47195",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47195"
},
{
"cve": "CVE-2021-47196",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47196"
},
{
"cve": "CVE-2021-47197",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47197"
},
{
"cve": "CVE-2021-47198",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47198"
},
{
"cve": "CVE-2021-47199",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47199"
},
{
"cve": "CVE-2021-47200",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47200"
},
{
"cve": "CVE-2021-47201",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47201"
},
{
"cve": "CVE-2021-47202",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47202"
},
{
"cve": "CVE-2021-47203",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47203"
},
{
"cve": "CVE-2021-47204",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47204"
},
{
"cve": "CVE-2021-47205",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47205"
},
{
"cve": "CVE-2021-47206",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47206"
},
{
"cve": "CVE-2021-47207",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47207"
},
{
"cve": "CVE-2021-47208",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47208"
},
{
"cve": "CVE-2021-47210",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47210"
},
{
"cve": "CVE-2021-47211",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47211"
},
{
"cve": "CVE-2021-47212",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47212"
},
{
"cve": "CVE-2021-47213",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47213"
},
{
"cve": "CVE-2021-47214",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47214"
},
{
"cve": "CVE-2021-47215",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47215"
},
{
"cve": "CVE-2021-47216",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47216"
},
{
"cve": "CVE-2021-47217",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47217"
},
{
"cve": "CVE-2021-47218",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47218"
},
{
"cve": "CVE-2021-47219",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47219"
},
{
"cve": "CVE-2021-47220",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2021-47220"
},
{
"cve": "CVE-2024-26815",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2024-26815"
},
{
"cve": "CVE-2024-26816",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2024-26816"
},
{
"cve": "CVE-2024-26817",
"product_status": {
"known_affected": [
"67646",
"T033646",
"T004914",
"T035785",
"74185",
"T034244",
"T039664",
"T014381",
"2951",
"T002207",
"T000126",
"T024663",
"398363",
"T048226"
]
},
"release_date": "2024-04-10T22:00:00.000+00:00",
"title": "CVE-2024-26817"
}
]
}
FKIE_CVE-2021-47190
Vulnerability from fkie_nvd - Published: 2024-04-10 19:15 - Updated: 2025-01-07 17:11
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
perf bpf: Avoid memory leak from perf_env__insert_btf()
perf_env__insert_btf() doesn't insert if a duplicate BTF id is
encountered and this causes a memory leak. Modify the function to return
a success/error value and then free the memory if insertion didn't
happen.
v2. Adds a return -1 when the insertion error occurs in
perf_env__fetch_btf. This doesn't affect anything as the result is
never checked.
References
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e | Patch |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EA79351-9450-4ADC-97B7-02437D35FBB6",
"versionEndExcluding": "5.4.162",
"versionStartIncluding": "5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE501832-500C-4EF1-9489-5C13674F619D",
"versionEndExcluding": "5.10.82",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2128A085-4C0C-4C1E-9E9C-0DD868E2170F",
"versionEndExcluding": "5.15.5",
"versionStartIncluding": "5.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf bpf: Avoid memory leak from perf_env__insert_btf()\n\nperf_env__insert_btf() doesn\u0027t insert if a duplicate BTF id is\nencountered and this causes a memory leak. Modify the function to return\na success/error value and then free the memory if insertion didn\u0027t\nhappen.\n\nv2. Adds a return -1 when the insertion error occurs in\n perf_env__fetch_btf. This doesn\u0027t affect anything as the result is\n never checked."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf bpf: Evitar p\u00e9rdida de memoria de perf_env__insert_btf() perf_env__insert_btf() no se inserta si se encuentra un ID de BTF duplicado y esto provoca una p\u00e9rdida de memoria. Modifique la funci\u00f3n para que devuelva un valor de \u00e9xito/error y luego libere la memoria si la inserci\u00f3n no ocurri\u00f3. v2. Agrega un retorno -1 cuando ocurre el error de inserci\u00f3n en perf_env__fetch_btf. Esto no afecta a nada ya que el resultado nunca se verifica."
}
],
"id": "CVE-2021-47190",
"lastModified": "2025-01-07T17:11:50.810",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-04-10T19:15:47.617",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
BDU:2024-09215
Vulnerability from fstec - Published: 13.11.2021
VLAI Severity ?
Title
Уязвимость компонента perf bpf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость компонента perf bpf ядра операционной системы Linux связана с ошибками управления ресурсами в функции perf_env__insert_bpf_prog_info(). Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Severity ?
Vendor
Сообщество свободного программного обеспечения, ООО «Ред Софт»
Software Name
Debian GNU/Linux, РЕД ОС (запись в едином реестре российских программ №3751), Linux
Software Version
11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (РЕД ОС), от 5.11 до 5.15.4 включительно (Linux), от 5.5 до 5.10.81 включительно (Linux), от 5.1 до 5.4.161 включительно (Linux)
Possible Mitigations
В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Linux:
https://lore.kernel.org/linux-cve-announce/2024041034-CVE-2021-47190-0261@gregkh/T/#u
Для РедОС:
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2021-47190
Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47190
https://git.kernel.org/linus/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f
https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc
https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f
https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2
https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.82
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.5
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.162
https://lore.kernel.org/linux-cve-announce/2024041034-CVE-2021-47190-0261@gregkh/
https://lore.kernel.org/linux-cve-announce/2024041034-CVE-2021-47190-0261@gregkh/T/#u
https://redos.red-soft.ru/support/secure/
https://security-tracker.debian.org/tracker/CVE-2021-47190
https://www.cve.org/CVERecord?id=CVE-2021-47190
CWE
CWE-401
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), \u043e\u0442 5.11 \u0434\u043e 5.15.4 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 5.5 \u0434\u043e 5.10.81 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 5.1 \u0434\u043e 5.4.161 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2024041034-CVE-2021-47190-0261@gregkh/T/#u\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: \nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2021-47190",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "13.11.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "27.11.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "08.11.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-09215",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-47190",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.10 \u0434\u043e 5.10.82 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.15 \u0434\u043e 5.16 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.1 \u0434\u043e 5.4.162 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 perf bpf \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0435\u0440\u0435\u0434 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0441\u0441\u044b\u043b\u043a\u0438 (\u00ab\u0443\u0442\u0435\u0447\u043a\u0430 \u043f\u0430\u043c\u044f\u0442\u0438\u00bb) (CWE-401)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 perf bpf \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438 \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 perf_env__insert_bpf_prog_info(). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47190\nhttps://git.kernel.org/linus/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f\nhttps://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc\nhttps://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f\nhttps://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2\nhttps://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.82\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.5\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.162\nhttps://lore.kernel.org/linux-cve-announce/2024041034-CVE-2021-47190-0261@gregkh/\nhttps://lore.kernel.org/linux-cve-announce/2024041034-CVE-2021-47190-0261@gregkh/T/#u\nhttps://redos.red-soft.ru/support/secure/\nhttps://security-tracker.debian.org/tracker/CVE-2021-47190\nhttps://www.cve.org/CVERecord?id=CVE-2021-47190",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-401",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)\n\u041d\u0435\u0442 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 4.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 0)"
}
GHSA-4JV7-XRM9-5FJR
Vulnerability from github – Published: 2024-04-10 21:30 – Updated: 2025-01-07 18:30
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
perf bpf: Avoid memory leak from perf_env__insert_btf()
perf_env__insert_btf() doesn't insert if a duplicate BTF id is encountered and this causes a memory leak. Modify the function to return a success/error value and then free the memory if insertion didn't happen.
v2. Adds a return -1 when the insertion error occurs in perf_env__fetch_btf. This doesn't affect anything as the result is never checked.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2021-47190"
],
"database_specific": {
"cwe_ids": [
"CWE-401"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-04-10T19:15:47Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf bpf: Avoid memory leak from perf_env__insert_btf()\n\nperf_env__insert_btf() doesn\u0027t insert if a duplicate BTF id is\nencountered and this causes a memory leak. Modify the function to return\na success/error value and then free the memory if insertion didn\u0027t\nhappen.\n\nv2. Adds a return -1 when the insertion error occurs in\n perf_env__fetch_btf. This doesn\u0027t affect anything as the result is\n never checked.",
"id": "GHSA-4jv7-xrm9-5fjr",
"modified": "2025-01-07T18:30:41Z",
"published": "2024-04-10T21:30:31Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47190"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2021-47190
Vulnerability from gsd - Updated: 2024-04-03 05:03Details
In the Linux kernel, the following vulnerability has been resolved:
perf bpf: Avoid memory leak from perf_env__insert_btf()
perf_env__insert_btf() doesn't insert if a duplicate BTF id is
encountered and this causes a memory leak. Modify the function to return
a success/error value and then free the memory if insertion didn't
happen.
v2. Adds a return -1 when the insertion error occurs in
perf_env__fetch_btf. This doesn't affect anything as the result is
never checked.
Aliases
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-47190"
],
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf bpf: Avoid memory leak from perf_env__insert_btf()\n\nperf_env__insert_btf() doesn\u0027t insert if a duplicate BTF id is\nencountered and this causes a memory leak. Modify the function to return\na success/error value and then free the memory if insertion didn\u0027t\nhappen.\n\nv2. Adds a return -1 when the insertion error occurs in\n perf_env__fetch_btf. This doesn\u0027t affect anything as the result is\n never checked.",
"id": "GSD-2021-47190",
"modified": "2024-04-03T05:03:54.936733Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@kernel.org",
"ID": "CVE-2021-47190",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "3792cb2ff43b",
"version_value": "642fc22210a5"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"status": "affected",
"version": "5.1"
},
{
"lessThan": "5.1",
"status": "unaffected",
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.162",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.82",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.5",
"versionType": "custom"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "5.16",
"versionType": "original_commit_for_fix"
}
]
}
}
]
}
}
]
},
"vendor_name": "Linux"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf bpf: Avoid memory leak from perf_env__insert_btf()\n\nperf_env__insert_btf() doesn\u0027t insert if a duplicate BTF id is\nencountered and this causes a memory leak. Modify the function to return\na success/error value and then free the memory if insertion didn\u0027t\nhappen.\n\nv2. Adds a return -1 when the insertion error occurs in\n perf_env__fetch_btf. This doesn\u0027t affect anything as the result is\n never checked."
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2"
},
{
"name": "https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc"
},
{
"name": "https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e"
},
{
"name": "https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf bpf: Avoid memory leak from perf_env__insert_btf()\n\nperf_env__insert_btf() doesn\u0027t insert if a duplicate BTF id is\nencountered and this causes a memory leak. Modify the function to return\na success/error value and then free the memory if insertion didn\u0027t\nhappen.\n\nv2. Adds a return -1 when the insertion error occurs in\n perf_env__fetch_btf. This doesn\u0027t affect anything as the result is\n never checked."
}
],
"id": "CVE-2021-47190",
"lastModified": "2024-04-10T19:49:51.183",
"metrics": {},
"published": "2024-04-10T19:15:47.617",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
}
}
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…