Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-44992 (GCVE-0-2024-44992)
Vulnerability from cvelistv5 – Published: 2024-09-04 19:54 – Updated: 2025-05-04 09:30
VLAI?
EPSS
Title
smb/client: avoid possible NULL dereference in cifs_free_subrequest()
Summary
In the Linux kernel, the following vulnerability has been resolved:
smb/client: avoid possible NULL dereference in cifs_free_subrequest()
Clang static checker (scan-build) warning:
cifsglob.h:line 890, column 3
Access to field 'ops' results in a dereference of a null pointer.
Commit 519be989717c ("cifs: Add a tracepoint to track credits involved in
R/W requests") adds a check for 'rdata->server', and let clang throw this
warning about NULL dereference.
When 'rdata->credits.value != 0 && rdata->server == NULL' happens,
add_credits_and_wake_if() will call rdata->server->ops->add_credits().
This will cause NULL dereference problem. Add a check for 'rdata->server'
to avoid NULL dereference.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-44992",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-04T20:19:34.019685Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-04T20:19:53.480Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/smb/client/file.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "fead60a6d5f84b472b928502a42c419253afe6c1",
"status": "affected",
"version": "69c3c023af25edb5433a2db824d3e7cc328f0183",
"versionType": "git"
},
{
"lessThan": "74c2ab6d653b4c2354df65a7f7f2df1925a40a51",
"status": "affected",
"version": "69c3c023af25edb5433a2db824d3e7cc328f0183",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/smb/client/file.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.10"
},
{
"lessThan": "6.10",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.10.*",
"status": "unaffected",
"version": "6.10.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.11",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.10.7",
"versionStartIncluding": "6.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.11",
"versionStartIncluding": "6.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb/client: avoid possible NULL dereference in cifs_free_subrequest()\n\nClang static checker (scan-build) warning:\n\tcifsglob.h:line 890, column 3\n\tAccess to field \u0027ops\u0027 results in a dereference of a null pointer.\n\nCommit 519be989717c (\"cifs: Add a tracepoint to track credits involved in\nR/W requests\") adds a check for \u0027rdata-\u003eserver\u0027, and let clang throw this\nwarning about NULL dereference.\n\nWhen \u0027rdata-\u003ecredits.value != 0 \u0026\u0026 rdata-\u003eserver == NULL\u0027 happens,\nadd_credits_and_wake_if() will call rdata-\u003eserver-\u003eops-\u003eadd_credits().\nThis will cause NULL dereference problem. Add a check for \u0027rdata-\u003eserver\u0027\nto avoid NULL dereference."
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T09:30:35.937Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/fead60a6d5f84b472b928502a42c419253afe6c1"
},
{
"url": "https://git.kernel.org/stable/c/74c2ab6d653b4c2354df65a7f7f2df1925a40a51"
}
],
"title": "smb/client: avoid possible NULL dereference in cifs_free_subrequest()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2024-44992",
"datePublished": "2024-09-04T19:54:38.878Z",
"dateReserved": "2024-08-21T05:34:56.671Z",
"dateUpdated": "2025-05-04T09:30:35.937Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-44992\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-09-04T20:15:08.207\",\"lastModified\":\"2024-09-06T16:29:28.963\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nsmb/client: avoid possible NULL dereference in cifs_free_subrequest()\\n\\nClang static checker (scan-build) warning:\\n\\tcifsglob.h:line 890, column 3\\n\\tAccess to field \u0027ops\u0027 results in a dereference of a null pointer.\\n\\nCommit 519be989717c (\\\"cifs: Add a tracepoint to track credits involved in\\nR/W requests\\\") adds a check for \u0027rdata-\u003eserver\u0027, and let clang throw this\\nwarning about NULL dereference.\\n\\nWhen \u0027rdata-\u003ecredits.value != 0 \u0026\u0026 rdata-\u003eserver == NULL\u0027 happens,\\nadd_credits_and_wake_if() will call rdata-\u003eserver-\u003eops-\u003eadd_credits().\\nThis will cause NULL dereference problem. Add a check for \u0027rdata-\u003eserver\u0027\\nto avoid NULL dereference.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb/client: evitar posible desreferencia NULL en cifs_free_subrequest() Advertencia del verificador est\u00e1tico de Clang (scan-build): cifsglob.h:l\u00ednea 890, columna 3 El acceso al campo \u0027ops\u0027 da como resultado una desreferencia de un puntero nulo. El commit 519be989717c (\\\"cifs: Agregar un punto de seguimiento para rastrear cr\u00e9ditos involucrados en solicitudes R/W\\\") agrega una verificaci\u00f3n para \u0027rdata-\u0026gt;server\u0027 y permite que clang lance esta advertencia sobre la desreferencia NULL. Cuando sucede \u0027rdata-\u0026gt;credits.value != 0 \u0026amp;\u0026amp; rdata-\u0026gt;server == NULL\u0027, add_credits_and_wake_if() llamar\u00e1 a rdata-\u0026gt;server-\u0026gt;ops-\u0026gt;add_credits(). Esto causar\u00e1 un problema de desreferencia NULL. Agregue una verificaci\u00f3n para \u0027rdata-\u0026gt;server\u0027 para evitar la desreferencia NULL.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.10\",\"versionEndExcluding\":\"6.10.7\",\"matchCriteriaId\":\"E55C1263-DF43-41EF-8DA8-2BA68DF4FFFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3CE743-2126-47A3-8B7C-822B502CF119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEB27E7-30AA-45CC-8934-B89263EF3551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0005AEF-856E-47EB-BFE4-90C46899394D\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/74c2ab6d653b4c2354df65a7f7f2df1925a40a51\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/fead60a6d5f84b472b928502a42c419253afe6c1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-44992\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-04T20:19:34.019685Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-04T20:19:37.936Z\"}}], \"cna\": {\"title\": \"smb/client: avoid possible NULL dereference in cifs_free_subrequest()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"69c3c023af25edb5433a2db824d3e7cc328f0183\", \"lessThan\": \"fead60a6d5f84b472b928502a42c419253afe6c1\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"69c3c023af25edb5433a2db824d3e7cc328f0183\", \"lessThan\": \"74c2ab6d653b4c2354df65a7f7f2df1925a40a51\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/smb/client/file.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.10\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.10\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.10.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/smb/client/file.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/fead60a6d5f84b472b928502a42c419253afe6c1\"}, {\"url\": \"https://git.kernel.org/stable/c/74c2ab6d653b4c2354df65a7f7f2df1925a40a51\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nsmb/client: avoid possible NULL dereference in cifs_free_subrequest()\\n\\nClang static checker (scan-build) warning:\\n\\tcifsglob.h:line 890, column 3\\n\\tAccess to field \u0027ops\u0027 results in a dereference of a null pointer.\\n\\nCommit 519be989717c (\\\"cifs: Add a tracepoint to track credits involved in\\nR/W requests\\\") adds a check for \u0027rdata-\u003eserver\u0027, and let clang throw this\\nwarning about NULL dereference.\\n\\nWhen \u0027rdata-\u003ecredits.value != 0 \u0026\u0026 rdata-\u003eserver == NULL\u0027 happens,\\nadd_credits_and_wake_if() will call rdata-\u003eserver-\u003eops-\u003eadd_credits().\\nThis will cause NULL dereference problem. Add a check for \u0027rdata-\u003eserver\u0027\\nto avoid NULL dereference.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:19:48.405Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-44992\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:19:48.405Z\", \"dateReserved\": \"2024-08-21T05:34:56.671Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-04T19:54:38.878Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-53CV-6GXV-7335
Vulnerability from github – Published: 2024-09-04 21:30 – Updated: 2024-09-06 18:31
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
smb/client: avoid possible NULL dereference in cifs_free_subrequest()
Clang static checker (scan-build) warning: cifsglob.h:line 890, column 3 Access to field 'ops' results in a dereference of a null pointer.
Commit 519be989717c ("cifs: Add a tracepoint to track credits involved in R/W requests") adds a check for 'rdata->server', and let clang throw this warning about NULL dereference.
When 'rdata->credits.value != 0 && rdata->server == NULL' happens, add_credits_and_wake_if() will call rdata->server->ops->add_credits(). This will cause NULL dereference problem. Add a check for 'rdata->server' to avoid NULL dereference.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2024-44992"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-09-04T20:15:08Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb/client: avoid possible NULL dereference in cifs_free_subrequest()\n\nClang static checker (scan-build) warning:\n\tcifsglob.h:line 890, column 3\n\tAccess to field \u0027ops\u0027 results in a dereference of a null pointer.\n\nCommit 519be989717c (\"cifs: Add a tracepoint to track credits involved in\nR/W requests\") adds a check for \u0027rdata-\u003eserver\u0027, and let clang throw this\nwarning about NULL dereference.\n\nWhen \u0027rdata-\u003ecredits.value != 0 \u0026\u0026 rdata-\u003eserver == NULL\u0027 happens,\nadd_credits_and_wake_if() will call rdata-\u003eserver-\u003eops-\u003eadd_credits().\nThis will cause NULL dereference problem. Add a check for \u0027rdata-\u003eserver\u0027\nto avoid NULL dereference.",
"id": "GHSA-53cv-6gxv-7335",
"modified": "2024-09-06T18:31:29Z",
"published": "2024-09-04T21:30:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44992"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/74c2ab6d653b4c2354df65a7f7f2df1925a40a51"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/fead60a6d5f84b472b928502a42c419253afe6c1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
BDU:2024-06758
Vulnerability from fstec - Published: 15.08.2024
VLAI Severity ?
Title
Уязвимость функции cifs_free_subrequest() клиента SMB ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на доступность защищаемой информации
Description
Уязвимость функции cifs_free_subrequest() клиента SMB ядра операционных систем Linux связана с ошибками разыменования указателей при обработке поля ops. Эксплуатация уязвимости может позволить нарушителю оказать воздействие на доступность защищаемой информации
Severity ?
Vendor
Сообщество свободного программного обеспечения
Software Name
Linux
Software Version
от 6.10.0 до 6.10.6 включительно (Linux)
Possible Mitigations
Использование рекомендаций:
Для Linux:
https://lore.kernel.org/linux-cve-announce/2024090447-CVE-2024-44992-9050@gregkh/T/
https://git.kernel.org/stable/c/fead60a6d5f84b472b928502a42c419253afe6c1
https://git.kernel.org/stable/c/74c2ab6d653b4c2354df65a7f7f2df1925a40a51
Reference
https://git.kernel.org/linus/74c2ab6d653b4c2354df65a7f7f2df1925a40a51
https://git.kernel.org/stable/c/74c2ab6d653b4c2354df65a7f7f2df1925a40a51
https://git.kernel.org/stable/c/fead60a6d5f84b472b928502a42c419253afe6c1
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.7
https://lore.kernel.org/linux-cve-announce/2024090447-CVE-2024-44992-9050@gregkh/
https://lore.kernel.org/linux-cve-announce/2024090447-CVE-2024-44992-9050@gregkh/T/
https://vuldb.com/?id.276581
https://www.cve.org/CVERecord?id=CVE-2024-44992
CWE
CWE-476
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 6.10.0 \u0434\u043e 6.10.6 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2024090447-CVE-2024-44992-9050@gregkh/T/\nhttps://git.kernel.org/stable/c/fead60a6d5f84b472b928502a42c419253afe6c1\nhttps://git.kernel.org/stable/c/74c2ab6d653b4c2354df65a7f7f2df1925a40a51",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.08.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.10.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "09.09.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-06758",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-44992",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.11.0 \u0434\u043e 6.11 rc4 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.10 \u0434\u043e 6.10.7 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 cifs_free_subrequest() \u043a\u043b\u0438\u0435\u043d\u0442\u0430 SMB \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f NULL (CWE-476)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 cifs_free_subrequest() \u043a\u043b\u0438\u0435\u043d\u0442\u0430 SMB \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u0435\u0439 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043f\u043e\u043b\u044f ops. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.kernel.org/linus/74c2ab6d653b4c2354df65a7f7f2df1925a40a51\nhttps://git.kernel.org/stable/c/74c2ab6d653b4c2354df65a7f7f2df1925a40a51\nhttps://git.kernel.org/stable/c/fead60a6d5f84b472b928502a42c419253afe6c1\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.7\nhttps://lore.kernel.org/linux-cve-announce/2024090447-CVE-2024-44992-9050@gregkh/\nhttps://lore.kernel.org/linux-cve-announce/2024090447-CVE-2024-44992-9050@gregkh/T/\nhttps://vuldb.com/?id.276581\nhttps://www.cve.org/CVERecord?id=CVE-2024-44992",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-476",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
FKIE_CVE-2024-44992
Vulnerability from fkie_nvd - Published: 2024-09-04 20:15 - Updated: 2024-09-06 16:29
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
smb/client: avoid possible NULL dereference in cifs_free_subrequest()
Clang static checker (scan-build) warning:
cifsglob.h:line 890, column 3
Access to field 'ops' results in a dereference of a null pointer.
Commit 519be989717c ("cifs: Add a tracepoint to track credits involved in
R/W requests") adds a check for 'rdata->server', and let clang throw this
warning about NULL dereference.
When 'rdata->credits.value != 0 && rdata->server == NULL' happens,
add_credits_and_wake_if() will call rdata->server->ops->add_credits().
This will cause NULL dereference problem. Add a check for 'rdata->server'
to avoid NULL dereference.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.11 | |
| linux | linux_kernel | 6.11 | |
| linux | linux_kernel | 6.11 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E55C1263-DF43-41EF-8DA8-2BA68DF4FFFD",
"versionEndExcluding": "6.10.7",
"versionStartIncluding": "6.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb/client: avoid possible NULL dereference in cifs_free_subrequest()\n\nClang static checker (scan-build) warning:\n\tcifsglob.h:line 890, column 3\n\tAccess to field \u0027ops\u0027 results in a dereference of a null pointer.\n\nCommit 519be989717c (\"cifs: Add a tracepoint to track credits involved in\nR/W requests\") adds a check for \u0027rdata-\u003eserver\u0027, and let clang throw this\nwarning about NULL dereference.\n\nWhen \u0027rdata-\u003ecredits.value != 0 \u0026\u0026 rdata-\u003eserver == NULL\u0027 happens,\nadd_credits_and_wake_if() will call rdata-\u003eserver-\u003eops-\u003eadd_credits().\nThis will cause NULL dereference problem. Add a check for \u0027rdata-\u003eserver\u0027\nto avoid NULL dereference."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb/client: evitar posible desreferencia NULL en cifs_free_subrequest() Advertencia del verificador est\u00e1tico de Clang (scan-build): cifsglob.h:l\u00ednea 890, columna 3 El acceso al campo \u0027ops\u0027 da como resultado una desreferencia de un puntero nulo. El commit 519be989717c (\"cifs: Agregar un punto de seguimiento para rastrear cr\u00e9ditos involucrados en solicitudes R/W\") agrega una verificaci\u00f3n para \u0027rdata-\u0026gt;server\u0027 y permite que clang lance esta advertencia sobre la desreferencia NULL. Cuando sucede \u0027rdata-\u0026gt;credits.value != 0 \u0026amp;\u0026amp; rdata-\u0026gt;server == NULL\u0027, add_credits_and_wake_if() llamar\u00e1 a rdata-\u0026gt;server-\u0026gt;ops-\u0026gt;add_credits(). Esto causar\u00e1 un problema de desreferencia NULL. Agregue una verificaci\u00f3n para \u0027rdata-\u0026gt;server\u0027 para evitar la desreferencia NULL."
}
],
"id": "CVE-2024-44992",
"lastModified": "2024-09-06T16:29:28.963",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-09-04T20:15:08.207",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/74c2ab6d653b4c2354df65a7f7f2df1925a40a51"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/fead60a6d5f84b472b928502a42c419253afe6c1"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2024-2057
Vulnerability from csaf_certbund - Published: 2024-09-04 22:00 - Updated: 2025-10-30 23:00Summary
Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service oder unspezifischer Angriff
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff: Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen oder weitere unspezifische Angriffe durchzuführen.
Betroffene Betriebssysteme: - Linux
References
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder weitere unspezifische Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-2057 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2057.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-2057 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2057"
},
{
"category": "external",
"summary": "Linux CVE Announce vom 2024-09-04",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3225-1 vom 2024-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019432.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3227-1 vom 2024-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019430.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3249-1 vom 2024-09-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019438.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3403-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019501.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3408-1 vom 2024-09-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TGC7PQ5QNGEZWYIHCKH2KPZMGYJ4VN6B/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3499-1 vom 2024-09-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019536.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12682 vom 2024-09-30",
"url": "http://linux.oracle.com/errata/ELSA-2024-12682.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5782 vom 2024-10-03",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-070 vom 2024-10-02",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-070.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-055 vom 2024-10-02",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-055.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3912 vom 2024-10-07",
"url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3563-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3565-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3567-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3587-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3585-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019586.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12780 vom 2024-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-12780.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12782 vom 2024-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-12782.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-12779.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7074-1 vom 2024-10-17",
"url": "https://ubuntu.com/security/notices/USN-7074-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7076-1 vom 2024-10-17",
"url": "https://ubuntu.com/security/notices/USN-7076-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7076-2 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7076-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7088-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7090-1 vom 2024-11-01",
"url": "https://ubuntu.com/security/notices/USN-7090-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05",
"url": "https://access.redhat.com/errata/RHSA-2024:8856"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04",
"url": "https://ubuntu.com/security/notices/USN-7088-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05",
"url": "https://access.redhat.com/errata/RHSA-2024:8870"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8856.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06",
"url": "https://ubuntu.com/security/notices/USN-7088-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7095-1 vom 2024-11-07",
"url": "https://ubuntu.com/security/notices/USN-7095-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08",
"url": "https://errata.build.resf.org/RLSA-2024:8870"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11",
"url": "https://ubuntu.com/security/notices/USN-7100-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7100-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12813.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9315"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12815.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7088-5"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2696 vom 2024-11-15",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2696.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4038-1 vom 2024-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7119-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7123-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5818 vom 2024-11-24",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00233.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25",
"url": "https://ubuntu.com/security/notices/USN-7121-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4081-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10771 vom 2024-12-04",
"url": "https://access.redhat.com/errata/RHSA-2024:10771"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12851 vom 2024-12-05",
"url": "http://linux.oracle.com/errata/ELSA-2024-12851.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09",
"url": "https://ubuntu.com/security/notices/USN-7144-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09",
"url": "https://linux.oracle.com/errata/ELSA-2024-12868.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10939"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10",
"url": "https://ubuntu.com/security/notices/USN-7148-1"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0016 vom 2024-12-10",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-December/001104.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-10939.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7155-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7154-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7156-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17",
"url": "https://linux.oracle.com/errata/ELSA-2024-12884.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4345-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4346-1 vom 2024-12-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2FJJW5HEWYSYWAJBRWARBIZ4AQHAXLNG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2024-12887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4008 vom 2025-01-03",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7183-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7183-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7154-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7184-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7184-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7196-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7185-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7185-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7194-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7181933 vom 2025-01-29",
"url": "https://www.ibm.com/support/pages/node/7181933"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7182335 vom 2025-02-03",
"url": "https://www.ibm.com/support/pages/node/7182335"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20095 vom 2025-02-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20095.html"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-094 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-094.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4076 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2270 vom 2025-03-05",
"url": "https://access.redhat.com/errata/RHSA-2025:2270"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1912 vom 2025-03-05",
"url": "https://access.redhat.com/errata/RHSA-2025:1912"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0784-1 vom 2025-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185244 vom 2025-03-10",
"url": "https://www.ibm.com/support/pages/node/7185244"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20153 vom 2025-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20153.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-064 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-064.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20190 vom 2025-03-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-20190.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4102 vom 2025-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20270 vom 2025-04-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-20270.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20271 vom 2025-04-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-20271.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7452-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7449-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7451-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7453-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7450-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7449-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4341 vom 2025-04-30",
"url": "https://access.redhat.com/errata/RHSA-2025:4341"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-4341 vom 2025-05-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-4341.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20320 vom 2025-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-20320.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:6966"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7515-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7512-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8057 vom 2025-05-21",
"url": "https://access.redhat.com/errata/RHSA-2025:8057"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7511-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8056 vom 2025-05-21",
"url": "https://access.redhat.com/errata/RHSA-2025:8056"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7523-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7515-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8056 vom 2025-05-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-8056.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7524-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9580 vom 2025-06-26",
"url": "https://linux.oracle.com/errata/ELSA-2025-9580.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-404 vom 2025-10-31",
"url": "https://www.dell.com/support/kbdoc/000385435"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service oder unspezifischer Angriff",
"tracking": {
"current_release_date": "2025-10-30T23:00:00.000+00:00",
"generator": {
"date": "2025-10-31T10:09:53.034+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-2057",
"initial_release_date": "2024-09-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-09-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-11T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-12T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-16T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-29T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-30T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Debian und Amazon aufgenommen"
},
{
"date": "2024-10-07T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-10-08T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-10T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-10-17T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-03T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-10T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu, Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-17T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-24T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-11-25T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-28T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-02T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-05T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-09T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Red Hat, Ubuntu und ORACLE aufgenommen"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-12T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-02T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-01-15T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-19T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von IBM und SUSE aufgenommen"
},
{
"date": "2025-02-03T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-02-10T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-04T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-05T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-13T23:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-03-19T23:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-20T23:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-04-14T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-04-23T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "89"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T034392",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Virtual Edition",
"product": {
"name": "Dell NetWorker Virtual Edition",
"product_id": "T048226",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual_edition"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM InfoSphere Guardium",
"product": {
"name": "IBM InfoSphere Guardium",
"product_id": "T002366",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_guardium:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11",
"product_id": "T040749"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11",
"product_id": "T040749-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T033107",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T042774",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "3",
"product": {
"name": "Oracle VM 3",
"product_id": "T030927",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:3"
}
}
}
],
"category": "product_name",
"name": "VM"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-44946",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44946"
},
{
"cve": "CVE-2024-44947",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44947"
},
{
"cve": "CVE-2024-44948",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44948"
},
{
"cve": "CVE-2024-44949",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44949"
},
{
"cve": "CVE-2024-44950",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44950"
},
{
"cve": "CVE-2024-44951",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44951"
},
{
"cve": "CVE-2024-44952",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44952"
},
{
"cve": "CVE-2024-44953",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44953"
},
{
"cve": "CVE-2024-44954",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44954"
},
{
"cve": "CVE-2024-44955",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44955"
},
{
"cve": "CVE-2024-44956",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44956"
},
{
"cve": "CVE-2024-44957",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44957"
},
{
"cve": "CVE-2024-44958",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44958"
},
{
"cve": "CVE-2024-44959",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44959"
},
{
"cve": "CVE-2024-44960",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44960"
},
{
"cve": "CVE-2024-44961",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44961"
},
{
"cve": "CVE-2024-44962",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44962"
},
{
"cve": "CVE-2024-44963",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44963"
},
{
"cve": "CVE-2024-44964",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44964"
},
{
"cve": "CVE-2024-44965",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44965"
},
{
"cve": "CVE-2024-44966",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44966"
},
{
"cve": "CVE-2024-44967",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44967"
},
{
"cve": "CVE-2024-44968",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44968"
},
{
"cve": "CVE-2024-44969",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44969"
},
{
"cve": "CVE-2024-44970",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44970"
},
{
"cve": "CVE-2024-44971",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44971"
},
{
"cve": "CVE-2024-44972",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44972"
},
{
"cve": "CVE-2024-44973",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44973"
},
{
"cve": "CVE-2024-44974",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44974"
},
{
"cve": "CVE-2024-44975",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44975"
},
{
"cve": "CVE-2024-44976",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44976"
},
{
"cve": "CVE-2024-44977",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44977"
},
{
"cve": "CVE-2024-44978",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44978"
},
{
"cve": "CVE-2024-44979",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44979"
},
{
"cve": "CVE-2024-44980",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44980"
},
{
"cve": "CVE-2024-44981",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44981"
},
{
"cve": "CVE-2024-44982",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44982"
},
{
"cve": "CVE-2024-44983",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44983"
},
{
"cve": "CVE-2024-44984",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44984"
},
{
"cve": "CVE-2024-44985",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44985"
},
{
"cve": "CVE-2024-44986",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44986"
},
{
"cve": "CVE-2024-44987",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44987"
},
{
"cve": "CVE-2024-44988",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44988"
},
{
"cve": "CVE-2024-44989",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44989"
},
{
"cve": "CVE-2024-44990",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44990"
},
{
"cve": "CVE-2024-44991",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44991"
},
{
"cve": "CVE-2024-44992",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44992"
},
{
"cve": "CVE-2024-44993",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44993"
},
{
"cve": "CVE-2024-44994",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44994"
},
{
"cve": "CVE-2024-44995",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44995"
},
{
"cve": "CVE-2024-44996",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44996"
},
{
"cve": "CVE-2024-44997",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44997"
},
{
"cve": "CVE-2024-44998",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44998"
},
{
"cve": "CVE-2024-44999",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-44999"
},
{
"cve": "CVE-2024-45000",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-45000"
},
{
"cve": "CVE-2024-45001",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-45001"
},
{
"cve": "CVE-2024-45002",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-45002"
},
{
"cve": "CVE-2024-45003",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-45003"
},
{
"cve": "CVE-2024-45004",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-45004"
},
{
"cve": "CVE-2024-45005",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-45005"
},
{
"cve": "CVE-2024-45006",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-45006"
},
{
"cve": "CVE-2024-45007",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-45007"
},
{
"cve": "CVE-2024-45008",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T033107",
"T004914",
"T032255",
"T039664",
"T042774",
"2951",
"T002207",
"T034392",
"T000126",
"T031092",
"T002366",
"398363",
"T030927",
"T048226"
]
},
"release_date": "2024-09-04T22:00:00.000+00:00",
"title": "CVE-2024-45008"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…