Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-56558 (GCVE-0-2024-56558)
Vulnerability from cvelistv5 – Published: 2024-12-27 14:23 – Updated: 2026-05-11 20:54
VLAI?
EPSS
Title
nfsd: make sure exp active before svc_export_show
Summary
In the Linux kernel, the following vulnerability has been resolved:
nfsd: make sure exp active before svc_export_show
The function `e_show` was called with protection from RCU. This only
ensures that `exp` will not be freed. Therefore, the reference count for
`exp` can drop to zero, which will trigger a refcount use-after-free
warning when `exp_get` is called. To resolve this issue, use
`cache_get_rcu` to ensure that `exp` remains active.
------------[ cut here ]------------
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 3 PID: 819 at lib/refcount.c:25
refcount_warn_saturate+0xb1/0x120
CPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
RIP: 0010:refcount_warn_saturate+0xb1/0x120
...
Call Trace:
<TASK>
e_show+0x20b/0x230 [nfsd]
seq_read_iter+0x589/0x770
seq_read+0x1e5/0x270
vfs_read+0x125/0x530
ksys_read+0xc1/0x160
do_syscall_64+0x5f/0x170
entry_SYSCALL_64_after_hwframe+0x76/0x7e
Severity ?
7.8 (High)
CWE
- CWE-416 - Use After Free
Assigner
References
7 references
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Linux | Linux |
Affected:
bf18f163e89c52e09c96534db45c4274273a0b34 , < e2fa0d0e327279a8defb87b263cd0bf288fd9261
(git)
Affected: bf18f163e89c52e09c96534db45c4274273a0b34 , < 7fd29d284b55c2274f7a748e6c5f25b4758b8da5 (git) Affected: bf18f163e89c52e09c96534db45c4274273a0b34 , < 6cefcadd34e3c71c81ea64b899a0daa86314a51a (git) Affected: bf18f163e89c52e09c96534db45c4274273a0b34 , < 7d8f7816bebcd2e7400bb4d786eccb8f33c9f9ec (git) Affected: bf18f163e89c52e09c96534db45c4274273a0b34 , < 1cecfdbc6bfc89c516d286884c7f29267b95de2b (git) Affected: bf18f163e89c52e09c96534db45c4274273a0b34 , < 7365d1f8de63cffdbbaa2287ce0205438e1a922f (git) Affected: bf18f163e89c52e09c96534db45c4274273a0b34 , < be8f982c369c965faffa198b46060f8853e0f1f0 (git) |
|
| Linux | Linux |
Affected:
3.17
Unaffected: 0 , < 3.17 (semver) Unaffected: 5.4.287 , ≤ 5.4.* (semver) Unaffected: 5.10.231 , ≤ 5.10.* (semver) Unaffected: 5.15.174 , ≤ 5.15.* (semver) Unaffected: 6.1.120 , ≤ 6.1.* (semver) Unaffected: 6.6.64 , ≤ 6.6.* (semver) Unaffected: 6.12.4 , ≤ 6.12.* (semver) Unaffected: 6.13 , ≤ * (original_commit_for_fix) |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-56558",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-11T15:42:49.247633Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-11T15:45:24.949Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T20:49:29.154Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/nfsd/export.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "e2fa0d0e327279a8defb87b263cd0bf288fd9261",
"status": "affected",
"version": "bf18f163e89c52e09c96534db45c4274273a0b34",
"versionType": "git"
},
{
"lessThan": "7fd29d284b55c2274f7a748e6c5f25b4758b8da5",
"status": "affected",
"version": "bf18f163e89c52e09c96534db45c4274273a0b34",
"versionType": "git"
},
{
"lessThan": "6cefcadd34e3c71c81ea64b899a0daa86314a51a",
"status": "affected",
"version": "bf18f163e89c52e09c96534db45c4274273a0b34",
"versionType": "git"
},
{
"lessThan": "7d8f7816bebcd2e7400bb4d786eccb8f33c9f9ec",
"status": "affected",
"version": "bf18f163e89c52e09c96534db45c4274273a0b34",
"versionType": "git"
},
{
"lessThan": "1cecfdbc6bfc89c516d286884c7f29267b95de2b",
"status": "affected",
"version": "bf18f163e89c52e09c96534db45c4274273a0b34",
"versionType": "git"
},
{
"lessThan": "7365d1f8de63cffdbbaa2287ce0205438e1a922f",
"status": "affected",
"version": "bf18f163e89c52e09c96534db45c4274273a0b34",
"versionType": "git"
},
{
"lessThan": "be8f982c369c965faffa198b46060f8853e0f1f0",
"status": "affected",
"version": "bf18f163e89c52e09c96534db45c4274273a0b34",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/nfsd/export.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "3.17"
},
{
"lessThan": "3.17",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.287",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.231",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.174",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.120",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.64",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.13",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.287",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.231",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.174",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.120",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.64",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.4",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.13",
"versionStartIncluding": "3.17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: make sure exp active before svc_export_show\n\nThe function `e_show` was called with protection from RCU. This only\nensures that `exp` will not be freed. Therefore, the reference count for\n`exp` can drop to zero, which will trigger a refcount use-after-free\nwarning when `exp_get` is called. To resolve this issue, use\n`cache_get_rcu` to ensure that `exp` remains active.\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 819 at lib/refcount.c:25\nrefcount_warn_saturate+0xb1/0x120\nCPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb1/0x120\n...\nCall Trace:\n \u003cTASK\u003e\n e_show+0x20b/0x230 [nfsd]\n seq_read_iter+0x589/0x770\n seq_read+0x1e5/0x270\n vfs_read+0x125/0x530\n ksys_read+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e"
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T20:54:45.714Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/e2fa0d0e327279a8defb87b263cd0bf288fd9261"
},
{
"url": "https://git.kernel.org/stable/c/7fd29d284b55c2274f7a748e6c5f25b4758b8da5"
},
{
"url": "https://git.kernel.org/stable/c/6cefcadd34e3c71c81ea64b899a0daa86314a51a"
},
{
"url": "https://git.kernel.org/stable/c/7d8f7816bebcd2e7400bb4d786eccb8f33c9f9ec"
},
{
"url": "https://git.kernel.org/stable/c/1cecfdbc6bfc89c516d286884c7f29267b95de2b"
},
{
"url": "https://git.kernel.org/stable/c/7365d1f8de63cffdbbaa2287ce0205438e1a922f"
},
{
"url": "https://git.kernel.org/stable/c/be8f982c369c965faffa198b46060f8853e0f1f0"
}
],
"title": "nfsd: make sure exp active before svc_export_show",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2024-56558",
"datePublished": "2024-12-27T14:23:03.902Z",
"dateReserved": "2024-12-27T14:03:05.992Z",
"dateUpdated": "2026-05-11T20:54:45.714Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-56558",
"date": "2026-05-21",
"epss": "0.00012",
"percentile": "0.01674"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-56558\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-12-27T15:15:14.633\",\"lastModified\":\"2025-11-03T21:17:54.340\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnfsd: make sure exp active before svc_export_show\\n\\nThe function `e_show` was called with protection from RCU. This only\\nensures that `exp` will not be freed. Therefore, the reference count for\\n`exp` can drop to zero, which will trigger a refcount use-after-free\\nwarning when `exp_get` is called. To resolve this issue, use\\n`cache_get_rcu` to ensure that `exp` remains active.\\n\\n------------[ cut here ]------------\\nrefcount_t: addition on 0; use-after-free.\\nWARNING: CPU: 3 PID: 819 at lib/refcount.c:25\\nrefcount_warn_saturate+0xb1/0x120\\nCPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1\\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\\n1.16.1-2.fc37 04/01/2014\\nRIP: 0010:refcount_warn_saturate+0xb1/0x120\\n...\\nCall Trace:\\n \u003cTASK\u003e\\n e_show+0x20b/0x230 [nfsd]\\n seq_read_iter+0x589/0x770\\n seq_read+0x1e5/0x270\\n vfs_read+0x125/0x530\\n ksys_read+0xc1/0x160\\n do_syscall_64+0x5f/0x170\\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: aseg\u00farese de que exp est\u00e9 activo antes de svc_export_show La funci\u00f3n `e_show` se llam\u00f3 con protecci\u00f3n de RCU. Esto solo garantiza que `exp` no se liberar\u00e1. Por lo tanto, el recuento de referencia para `exp` puede caer a cero, lo que activar\u00e1 una advertencia de use-after-free de refcount cuando se llame a `exp_get`. Para resolver este problema, use `cache_get_rcu` para asegurarse de que `exp` permanezca activo. ------------[ cortar aqu\u00ed ]------------ refcount_t: adici\u00f3n en 0; use-after-free. ADVERTENCIA: CPU: 3 PID: 819 en lib/refcount.c:25 refcount_warn_saturate+0xb1/0x120 CPU: 3 UID: 0 PID: 819 Comm: cat No contaminado 6.12.0-rc3+ #1 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 01/04/2014 RIP: 0010:refcount_warn_saturate+0xb1/0x120 ... Seguimiento de llamadas: e_show+0x20b/0x230 [nfsd] seq_read_iter+0x589/0x770 seq_read+0x1e5/0x270 vfs_read+0x125/0x530 ksys_read+0xc1/0x160 hacer_syscall_64+0x5f/0x170 entrada_SYSCALL_64_despu\u00e9s_hwframe+0x76/0x7e\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"5.4.287\",\"matchCriteriaId\":\"4370C192-9AA4-40FC-B36F-C7ECD643414F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.231\",\"matchCriteriaId\":\"B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.174\",\"matchCriteriaId\":\"419FD073-1517-4FD5-8158-F94BC68A1E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.120\",\"matchCriteriaId\":\"09AC6122-E2A4-40FE-9D33-268A1B2EC265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.64\",\"matchCriteriaId\":\"CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.12.4\",\"matchCriteriaId\":\"04756810-D093-4B43-B1D9-CF5035968061\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1cecfdbc6bfc89c516d286884c7f29267b95de2b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6cefcadd34e3c71c81ea64b899a0daa86314a51a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7365d1f8de63cffdbbaa2287ce0205438e1a922f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7d8f7816bebcd2e7400bb4d786eccb8f33c9f9ec\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7fd29d284b55c2274f7a748e6c5f25b4758b8da5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/be8f982c369c965faffa198b46060f8853e0f1f0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e2fa0d0e327279a8defb87b263cd0bf288fd9261\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T20:49:29.154Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-56558\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-11T15:42:49.247633Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-11T15:42:50.585Z\"}}], \"cna\": {\"title\": \"nfsd: make sure exp active before svc_export_show\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"bf18f163e89c52e09c96534db45c4274273a0b34\", \"lessThan\": \"e2fa0d0e327279a8defb87b263cd0bf288fd9261\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bf18f163e89c52e09c96534db45c4274273a0b34\", \"lessThan\": \"7fd29d284b55c2274f7a748e6c5f25b4758b8da5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bf18f163e89c52e09c96534db45c4274273a0b34\", \"lessThan\": \"6cefcadd34e3c71c81ea64b899a0daa86314a51a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bf18f163e89c52e09c96534db45c4274273a0b34\", \"lessThan\": \"7d8f7816bebcd2e7400bb4d786eccb8f33c9f9ec\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bf18f163e89c52e09c96534db45c4274273a0b34\", \"lessThan\": \"1cecfdbc6bfc89c516d286884c7f29267b95de2b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bf18f163e89c52e09c96534db45c4274273a0b34\", \"lessThan\": \"7365d1f8de63cffdbbaa2287ce0205438e1a922f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bf18f163e89c52e09c96534db45c4274273a0b34\", \"lessThan\": \"be8f982c369c965faffa198b46060f8853e0f1f0\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/nfsd/export.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.17\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.17\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.4.287\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.231\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.174\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.120\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.64\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.12.*\"}, {\"status\": \"unaffected\", \"version\": \"6.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/nfsd/export.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e2fa0d0e327279a8defb87b263cd0bf288fd9261\"}, {\"url\": \"https://git.kernel.org/stable/c/7fd29d284b55c2274f7a748e6c5f25b4758b8da5\"}, {\"url\": \"https://git.kernel.org/stable/c/6cefcadd34e3c71c81ea64b899a0daa86314a51a\"}, {\"url\": \"https://git.kernel.org/stable/c/7d8f7816bebcd2e7400bb4d786eccb8f33c9f9ec\"}, {\"url\": \"https://git.kernel.org/stable/c/1cecfdbc6bfc89c516d286884c7f29267b95de2b\"}, {\"url\": \"https://git.kernel.org/stable/c/7365d1f8de63cffdbbaa2287ce0205438e1a922f\"}, {\"url\": \"https://git.kernel.org/stable/c/be8f982c369c965faffa198b46060f8853e0f1f0\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnfsd: make sure exp active before svc_export_show\\n\\nThe function `e_show` was called with protection from RCU. This only\\nensures that `exp` will not be freed. Therefore, the reference count for\\n`exp` can drop to zero, which will trigger a refcount use-after-free\\nwarning when `exp_get` is called. To resolve this issue, use\\n`cache_get_rcu` to ensure that `exp` remains active.\\n\\n------------[ cut here ]------------\\nrefcount_t: addition on 0; use-after-free.\\nWARNING: CPU: 3 PID: 819 at lib/refcount.c:25\\nrefcount_warn_saturate+0xb1/0x120\\nCPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1\\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\\n1.16.1-2.fc37 04/01/2014\\nRIP: 0010:refcount_warn_saturate+0xb1/0x120\\n...\\nCall Trace:\\n \u003cTASK\u003e\\n e_show+0x20b/0x230 [nfsd]\\n seq_read_iter+0x589/0x770\\n seq_read+0x1e5/0x270\\n vfs_read+0x125/0x530\\n ksys_read+0xc1/0x160\\n do_syscall_64+0x5f/0x170\\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.287\", \"versionStartIncluding\": \"3.17\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.231\", \"versionStartIncluding\": \"3.17\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.174\", \"versionStartIncluding\": \"3.17\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.120\", \"versionStartIncluding\": \"3.17\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.64\", \"versionStartIncluding\": \"3.17\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.12.4\", \"versionStartIncluding\": \"3.17\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.13\", \"versionStartIncluding\": \"3.17\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:58:18.903Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-56558\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T20:49:29.154Z\", \"dateReserved\": \"2024-12-27T14:03:05.992Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-12-27T14:23:03.902Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
SUSE-SU-2025:20526-1
Vulnerability from csaf_suse - Published: 2025-08-01 08:37 - Updated: 2025-08-01 08:37Summary
Security update for kernel-livepatch-MICRO-6-0_Update_3
Severity
Important
Notes
Title of the patch: Security update for kernel-livepatch-MICRO-6-0_Update_3
Description of the patch: This update for kernel-livepatch-MICRO-6-0_Update_3 fixes the following issues:
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233118)
- CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233227)
- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)
- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)
- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)
- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)
- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)
Patchnames: SUSE-SLE-Micro-6.0-kernel-61
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.1 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.1 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.4 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
61 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-livepatch-MICRO-6-0_Update_3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-livepatch-MICRO-6-0_Update_3 fixes the following issues:\n\n- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233118)\n- CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233227)\n- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)\n- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)\n- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)\n- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)\n- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)\n- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)\n- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)\n- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-kernel-61",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20526-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20526-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520526-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20526-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041025.html"
},
{
"category": "self",
"summary": "SUSE Bug 1233118",
"url": "https://bugzilla.suse.com/1233118"
},
{
"category": "self",
"summary": "SUSE Bug 1233227",
"url": "https://bugzilla.suse.com/1233227"
},
{
"category": "self",
"summary": "SUSE Bug 1234854",
"url": "https://bugzilla.suse.com/1234854"
},
{
"category": "self",
"summary": "SUSE Bug 1234885",
"url": "https://bugzilla.suse.com/1234885"
},
{
"category": "self",
"summary": "SUSE Bug 1234892",
"url": "https://bugzilla.suse.com/1234892"
},
{
"category": "self",
"summary": "SUSE Bug 1235005",
"url": "https://bugzilla.suse.com/1235005"
},
{
"category": "self",
"summary": "SUSE Bug 1235769",
"url": "https://bugzilla.suse.com/1235769"
},
{
"category": "self",
"summary": "SUSE Bug 1235921",
"url": "https://bugzilla.suse.com/1235921"
},
{
"category": "self",
"summary": "SUSE Bug 1238912",
"url": "https://bugzilla.suse.com/1238912"
},
{
"category": "self",
"summary": "SUSE Bug 1241579",
"url": "https://bugzilla.suse.com/1241579"
},
{
"category": "self",
"summary": "SUSE Bug 1243648",
"url": "https://bugzilla.suse.com/1243648"
},
{
"category": "self",
"summary": "SUSE Bug 1244337",
"url": "https://bugzilla.suse.com/1244337"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50208 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50250 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53146 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53166 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53173 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53214 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56558 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57793 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57893 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21772 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22115/"
}
],
"title": "Security update for kernel-livepatch-MICRO-6-0_Update_3",
"tracking": {
"current_release_date": "2025-08-01T08:37:39Z",
"generator": {
"date": "2025-08-01T08:37:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20526-1",
"initial_release_date": "2025-08-01T08:37:39Z",
"revision_history": [
{
"date": "2025-08-01T08:37:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"product_id": "kernel-livepatch-6_4_0-20-default-8-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-20-default-8-1.2.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-20-default-8-1.2.x86_64",
"product_id": "kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-20-default-8-1.2.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-20-default-8-1.2.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-20-default-8-1.2.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-50208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50208"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages\n\nAvoid memory corruption while setting up Level-2 PBL pages for the non MR\nresources when num_pages \u003e 256K.\n\nThere will be a single PDE page address (contiguous pages in the case of \u003e\nPAGE_SIZE), but, current logic assumes multiple pages, leading to invalid\nmemory access after 256K PBL entries in the PDE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50208",
"url": "https://www.suse.com/security/cve/CVE-2024-50208"
},
{
"category": "external",
"summary": "SUSE Bug 1233117 for CVE-2024-50208",
"url": "https://bugzilla.suse.com/1233117"
},
{
"category": "external",
"summary": "SUSE Bug 1233118 for CVE-2024-50208",
"url": "https://bugzilla.suse.com/1233118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-50208"
},
{
"cve": "CVE-2024-50250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50250"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsdax: dax_unshare_iter needs to copy entire blocks\n\nThe code that copies data from srcmap to iomap in dax_unshare_iter is\nvery very broken, which bfoster\u0027s recent fsx changes have exposed.\n\nIf the pos and len passed to dax_file_unshare are not aligned to an\nfsblock boundary, the iter pos and length in the _iter function will\nreflect this unalignment.\n\ndax_iomap_direct_access always returns a pointer to the start of the\nkmapped fsdax page, even if its pos argument is in the middle of that\npage. This is catastrophic for data integrity when iter-\u003epos is not\naligned to a page, because daddr/saddr do not point to the same byte in\nthe file as iter-\u003epos. Hence we corrupt user data by copying it to the\nwrong place.\n\nIf iter-\u003epos + iomap_length() in the _iter function not aligned to a\npage, then we fail to copy a full block, and only partially populate the\ndestination block. This is catastrophic for data confidentiality\nbecause we expose stale pmem contents.\n\nFix both of these issues by aligning copy_pos/copy_len to a page\nboundary (remember, this is fsdax so 1 fsblock == 1 base page) so that\nwe always copy full blocks.\n\nWe\u0027re not done yet -- there\u0027s no call to invalidate_inode_pages2_range,\nso programs that have the file range mmap\u0027d will continue accessing the\nold memory mapping after the file metadata updates have completed.\n\nBe careful with the return value -- if the unshare succeeds, we still\nneed to return the number of bytes that the iomap iter thinks we\u0027re\noperating on.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50250",
"url": "https://www.suse.com/security/cve/CVE-2024-50250"
},
{
"category": "external",
"summary": "SUSE Bug 1233226 for CVE-2024-50250",
"url": "https://bugzilla.suse.com/1233226"
},
{
"category": "external",
"summary": "SUSE Bug 1233227 for CVE-2024-50250",
"url": "https://bugzilla.suse.com/1233227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-50250"
},
{
"cve": "CVE-2024-53146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent a potential integer overflow\n\nIf the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition\ncan result in an integer overflow. Address this by splitting the\ndecoding into several steps so that decode_cb_compound4res() does\nnot have to perform arithmetic on the unsafe length value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53146",
"url": "https://www.suse.com/security/cve/CVE-2024-53146"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234854 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-53146"
},
{
"cve": "CVE-2024-53166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix bfqq uaf in bfq_limit_depth()\n\nSet new allocated bfqq to bic or remove freed bfqq from bic are both\nprotected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq\nfrom bic without the lock, this can lead to UAF if the io_context is\nshared by multiple tasks.\n\nFor example, test bfq with io_uring can trigger following UAF in v6.6:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50\n\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x47/0x80\n print_address_description.constprop.0+0x66/0x300\n print_report+0x3e/0x70\n kasan_report+0xb4/0xf0\n bfqq_group+0x15/0x50\n bfqq_request_over_limit+0x130/0x9a0\n bfq_limit_depth+0x1b5/0x480\n __blk_mq_alloc_requests+0x2b5/0xa00\n blk_mq_get_new_requests+0x11d/0x1d0\n blk_mq_submit_bio+0x286/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __block_write_full_folio+0x3d0/0x640\n writepage_cb+0x3b/0xc0\n write_cache_pages+0x254/0x6c0\n write_cache_pages+0x254/0x6c0\n do_writepages+0x192/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork_asm+0x1b/0x30\n \u003c/TASK\u003e\n\nAllocated by task 808602:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_slab_alloc+0x83/0x90\n kmem_cache_alloc_node+0x1b1/0x6d0\n bfq_get_queue+0x138/0xfa0\n bfq_get_bfqq_handle_split+0xe3/0x2c0\n bfq_init_rq+0x196/0xbb0\n bfq_insert_request.isra.0+0xb5/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_insert_request+0x15d/0x440\n blk_mq_submit_bio+0x8a4/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __blkdev_direct_IO_async+0x2dd/0x330\n blkdev_write_iter+0x39a/0x450\n io_write+0x22a/0x840\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFreed by task 808589:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x27/0x40\n __kasan_slab_free+0x126/0x1b0\n kmem_cache_free+0x10c/0x750\n bfq_put_queue+0x2dd/0x770\n __bfq_insert_request.isra.0+0x155/0x7a0\n bfq_insert_request.isra.0+0x122/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_dispatch_plug_list+0x528/0x7e0\n blk_mq_flush_plug_list.part.0+0xe5/0x590\n __blk_flush_plug+0x3b/0x90\n blk_finish_plug+0x40/0x60\n do_writepages+0x19d/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFix the problem by protecting bic_to_bfqq() with bfqd-\u003elock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53166",
"url": "https://www.suse.com/security/cve/CVE-2024-53166"
},
{
"category": "external",
"summary": "SUSE Bug 1234884 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234884"
},
{
"category": "external",
"summary": "SUSE Bug 1234885 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-53166"
},
{
"cve": "CVE-2024-53173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53173",
"url": "https://www.suse.com/security/cve/CVE-2024-53173"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234891 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234891"
},
{
"category": "external",
"summary": "SUSE Bug 1234892 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-53173"
},
{
"cve": "CVE-2024-53214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the \u0027Next\nCapability Offset\u0027 field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device-\u003epci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53214",
"url": "https://www.suse.com/security/cve/CVE-2024-53214"
},
{
"category": "external",
"summary": "SUSE Bug 1235004 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235004"
},
{
"category": "external",
"summary": "SUSE Bug 1235005 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-53214"
},
{
"cve": "CVE-2024-56558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56558"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: make sure exp active before svc_export_show\n\nThe function `e_show` was called with protection from RCU. This only\nensures that `exp` will not be freed. Therefore, the reference count for\n`exp` can drop to zero, which will trigger a refcount use-after-free\nwarning when `exp_get` is called. To resolve this issue, use\n`cache_get_rcu` to ensure that `exp` remains active.\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 819 at lib/refcount.c:25\nrefcount_warn_saturate+0xb1/0x120\nCPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb1/0x120\n...\nCall Trace:\n \u003cTASK\u003e\n e_show+0x20b/0x230 [nfsd]\n seq_read_iter+0x589/0x770\n seq_read+0x1e5/0x270\n vfs_read+0x125/0x530\n ksys_read+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56558",
"url": "https://www.suse.com/security/cve/CVE-2024-56558"
},
{
"category": "external",
"summary": "SUSE Bug 1235100 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1235100"
},
{
"category": "external",
"summary": "SUSE Bug 1243648 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1243648"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-56558"
},
{
"cve": "CVE-2024-57793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57793"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirt: tdx-guest: Just leak decrypted memory on unrecoverable errors\n\nIn CoCo VMs it is possible for the untrusted host to cause\nset_memory_decrypted() to fail such that an error is returned\nand the resulting memory is shared. Callers need to take care\nto handle these errors to avoid returning decrypted (shared)\nmemory to the page allocator, which could lead to functional\nor security issues.\n\nLeak the decrypted memory when set_memory_decrypted() fails,\nand don\u0027t need to print an error since set_memory_decrypted()\nwill call WARN_ONCE().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57793",
"url": "https://www.suse.com/security/cve/CVE-2024-57793"
},
{
"category": "external",
"summary": "SUSE Bug 1235768 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235768"
},
{
"category": "external",
"summary": "SUSE Bug 1235769 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235769"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-57793"
},
{
"cve": "CVE-2024-57893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57893"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: oss: Fix races at processing SysEx messages\n\nOSS sequencer handles the SysEx messages split in 6 bytes packets, and\nALSA sequencer OSS layer tries to combine those. It stores the data\nin the internal buffer and this access is racy as of now, which may\nlead to the out-of-bounds access.\n\nAs a temporary band-aid fix, introduce a mutex for serializing the\nprocess of the SysEx message packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57893",
"url": "https://www.suse.com/security/cve/CVE-2024-57893"
},
{
"category": "external",
"summary": "SUSE Bug 1235920 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235920"
},
{
"category": "external",
"summary": "SUSE Bug 1235921 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-57893"
},
{
"cve": "CVE-2025-21772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21772"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npartitions: mac: fix handling of bogus partition table\n\nFix several issues in partition probing:\n\n - The bailout for a bad partoffset must use put_dev_sector(), since the\n preceding read_part_sector() succeeded.\n - If the partition table claims a silly sector size like 0xfff bytes\n (which results in partition table entries straddling sector boundaries),\n bail out instead of accessing out-of-bounds memory.\n - We must not assume that the partition table contains proper NUL\n termination - use strnlen() and strncmp() instead of strlen() and\n strcmp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21772",
"url": "https://www.suse.com/security/cve/CVE-2025-21772"
},
{
"category": "external",
"summary": "SUSE Bug 1238911 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238911"
},
{
"category": "external",
"summary": "SUSE Bug 1238912 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2025-21772"
},
{
"cve": "CVE-2025-22115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix block group refcount race in btrfs_create_pending_block_groups()\n\nBlock group creation is done in two phases, which results in a slightly\nunintuitive property: a block group can be allocated/deallocated from\nafter btrfs_make_block_group() adds it to the space_info with\nbtrfs_add_bg_to_space_info(), but before creation is completely completed\nin btrfs_create_pending_block_groups(). As a result, it is possible for a\nblock group to go unused and have \u0027btrfs_mark_bg_unused\u0027 called on it\nconcurrently with \u0027btrfs_create_pending_block_groups\u0027. This causes a\nnumber of issues, which were fixed with the block group flag\n\u0027BLOCK_GROUP_FLAG_NEW\u0027.\n\nHowever, this fix is not quite complete. Since it does not use the\nunused_bg_lock, it is possible for the following race to occur:\n\nbtrfs_create_pending_block_groups btrfs_mark_bg_unused\n if list_empty // false\n list_del_init\n clear_bit\n else if (test_bit) // true\n list_move_tail\n\nAnd we get into the exact same broken ref count and invalid new_bgs\nstate for transaction cleanup that BLOCK_GROUP_FLAG_NEW was designed to\nprevent.\n\nThe broken refcount aspect will result in a warning like:\n\n [1272.943527] refcount_t: underflow; use-after-free.\n [1272.943967] WARNING: CPU: 1 PID: 61 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110\n [1272.944731] Modules linked in: btrfs virtio_net xor zstd_compress raid6_pq null_blk [last unloaded: btrfs]\n [1272.945550] CPU: 1 UID: 0 PID: 61 Comm: kworker/u32:1 Kdump: loaded Tainted: G W 6.14.0-rc5+ #108\n [1272.946368] Tainted: [W]=WARN\n [1272.946585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n [1272.947273] Workqueue: btrfs_discard btrfs_discard_workfn [btrfs]\n [1272.947788] RIP: 0010:refcount_warn_saturate+0xba/0x110\n [1272.949532] RSP: 0018:ffffbf1200247df0 EFLAGS: 00010282\n [1272.949901] RAX: 0000000000000000 RBX: ffffa14b00e3f800 RCX: 0000000000000000\n [1272.950437] RDX: 0000000000000000 RSI: ffffbf1200247c78 RDI: 00000000ffffdfff\n [1272.950986] RBP: ffffa14b00dc2860 R08: 00000000ffffdfff R09: ffffffff90526268\n [1272.951512] R10: ffffffff904762c0 R11: 0000000063666572 R12: ffffa14b00dc28c0\n [1272.952024] R13: 0000000000000000 R14: ffffa14b00dc2868 R15: 000001285dcd12c0\n [1272.952850] FS: 0000000000000000(0000) GS:ffffa14d33c40000(0000) knlGS:0000000000000000\n [1272.953458] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [1272.953931] CR2: 00007f838cbda000 CR3: 000000010104e000 CR4: 00000000000006f0\n [1272.954474] Call Trace:\n [1272.954655] \u003cTASK\u003e\n [1272.954812] ? refcount_warn_saturate+0xba/0x110\n [1272.955173] ? __warn.cold+0x93/0xd7\n [1272.955487] ? refcount_warn_saturate+0xba/0x110\n [1272.955816] ? report_bug+0xe7/0x120\n [1272.956103] ? handle_bug+0x53/0x90\n [1272.956424] ? exc_invalid_op+0x13/0x60\n [1272.956700] ? asm_exc_invalid_op+0x16/0x20\n [1272.957011] ? refcount_warn_saturate+0xba/0x110\n [1272.957399] btrfs_discard_cancel_work.cold+0x26/0x2b [btrfs]\n [1272.957853] btrfs_put_block_group.cold+0x5d/0x8e [btrfs]\n [1272.958289] btrfs_discard_workfn+0x194/0x380 [btrfs]\n [1272.958729] process_one_work+0x130/0x290\n [1272.959026] worker_thread+0x2ea/0x420\n [1272.959335] ? __pfx_worker_thread+0x10/0x10\n [1272.959644] kthread+0xd7/0x1c0\n [1272.959872] ? __pfx_kthread+0x10/0x10\n [1272.960172] ret_from_fork+0x30/0x50\n [1272.960474] ? __pfx_kthread+0x10/0x10\n [1272.960745] ret_from_fork_asm+0x1a/0x30\n [1272.961035] \u003c/TASK\u003e\n [1272.961238] ---[ end trace 0000000000000000 ]---\n\nThough we have seen them in the async discard workfn as well. It is\nmost likely to happen after a relocation finishes which cancels discard,\ntears down the block group, etc.\n\nFix this fully by taking the lock arou\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22115",
"url": "https://www.suse.com/security/cve/CVE-2025-22115"
},
{
"category": "external",
"summary": "SUSE Bug 1241578 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241578"
},
{
"category": "external",
"summary": "SUSE Bug 1241579 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-20-default-8-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2025-22115"
}
]
}
SUSE-SU-2025:20527-1
Vulnerability from csaf_suse - Published: 2025-08-01 08:37 - Updated: 2025-08-01 08:37Summary
Security update for kernel-livepatch-MICRO-6-0_Update_4
Severity
Important
Notes
Title of the patch: Security update for kernel-livepatch-MICRO-6-0_Update_4
Description of the patch: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues:
- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)
- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)
- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)
- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)
- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)
Patchnames: SUSE-SLE-Micro-6.0-kernel-62
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.4 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
51 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-livepatch-MICRO-6-0_Update_4",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues:\n\n- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)\n- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)\n- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)\n- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)\n- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)\n- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)\n- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)\n- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-kernel-62",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20527-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20527-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520527-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20527-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041024.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234854",
"url": "https://bugzilla.suse.com/1234854"
},
{
"category": "self",
"summary": "SUSE Bug 1234885",
"url": "https://bugzilla.suse.com/1234885"
},
{
"category": "self",
"summary": "SUSE Bug 1234892",
"url": "https://bugzilla.suse.com/1234892"
},
{
"category": "self",
"summary": "SUSE Bug 1235005",
"url": "https://bugzilla.suse.com/1235005"
},
{
"category": "self",
"summary": "SUSE Bug 1235769",
"url": "https://bugzilla.suse.com/1235769"
},
{
"category": "self",
"summary": "SUSE Bug 1235921",
"url": "https://bugzilla.suse.com/1235921"
},
{
"category": "self",
"summary": "SUSE Bug 1238912",
"url": "https://bugzilla.suse.com/1238912"
},
{
"category": "self",
"summary": "SUSE Bug 1241579",
"url": "https://bugzilla.suse.com/1241579"
},
{
"category": "self",
"summary": "SUSE Bug 1243648",
"url": "https://bugzilla.suse.com/1243648"
},
{
"category": "self",
"summary": "SUSE Bug 1244337",
"url": "https://bugzilla.suse.com/1244337"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53146 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53166 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53173 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53214 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56558 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57793 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57893 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21772 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22115/"
}
],
"title": "Security update for kernel-livepatch-MICRO-6-0_Update_4",
"tracking": {
"current_release_date": "2025-08-01T08:37:43Z",
"generator": {
"date": "2025-08-01T08:37:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20527-1",
"initial_release_date": "2025-08-01T08:37:43Z",
"revision_history": [
{
"date": "2025-08-01T08:37:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"product_id": "kernel-livepatch-6_4_0-24-default-6-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.x86_64",
"product_id": "kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-24-default-6-1.2.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-53146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent a potential integer overflow\n\nIf the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition\ncan result in an integer overflow. Address this by splitting the\ndecoding into several steps so that decode_cb_compound4res() does\nnot have to perform arithmetic on the unsafe length value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53146",
"url": "https://www.suse.com/security/cve/CVE-2024-53146"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234854 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-53146"
},
{
"cve": "CVE-2024-53166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix bfqq uaf in bfq_limit_depth()\n\nSet new allocated bfqq to bic or remove freed bfqq from bic are both\nprotected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq\nfrom bic without the lock, this can lead to UAF if the io_context is\nshared by multiple tasks.\n\nFor example, test bfq with io_uring can trigger following UAF in v6.6:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50\n\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x47/0x80\n print_address_description.constprop.0+0x66/0x300\n print_report+0x3e/0x70\n kasan_report+0xb4/0xf0\n bfqq_group+0x15/0x50\n bfqq_request_over_limit+0x130/0x9a0\n bfq_limit_depth+0x1b5/0x480\n __blk_mq_alloc_requests+0x2b5/0xa00\n blk_mq_get_new_requests+0x11d/0x1d0\n blk_mq_submit_bio+0x286/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __block_write_full_folio+0x3d0/0x640\n writepage_cb+0x3b/0xc0\n write_cache_pages+0x254/0x6c0\n write_cache_pages+0x254/0x6c0\n do_writepages+0x192/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork_asm+0x1b/0x30\n \u003c/TASK\u003e\n\nAllocated by task 808602:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_slab_alloc+0x83/0x90\n kmem_cache_alloc_node+0x1b1/0x6d0\n bfq_get_queue+0x138/0xfa0\n bfq_get_bfqq_handle_split+0xe3/0x2c0\n bfq_init_rq+0x196/0xbb0\n bfq_insert_request.isra.0+0xb5/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_insert_request+0x15d/0x440\n blk_mq_submit_bio+0x8a4/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __blkdev_direct_IO_async+0x2dd/0x330\n blkdev_write_iter+0x39a/0x450\n io_write+0x22a/0x840\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFreed by task 808589:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x27/0x40\n __kasan_slab_free+0x126/0x1b0\n kmem_cache_free+0x10c/0x750\n bfq_put_queue+0x2dd/0x770\n __bfq_insert_request.isra.0+0x155/0x7a0\n bfq_insert_request.isra.0+0x122/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_dispatch_plug_list+0x528/0x7e0\n blk_mq_flush_plug_list.part.0+0xe5/0x590\n __blk_flush_plug+0x3b/0x90\n blk_finish_plug+0x40/0x60\n do_writepages+0x19d/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFix the problem by protecting bic_to_bfqq() with bfqd-\u003elock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53166",
"url": "https://www.suse.com/security/cve/CVE-2024-53166"
},
{
"category": "external",
"summary": "SUSE Bug 1234884 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234884"
},
{
"category": "external",
"summary": "SUSE Bug 1234885 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-53166"
},
{
"cve": "CVE-2024-53173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53173",
"url": "https://www.suse.com/security/cve/CVE-2024-53173"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234891 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234891"
},
{
"category": "external",
"summary": "SUSE Bug 1234892 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-53173"
},
{
"cve": "CVE-2024-53214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the \u0027Next\nCapability Offset\u0027 field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device-\u003epci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53214",
"url": "https://www.suse.com/security/cve/CVE-2024-53214"
},
{
"category": "external",
"summary": "SUSE Bug 1235004 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235004"
},
{
"category": "external",
"summary": "SUSE Bug 1235005 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-53214"
},
{
"cve": "CVE-2024-56558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56558"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: make sure exp active before svc_export_show\n\nThe function `e_show` was called with protection from RCU. This only\nensures that `exp` will not be freed. Therefore, the reference count for\n`exp` can drop to zero, which will trigger a refcount use-after-free\nwarning when `exp_get` is called. To resolve this issue, use\n`cache_get_rcu` to ensure that `exp` remains active.\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 819 at lib/refcount.c:25\nrefcount_warn_saturate+0xb1/0x120\nCPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb1/0x120\n...\nCall Trace:\n \u003cTASK\u003e\n e_show+0x20b/0x230 [nfsd]\n seq_read_iter+0x589/0x770\n seq_read+0x1e5/0x270\n vfs_read+0x125/0x530\n ksys_read+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56558",
"url": "https://www.suse.com/security/cve/CVE-2024-56558"
},
{
"category": "external",
"summary": "SUSE Bug 1235100 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1235100"
},
{
"category": "external",
"summary": "SUSE Bug 1243648 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1243648"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-56558"
},
{
"cve": "CVE-2024-57793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57793"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirt: tdx-guest: Just leak decrypted memory on unrecoverable errors\n\nIn CoCo VMs it is possible for the untrusted host to cause\nset_memory_decrypted() to fail such that an error is returned\nand the resulting memory is shared. Callers need to take care\nto handle these errors to avoid returning decrypted (shared)\nmemory to the page allocator, which could lead to functional\nor security issues.\n\nLeak the decrypted memory when set_memory_decrypted() fails,\nand don\u0027t need to print an error since set_memory_decrypted()\nwill call WARN_ONCE().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57793",
"url": "https://www.suse.com/security/cve/CVE-2024-57793"
},
{
"category": "external",
"summary": "SUSE Bug 1235768 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235768"
},
{
"category": "external",
"summary": "SUSE Bug 1235769 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235769"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-57793"
},
{
"cve": "CVE-2024-57893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57893"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: oss: Fix races at processing SysEx messages\n\nOSS sequencer handles the SysEx messages split in 6 bytes packets, and\nALSA sequencer OSS layer tries to combine those. It stores the data\nin the internal buffer and this access is racy as of now, which may\nlead to the out-of-bounds access.\n\nAs a temporary band-aid fix, introduce a mutex for serializing the\nprocess of the SysEx message packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57893",
"url": "https://www.suse.com/security/cve/CVE-2024-57893"
},
{
"category": "external",
"summary": "SUSE Bug 1235920 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235920"
},
{
"category": "external",
"summary": "SUSE Bug 1235921 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-57893"
},
{
"cve": "CVE-2025-21772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21772"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npartitions: mac: fix handling of bogus partition table\n\nFix several issues in partition probing:\n\n - The bailout for a bad partoffset must use put_dev_sector(), since the\n preceding read_part_sector() succeeded.\n - If the partition table claims a silly sector size like 0xfff bytes\n (which results in partition table entries straddling sector boundaries),\n bail out instead of accessing out-of-bounds memory.\n - We must not assume that the partition table contains proper NUL\n termination - use strnlen() and strncmp() instead of strlen() and\n strcmp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21772",
"url": "https://www.suse.com/security/cve/CVE-2025-21772"
},
{
"category": "external",
"summary": "SUSE Bug 1238911 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238911"
},
{
"category": "external",
"summary": "SUSE Bug 1238912 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2025-21772"
},
{
"cve": "CVE-2025-22115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix block group refcount race in btrfs_create_pending_block_groups()\n\nBlock group creation is done in two phases, which results in a slightly\nunintuitive property: a block group can be allocated/deallocated from\nafter btrfs_make_block_group() adds it to the space_info with\nbtrfs_add_bg_to_space_info(), but before creation is completely completed\nin btrfs_create_pending_block_groups(). As a result, it is possible for a\nblock group to go unused and have \u0027btrfs_mark_bg_unused\u0027 called on it\nconcurrently with \u0027btrfs_create_pending_block_groups\u0027. This causes a\nnumber of issues, which were fixed with the block group flag\n\u0027BLOCK_GROUP_FLAG_NEW\u0027.\n\nHowever, this fix is not quite complete. Since it does not use the\nunused_bg_lock, it is possible for the following race to occur:\n\nbtrfs_create_pending_block_groups btrfs_mark_bg_unused\n if list_empty // false\n list_del_init\n clear_bit\n else if (test_bit) // true\n list_move_tail\n\nAnd we get into the exact same broken ref count and invalid new_bgs\nstate for transaction cleanup that BLOCK_GROUP_FLAG_NEW was designed to\nprevent.\n\nThe broken refcount aspect will result in a warning like:\n\n [1272.943527] refcount_t: underflow; use-after-free.\n [1272.943967] WARNING: CPU: 1 PID: 61 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110\n [1272.944731] Modules linked in: btrfs virtio_net xor zstd_compress raid6_pq null_blk [last unloaded: btrfs]\n [1272.945550] CPU: 1 UID: 0 PID: 61 Comm: kworker/u32:1 Kdump: loaded Tainted: G W 6.14.0-rc5+ #108\n [1272.946368] Tainted: [W]=WARN\n [1272.946585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n [1272.947273] Workqueue: btrfs_discard btrfs_discard_workfn [btrfs]\n [1272.947788] RIP: 0010:refcount_warn_saturate+0xba/0x110\n [1272.949532] RSP: 0018:ffffbf1200247df0 EFLAGS: 00010282\n [1272.949901] RAX: 0000000000000000 RBX: ffffa14b00e3f800 RCX: 0000000000000000\n [1272.950437] RDX: 0000000000000000 RSI: ffffbf1200247c78 RDI: 00000000ffffdfff\n [1272.950986] RBP: ffffa14b00dc2860 R08: 00000000ffffdfff R09: ffffffff90526268\n [1272.951512] R10: ffffffff904762c0 R11: 0000000063666572 R12: ffffa14b00dc28c0\n [1272.952024] R13: 0000000000000000 R14: ffffa14b00dc2868 R15: 000001285dcd12c0\n [1272.952850] FS: 0000000000000000(0000) GS:ffffa14d33c40000(0000) knlGS:0000000000000000\n [1272.953458] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [1272.953931] CR2: 00007f838cbda000 CR3: 000000010104e000 CR4: 00000000000006f0\n [1272.954474] Call Trace:\n [1272.954655] \u003cTASK\u003e\n [1272.954812] ? refcount_warn_saturate+0xba/0x110\n [1272.955173] ? __warn.cold+0x93/0xd7\n [1272.955487] ? refcount_warn_saturate+0xba/0x110\n [1272.955816] ? report_bug+0xe7/0x120\n [1272.956103] ? handle_bug+0x53/0x90\n [1272.956424] ? exc_invalid_op+0x13/0x60\n [1272.956700] ? asm_exc_invalid_op+0x16/0x20\n [1272.957011] ? refcount_warn_saturate+0xba/0x110\n [1272.957399] btrfs_discard_cancel_work.cold+0x26/0x2b [btrfs]\n [1272.957853] btrfs_put_block_group.cold+0x5d/0x8e [btrfs]\n [1272.958289] btrfs_discard_workfn+0x194/0x380 [btrfs]\n [1272.958729] process_one_work+0x130/0x290\n [1272.959026] worker_thread+0x2ea/0x420\n [1272.959335] ? __pfx_worker_thread+0x10/0x10\n [1272.959644] kthread+0xd7/0x1c0\n [1272.959872] ? __pfx_kthread+0x10/0x10\n [1272.960172] ret_from_fork+0x30/0x50\n [1272.960474] ? __pfx_kthread+0x10/0x10\n [1272.960745] ret_from_fork_asm+0x1a/0x30\n [1272.961035] \u003c/TASK\u003e\n [1272.961238] ---[ end trace 0000000000000000 ]---\n\nThough we have seen them in the async discard workfn as well. It is\nmost likely to happen after a relocation finishes which cancels discard,\ntears down the block group, etc.\n\nFix this fully by taking the lock arou\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22115",
"url": "https://www.suse.com/security/cve/CVE-2025-22115"
},
{
"category": "external",
"summary": "SUSE Bug 1241578 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241578"
},
{
"category": "external",
"summary": "SUSE Bug 1241579 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2025-22115"
}
]
}
SUSE-SU-2025:20540-1
Vulnerability from csaf_suse - Published: 2025-08-01 08:37 - Updated: 2025-08-01 08:37Summary
Security update for kernel-livepatch-MICRO-6-0_Update_2
Severity
Important
Notes
Title of the patch: Security update for kernel-livepatch-MICRO-6-0_Update_2
Description of the patch: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues:
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233118)
- CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233227)
- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)
- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)
- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)
- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)
- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)
Patchnames: SUSE-SLE-Micro-6.1-kernel-60
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.1 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.1 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.4 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
61 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-livepatch-MICRO-6-0_Update_2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues:\n\n- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233118)\n- CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233227)\n- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)\n- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)\n- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)\n- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)\n- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)\n- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)\n- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)\n- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-kernel-60",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20540-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20540-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520540-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20540-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041114.html"
},
{
"category": "self",
"summary": "SUSE Bug 1233118",
"url": "https://bugzilla.suse.com/1233118"
},
{
"category": "self",
"summary": "SUSE Bug 1233227",
"url": "https://bugzilla.suse.com/1233227"
},
{
"category": "self",
"summary": "SUSE Bug 1234854",
"url": "https://bugzilla.suse.com/1234854"
},
{
"category": "self",
"summary": "SUSE Bug 1234885",
"url": "https://bugzilla.suse.com/1234885"
},
{
"category": "self",
"summary": "SUSE Bug 1234892",
"url": "https://bugzilla.suse.com/1234892"
},
{
"category": "self",
"summary": "SUSE Bug 1235005",
"url": "https://bugzilla.suse.com/1235005"
},
{
"category": "self",
"summary": "SUSE Bug 1235769",
"url": "https://bugzilla.suse.com/1235769"
},
{
"category": "self",
"summary": "SUSE Bug 1235921",
"url": "https://bugzilla.suse.com/1235921"
},
{
"category": "self",
"summary": "SUSE Bug 1238912",
"url": "https://bugzilla.suse.com/1238912"
},
{
"category": "self",
"summary": "SUSE Bug 1241579",
"url": "https://bugzilla.suse.com/1241579"
},
{
"category": "self",
"summary": "SUSE Bug 1243648",
"url": "https://bugzilla.suse.com/1243648"
},
{
"category": "self",
"summary": "SUSE Bug 1244337",
"url": "https://bugzilla.suse.com/1244337"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50208 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50250 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53146 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53166 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53173 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53214 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56558 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57793 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57893 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21772 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22115/"
}
],
"title": "Security update for kernel-livepatch-MICRO-6-0_Update_2",
"tracking": {
"current_release_date": "2025-08-01T08:37:39Z",
"generator": {
"date": "2025-08-01T08:37:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20540-1",
"initial_release_date": "2025-08-01T08:37:39Z",
"revision_history": [
{
"date": "2025-08-01T08:37:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"product_id": "kernel-livepatch-6_4_0-19-default-8-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-19-default-8-1.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-19-default-8-1.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-19-default-8-1.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-19-default-8-1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-19-default-8-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-50208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50208"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages\n\nAvoid memory corruption while setting up Level-2 PBL pages for the non MR\nresources when num_pages \u003e 256K.\n\nThere will be a single PDE page address (contiguous pages in the case of \u003e\nPAGE_SIZE), but, current logic assumes multiple pages, leading to invalid\nmemory access after 256K PBL entries in the PDE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50208",
"url": "https://www.suse.com/security/cve/CVE-2024-50208"
},
{
"category": "external",
"summary": "SUSE Bug 1233117 for CVE-2024-50208",
"url": "https://bugzilla.suse.com/1233117"
},
{
"category": "external",
"summary": "SUSE Bug 1233118 for CVE-2024-50208",
"url": "https://bugzilla.suse.com/1233118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-50208"
},
{
"cve": "CVE-2024-50250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50250"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsdax: dax_unshare_iter needs to copy entire blocks\n\nThe code that copies data from srcmap to iomap in dax_unshare_iter is\nvery very broken, which bfoster\u0027s recent fsx changes have exposed.\n\nIf the pos and len passed to dax_file_unshare are not aligned to an\nfsblock boundary, the iter pos and length in the _iter function will\nreflect this unalignment.\n\ndax_iomap_direct_access always returns a pointer to the start of the\nkmapped fsdax page, even if its pos argument is in the middle of that\npage. This is catastrophic for data integrity when iter-\u003epos is not\naligned to a page, because daddr/saddr do not point to the same byte in\nthe file as iter-\u003epos. Hence we corrupt user data by copying it to the\nwrong place.\n\nIf iter-\u003epos + iomap_length() in the _iter function not aligned to a\npage, then we fail to copy a full block, and only partially populate the\ndestination block. This is catastrophic for data confidentiality\nbecause we expose stale pmem contents.\n\nFix both of these issues by aligning copy_pos/copy_len to a page\nboundary (remember, this is fsdax so 1 fsblock == 1 base page) so that\nwe always copy full blocks.\n\nWe\u0027re not done yet -- there\u0027s no call to invalidate_inode_pages2_range,\nso programs that have the file range mmap\u0027d will continue accessing the\nold memory mapping after the file metadata updates have completed.\n\nBe careful with the return value -- if the unshare succeeds, we still\nneed to return the number of bytes that the iomap iter thinks we\u0027re\noperating on.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50250",
"url": "https://www.suse.com/security/cve/CVE-2024-50250"
},
{
"category": "external",
"summary": "SUSE Bug 1233226 for CVE-2024-50250",
"url": "https://bugzilla.suse.com/1233226"
},
{
"category": "external",
"summary": "SUSE Bug 1233227 for CVE-2024-50250",
"url": "https://bugzilla.suse.com/1233227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-50250"
},
{
"cve": "CVE-2024-53146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent a potential integer overflow\n\nIf the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition\ncan result in an integer overflow. Address this by splitting the\ndecoding into several steps so that decode_cb_compound4res() does\nnot have to perform arithmetic on the unsafe length value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53146",
"url": "https://www.suse.com/security/cve/CVE-2024-53146"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234854 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-53146"
},
{
"cve": "CVE-2024-53166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix bfqq uaf in bfq_limit_depth()\n\nSet new allocated bfqq to bic or remove freed bfqq from bic are both\nprotected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq\nfrom bic without the lock, this can lead to UAF if the io_context is\nshared by multiple tasks.\n\nFor example, test bfq with io_uring can trigger following UAF in v6.6:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50\n\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x47/0x80\n print_address_description.constprop.0+0x66/0x300\n print_report+0x3e/0x70\n kasan_report+0xb4/0xf0\n bfqq_group+0x15/0x50\n bfqq_request_over_limit+0x130/0x9a0\n bfq_limit_depth+0x1b5/0x480\n __blk_mq_alloc_requests+0x2b5/0xa00\n blk_mq_get_new_requests+0x11d/0x1d0\n blk_mq_submit_bio+0x286/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __block_write_full_folio+0x3d0/0x640\n writepage_cb+0x3b/0xc0\n write_cache_pages+0x254/0x6c0\n write_cache_pages+0x254/0x6c0\n do_writepages+0x192/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork_asm+0x1b/0x30\n \u003c/TASK\u003e\n\nAllocated by task 808602:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_slab_alloc+0x83/0x90\n kmem_cache_alloc_node+0x1b1/0x6d0\n bfq_get_queue+0x138/0xfa0\n bfq_get_bfqq_handle_split+0xe3/0x2c0\n bfq_init_rq+0x196/0xbb0\n bfq_insert_request.isra.0+0xb5/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_insert_request+0x15d/0x440\n blk_mq_submit_bio+0x8a4/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __blkdev_direct_IO_async+0x2dd/0x330\n blkdev_write_iter+0x39a/0x450\n io_write+0x22a/0x840\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFreed by task 808589:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x27/0x40\n __kasan_slab_free+0x126/0x1b0\n kmem_cache_free+0x10c/0x750\n bfq_put_queue+0x2dd/0x770\n __bfq_insert_request.isra.0+0x155/0x7a0\n bfq_insert_request.isra.0+0x122/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_dispatch_plug_list+0x528/0x7e0\n blk_mq_flush_plug_list.part.0+0xe5/0x590\n __blk_flush_plug+0x3b/0x90\n blk_finish_plug+0x40/0x60\n do_writepages+0x19d/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFix the problem by protecting bic_to_bfqq() with bfqd-\u003elock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53166",
"url": "https://www.suse.com/security/cve/CVE-2024-53166"
},
{
"category": "external",
"summary": "SUSE Bug 1234884 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234884"
},
{
"category": "external",
"summary": "SUSE Bug 1234885 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-53166"
},
{
"cve": "CVE-2024-53173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53173",
"url": "https://www.suse.com/security/cve/CVE-2024-53173"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234891 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234891"
},
{
"category": "external",
"summary": "SUSE Bug 1234892 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-53173"
},
{
"cve": "CVE-2024-53214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the \u0027Next\nCapability Offset\u0027 field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device-\u003epci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53214",
"url": "https://www.suse.com/security/cve/CVE-2024-53214"
},
{
"category": "external",
"summary": "SUSE Bug 1235004 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235004"
},
{
"category": "external",
"summary": "SUSE Bug 1235005 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-53214"
},
{
"cve": "CVE-2024-56558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56558"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: make sure exp active before svc_export_show\n\nThe function `e_show` was called with protection from RCU. This only\nensures that `exp` will not be freed. Therefore, the reference count for\n`exp` can drop to zero, which will trigger a refcount use-after-free\nwarning when `exp_get` is called. To resolve this issue, use\n`cache_get_rcu` to ensure that `exp` remains active.\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 819 at lib/refcount.c:25\nrefcount_warn_saturate+0xb1/0x120\nCPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb1/0x120\n...\nCall Trace:\n \u003cTASK\u003e\n e_show+0x20b/0x230 [nfsd]\n seq_read_iter+0x589/0x770\n seq_read+0x1e5/0x270\n vfs_read+0x125/0x530\n ksys_read+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56558",
"url": "https://www.suse.com/security/cve/CVE-2024-56558"
},
{
"category": "external",
"summary": "SUSE Bug 1235100 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1235100"
},
{
"category": "external",
"summary": "SUSE Bug 1243648 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1243648"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-56558"
},
{
"cve": "CVE-2024-57793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57793"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirt: tdx-guest: Just leak decrypted memory on unrecoverable errors\n\nIn CoCo VMs it is possible for the untrusted host to cause\nset_memory_decrypted() to fail such that an error is returned\nand the resulting memory is shared. Callers need to take care\nto handle these errors to avoid returning decrypted (shared)\nmemory to the page allocator, which could lead to functional\nor security issues.\n\nLeak the decrypted memory when set_memory_decrypted() fails,\nand don\u0027t need to print an error since set_memory_decrypted()\nwill call WARN_ONCE().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57793",
"url": "https://www.suse.com/security/cve/CVE-2024-57793"
},
{
"category": "external",
"summary": "SUSE Bug 1235768 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235768"
},
{
"category": "external",
"summary": "SUSE Bug 1235769 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235769"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-57793"
},
{
"cve": "CVE-2024-57893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57893"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: oss: Fix races at processing SysEx messages\n\nOSS sequencer handles the SysEx messages split in 6 bytes packets, and\nALSA sequencer OSS layer tries to combine those. It stores the data\nin the internal buffer and this access is racy as of now, which may\nlead to the out-of-bounds access.\n\nAs a temporary band-aid fix, introduce a mutex for serializing the\nprocess of the SysEx message packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57893",
"url": "https://www.suse.com/security/cve/CVE-2024-57893"
},
{
"category": "external",
"summary": "SUSE Bug 1235920 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235920"
},
{
"category": "external",
"summary": "SUSE Bug 1235921 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2024-57893"
},
{
"cve": "CVE-2025-21772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21772"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npartitions: mac: fix handling of bogus partition table\n\nFix several issues in partition probing:\n\n - The bailout for a bad partoffset must use put_dev_sector(), since the\n preceding read_part_sector() succeeded.\n - If the partition table claims a silly sector size like 0xfff bytes\n (which results in partition table entries straddling sector boundaries),\n bail out instead of accessing out-of-bounds memory.\n - We must not assume that the partition table contains proper NUL\n termination - use strnlen() and strncmp() instead of strlen() and\n strcmp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21772",
"url": "https://www.suse.com/security/cve/CVE-2025-21772"
},
{
"category": "external",
"summary": "SUSE Bug 1238911 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238911"
},
{
"category": "external",
"summary": "SUSE Bug 1238912 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2025-21772"
},
{
"cve": "CVE-2025-22115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix block group refcount race in btrfs_create_pending_block_groups()\n\nBlock group creation is done in two phases, which results in a slightly\nunintuitive property: a block group can be allocated/deallocated from\nafter btrfs_make_block_group() adds it to the space_info with\nbtrfs_add_bg_to_space_info(), but before creation is completely completed\nin btrfs_create_pending_block_groups(). As a result, it is possible for a\nblock group to go unused and have \u0027btrfs_mark_bg_unused\u0027 called on it\nconcurrently with \u0027btrfs_create_pending_block_groups\u0027. This causes a\nnumber of issues, which were fixed with the block group flag\n\u0027BLOCK_GROUP_FLAG_NEW\u0027.\n\nHowever, this fix is not quite complete. Since it does not use the\nunused_bg_lock, it is possible for the following race to occur:\n\nbtrfs_create_pending_block_groups btrfs_mark_bg_unused\n if list_empty // false\n list_del_init\n clear_bit\n else if (test_bit) // true\n list_move_tail\n\nAnd we get into the exact same broken ref count and invalid new_bgs\nstate for transaction cleanup that BLOCK_GROUP_FLAG_NEW was designed to\nprevent.\n\nThe broken refcount aspect will result in a warning like:\n\n [1272.943527] refcount_t: underflow; use-after-free.\n [1272.943967] WARNING: CPU: 1 PID: 61 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110\n [1272.944731] Modules linked in: btrfs virtio_net xor zstd_compress raid6_pq null_blk [last unloaded: btrfs]\n [1272.945550] CPU: 1 UID: 0 PID: 61 Comm: kworker/u32:1 Kdump: loaded Tainted: G W 6.14.0-rc5+ #108\n [1272.946368] Tainted: [W]=WARN\n [1272.946585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n [1272.947273] Workqueue: btrfs_discard btrfs_discard_workfn [btrfs]\n [1272.947788] RIP: 0010:refcount_warn_saturate+0xba/0x110\n [1272.949532] RSP: 0018:ffffbf1200247df0 EFLAGS: 00010282\n [1272.949901] RAX: 0000000000000000 RBX: ffffa14b00e3f800 RCX: 0000000000000000\n [1272.950437] RDX: 0000000000000000 RSI: ffffbf1200247c78 RDI: 00000000ffffdfff\n [1272.950986] RBP: ffffa14b00dc2860 R08: 00000000ffffdfff R09: ffffffff90526268\n [1272.951512] R10: ffffffff904762c0 R11: 0000000063666572 R12: ffffa14b00dc28c0\n [1272.952024] R13: 0000000000000000 R14: ffffa14b00dc2868 R15: 000001285dcd12c0\n [1272.952850] FS: 0000000000000000(0000) GS:ffffa14d33c40000(0000) knlGS:0000000000000000\n [1272.953458] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [1272.953931] CR2: 00007f838cbda000 CR3: 000000010104e000 CR4: 00000000000006f0\n [1272.954474] Call Trace:\n [1272.954655] \u003cTASK\u003e\n [1272.954812] ? refcount_warn_saturate+0xba/0x110\n [1272.955173] ? __warn.cold+0x93/0xd7\n [1272.955487] ? refcount_warn_saturate+0xba/0x110\n [1272.955816] ? report_bug+0xe7/0x120\n [1272.956103] ? handle_bug+0x53/0x90\n [1272.956424] ? exc_invalid_op+0x13/0x60\n [1272.956700] ? asm_exc_invalid_op+0x16/0x20\n [1272.957011] ? refcount_warn_saturate+0xba/0x110\n [1272.957399] btrfs_discard_cancel_work.cold+0x26/0x2b [btrfs]\n [1272.957853] btrfs_put_block_group.cold+0x5d/0x8e [btrfs]\n [1272.958289] btrfs_discard_workfn+0x194/0x380 [btrfs]\n [1272.958729] process_one_work+0x130/0x290\n [1272.959026] worker_thread+0x2ea/0x420\n [1272.959335] ? __pfx_worker_thread+0x10/0x10\n [1272.959644] kthread+0xd7/0x1c0\n [1272.959872] ? __pfx_kthread+0x10/0x10\n [1272.960172] ret_from_fork+0x30/0x50\n [1272.960474] ? __pfx_kthread+0x10/0x10\n [1272.960745] ret_from_fork_asm+0x1a/0x30\n [1272.961035] \u003c/TASK\u003e\n [1272.961238] ---[ end trace 0000000000000000 ]---\n\nThough we have seen them in the async discard workfn as well. It is\nmost likely to happen after a relocation finishes which cancels discard,\ntears down the block group, etc.\n\nFix this fully by taking the lock arou\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22115",
"url": "https://www.suse.com/security/cve/CVE-2025-22115"
},
{
"category": "external",
"summary": "SUSE Bug 1241578 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241578"
},
{
"category": "external",
"summary": "SUSE Bug 1241579 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:39Z",
"details": "important"
}
],
"title": "CVE-2025-22115"
}
]
}
SUSE-SU-2025:20541-1
Vulnerability from csaf_suse - Published: 2025-08-01 08:37 - Updated: 2025-08-01 08:37Summary
Security update for kernel-livepatch-MICRO-6-0_Update_4
Severity
Important
Notes
Title of the patch: Security update for kernel-livepatch-MICRO-6-0_Update_4
Description of the patch: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues:
- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)
- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)
- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)
- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)
- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)
Patchnames: SUSE-SLE-Micro-6.1-kernel-62
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.4 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
51 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-livepatch-MICRO-6-0_Update_4",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues:\n\n- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)\n- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)\n- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)\n- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)\n- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)\n- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)\n- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)\n- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-kernel-62",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20541-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20541-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520541-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20541-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041113.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234854",
"url": "https://bugzilla.suse.com/1234854"
},
{
"category": "self",
"summary": "SUSE Bug 1234885",
"url": "https://bugzilla.suse.com/1234885"
},
{
"category": "self",
"summary": "SUSE Bug 1234892",
"url": "https://bugzilla.suse.com/1234892"
},
{
"category": "self",
"summary": "SUSE Bug 1235005",
"url": "https://bugzilla.suse.com/1235005"
},
{
"category": "self",
"summary": "SUSE Bug 1235769",
"url": "https://bugzilla.suse.com/1235769"
},
{
"category": "self",
"summary": "SUSE Bug 1235921",
"url": "https://bugzilla.suse.com/1235921"
},
{
"category": "self",
"summary": "SUSE Bug 1238912",
"url": "https://bugzilla.suse.com/1238912"
},
{
"category": "self",
"summary": "SUSE Bug 1241579",
"url": "https://bugzilla.suse.com/1241579"
},
{
"category": "self",
"summary": "SUSE Bug 1243648",
"url": "https://bugzilla.suse.com/1243648"
},
{
"category": "self",
"summary": "SUSE Bug 1244337",
"url": "https://bugzilla.suse.com/1244337"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53146 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53166 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53173 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53214 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56558 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57793 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57893 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21772 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22115/"
}
],
"title": "Security update for kernel-livepatch-MICRO-6-0_Update_4",
"tracking": {
"current_release_date": "2025-08-01T08:37:43Z",
"generator": {
"date": "2025-08-01T08:37:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20541-1",
"initial_release_date": "2025-08-01T08:37:43Z",
"revision_history": [
{
"date": "2025-08-01T08:37:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"product_id": "kernel-livepatch-6_4_0-24-default-6-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.x86_64",
"product_id": "kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-24-default-6-1.2.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-24-default-6-1.2.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-53146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent a potential integer overflow\n\nIf the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition\ncan result in an integer overflow. Address this by splitting the\ndecoding into several steps so that decode_cb_compound4res() does\nnot have to perform arithmetic on the unsafe length value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53146",
"url": "https://www.suse.com/security/cve/CVE-2024-53146"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234854 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-53146"
},
{
"cve": "CVE-2024-53166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix bfqq uaf in bfq_limit_depth()\n\nSet new allocated bfqq to bic or remove freed bfqq from bic are both\nprotected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq\nfrom bic without the lock, this can lead to UAF if the io_context is\nshared by multiple tasks.\n\nFor example, test bfq with io_uring can trigger following UAF in v6.6:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50\n\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x47/0x80\n print_address_description.constprop.0+0x66/0x300\n print_report+0x3e/0x70\n kasan_report+0xb4/0xf0\n bfqq_group+0x15/0x50\n bfqq_request_over_limit+0x130/0x9a0\n bfq_limit_depth+0x1b5/0x480\n __blk_mq_alloc_requests+0x2b5/0xa00\n blk_mq_get_new_requests+0x11d/0x1d0\n blk_mq_submit_bio+0x286/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __block_write_full_folio+0x3d0/0x640\n writepage_cb+0x3b/0xc0\n write_cache_pages+0x254/0x6c0\n write_cache_pages+0x254/0x6c0\n do_writepages+0x192/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork_asm+0x1b/0x30\n \u003c/TASK\u003e\n\nAllocated by task 808602:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_slab_alloc+0x83/0x90\n kmem_cache_alloc_node+0x1b1/0x6d0\n bfq_get_queue+0x138/0xfa0\n bfq_get_bfqq_handle_split+0xe3/0x2c0\n bfq_init_rq+0x196/0xbb0\n bfq_insert_request.isra.0+0xb5/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_insert_request+0x15d/0x440\n blk_mq_submit_bio+0x8a4/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __blkdev_direct_IO_async+0x2dd/0x330\n blkdev_write_iter+0x39a/0x450\n io_write+0x22a/0x840\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFreed by task 808589:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x27/0x40\n __kasan_slab_free+0x126/0x1b0\n kmem_cache_free+0x10c/0x750\n bfq_put_queue+0x2dd/0x770\n __bfq_insert_request.isra.0+0x155/0x7a0\n bfq_insert_request.isra.0+0x122/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_dispatch_plug_list+0x528/0x7e0\n blk_mq_flush_plug_list.part.0+0xe5/0x590\n __blk_flush_plug+0x3b/0x90\n blk_finish_plug+0x40/0x60\n do_writepages+0x19d/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFix the problem by protecting bic_to_bfqq() with bfqd-\u003elock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53166",
"url": "https://www.suse.com/security/cve/CVE-2024-53166"
},
{
"category": "external",
"summary": "SUSE Bug 1234884 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234884"
},
{
"category": "external",
"summary": "SUSE Bug 1234885 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-53166"
},
{
"cve": "CVE-2024-53173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53173",
"url": "https://www.suse.com/security/cve/CVE-2024-53173"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234891 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234891"
},
{
"category": "external",
"summary": "SUSE Bug 1234892 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-53173"
},
{
"cve": "CVE-2024-53214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the \u0027Next\nCapability Offset\u0027 field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device-\u003epci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53214",
"url": "https://www.suse.com/security/cve/CVE-2024-53214"
},
{
"category": "external",
"summary": "SUSE Bug 1235004 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235004"
},
{
"category": "external",
"summary": "SUSE Bug 1235005 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-53214"
},
{
"cve": "CVE-2024-56558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56558"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: make sure exp active before svc_export_show\n\nThe function `e_show` was called with protection from RCU. This only\nensures that `exp` will not be freed. Therefore, the reference count for\n`exp` can drop to zero, which will trigger a refcount use-after-free\nwarning when `exp_get` is called. To resolve this issue, use\n`cache_get_rcu` to ensure that `exp` remains active.\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 819 at lib/refcount.c:25\nrefcount_warn_saturate+0xb1/0x120\nCPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb1/0x120\n...\nCall Trace:\n \u003cTASK\u003e\n e_show+0x20b/0x230 [nfsd]\n seq_read_iter+0x589/0x770\n seq_read+0x1e5/0x270\n vfs_read+0x125/0x530\n ksys_read+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56558",
"url": "https://www.suse.com/security/cve/CVE-2024-56558"
},
{
"category": "external",
"summary": "SUSE Bug 1235100 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1235100"
},
{
"category": "external",
"summary": "SUSE Bug 1243648 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1243648"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-56558"
},
{
"cve": "CVE-2024-57793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57793"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirt: tdx-guest: Just leak decrypted memory on unrecoverable errors\n\nIn CoCo VMs it is possible for the untrusted host to cause\nset_memory_decrypted() to fail such that an error is returned\nand the resulting memory is shared. Callers need to take care\nto handle these errors to avoid returning decrypted (shared)\nmemory to the page allocator, which could lead to functional\nor security issues.\n\nLeak the decrypted memory when set_memory_decrypted() fails,\nand don\u0027t need to print an error since set_memory_decrypted()\nwill call WARN_ONCE().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57793",
"url": "https://www.suse.com/security/cve/CVE-2024-57793"
},
{
"category": "external",
"summary": "SUSE Bug 1235768 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235768"
},
{
"category": "external",
"summary": "SUSE Bug 1235769 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235769"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-57793"
},
{
"cve": "CVE-2024-57893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57893"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: oss: Fix races at processing SysEx messages\n\nOSS sequencer handles the SysEx messages split in 6 bytes packets, and\nALSA sequencer OSS layer tries to combine those. It stores the data\nin the internal buffer and this access is racy as of now, which may\nlead to the out-of-bounds access.\n\nAs a temporary band-aid fix, introduce a mutex for serializing the\nprocess of the SysEx message packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57893",
"url": "https://www.suse.com/security/cve/CVE-2024-57893"
},
{
"category": "external",
"summary": "SUSE Bug 1235920 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235920"
},
{
"category": "external",
"summary": "SUSE Bug 1235921 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2024-57893"
},
{
"cve": "CVE-2025-21772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21772"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npartitions: mac: fix handling of bogus partition table\n\nFix several issues in partition probing:\n\n - The bailout for a bad partoffset must use put_dev_sector(), since the\n preceding read_part_sector() succeeded.\n - If the partition table claims a silly sector size like 0xfff bytes\n (which results in partition table entries straddling sector boundaries),\n bail out instead of accessing out-of-bounds memory.\n - We must not assume that the partition table contains proper NUL\n termination - use strnlen() and strncmp() instead of strlen() and\n strcmp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21772",
"url": "https://www.suse.com/security/cve/CVE-2025-21772"
},
{
"category": "external",
"summary": "SUSE Bug 1238911 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238911"
},
{
"category": "external",
"summary": "SUSE Bug 1238912 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2025-21772"
},
{
"cve": "CVE-2025-22115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix block group refcount race in btrfs_create_pending_block_groups()\n\nBlock group creation is done in two phases, which results in a slightly\nunintuitive property: a block group can be allocated/deallocated from\nafter btrfs_make_block_group() adds it to the space_info with\nbtrfs_add_bg_to_space_info(), but before creation is completely completed\nin btrfs_create_pending_block_groups(). As a result, it is possible for a\nblock group to go unused and have \u0027btrfs_mark_bg_unused\u0027 called on it\nconcurrently with \u0027btrfs_create_pending_block_groups\u0027. This causes a\nnumber of issues, which were fixed with the block group flag\n\u0027BLOCK_GROUP_FLAG_NEW\u0027.\n\nHowever, this fix is not quite complete. Since it does not use the\nunused_bg_lock, it is possible for the following race to occur:\n\nbtrfs_create_pending_block_groups btrfs_mark_bg_unused\n if list_empty // false\n list_del_init\n clear_bit\n else if (test_bit) // true\n list_move_tail\n\nAnd we get into the exact same broken ref count and invalid new_bgs\nstate for transaction cleanup that BLOCK_GROUP_FLAG_NEW was designed to\nprevent.\n\nThe broken refcount aspect will result in a warning like:\n\n [1272.943527] refcount_t: underflow; use-after-free.\n [1272.943967] WARNING: CPU: 1 PID: 61 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110\n [1272.944731] Modules linked in: btrfs virtio_net xor zstd_compress raid6_pq null_blk [last unloaded: btrfs]\n [1272.945550] CPU: 1 UID: 0 PID: 61 Comm: kworker/u32:1 Kdump: loaded Tainted: G W 6.14.0-rc5+ #108\n [1272.946368] Tainted: [W]=WARN\n [1272.946585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n [1272.947273] Workqueue: btrfs_discard btrfs_discard_workfn [btrfs]\n [1272.947788] RIP: 0010:refcount_warn_saturate+0xba/0x110\n [1272.949532] RSP: 0018:ffffbf1200247df0 EFLAGS: 00010282\n [1272.949901] RAX: 0000000000000000 RBX: ffffa14b00e3f800 RCX: 0000000000000000\n [1272.950437] RDX: 0000000000000000 RSI: ffffbf1200247c78 RDI: 00000000ffffdfff\n [1272.950986] RBP: ffffa14b00dc2860 R08: 00000000ffffdfff R09: ffffffff90526268\n [1272.951512] R10: ffffffff904762c0 R11: 0000000063666572 R12: ffffa14b00dc28c0\n [1272.952024] R13: 0000000000000000 R14: ffffa14b00dc2868 R15: 000001285dcd12c0\n [1272.952850] FS: 0000000000000000(0000) GS:ffffa14d33c40000(0000) knlGS:0000000000000000\n [1272.953458] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [1272.953931] CR2: 00007f838cbda000 CR3: 000000010104e000 CR4: 00000000000006f0\n [1272.954474] Call Trace:\n [1272.954655] \u003cTASK\u003e\n [1272.954812] ? refcount_warn_saturate+0xba/0x110\n [1272.955173] ? __warn.cold+0x93/0xd7\n [1272.955487] ? refcount_warn_saturate+0xba/0x110\n [1272.955816] ? report_bug+0xe7/0x120\n [1272.956103] ? handle_bug+0x53/0x90\n [1272.956424] ? exc_invalid_op+0x13/0x60\n [1272.956700] ? asm_exc_invalid_op+0x16/0x20\n [1272.957011] ? refcount_warn_saturate+0xba/0x110\n [1272.957399] btrfs_discard_cancel_work.cold+0x26/0x2b [btrfs]\n [1272.957853] btrfs_put_block_group.cold+0x5d/0x8e [btrfs]\n [1272.958289] btrfs_discard_workfn+0x194/0x380 [btrfs]\n [1272.958729] process_one_work+0x130/0x290\n [1272.959026] worker_thread+0x2ea/0x420\n [1272.959335] ? __pfx_worker_thread+0x10/0x10\n [1272.959644] kthread+0xd7/0x1c0\n [1272.959872] ? __pfx_kthread+0x10/0x10\n [1272.960172] ret_from_fork+0x30/0x50\n [1272.960474] ? __pfx_kthread+0x10/0x10\n [1272.960745] ret_from_fork_asm+0x1a/0x30\n [1272.961035] \u003c/TASK\u003e\n [1272.961238] ---[ end trace 0000000000000000 ]---\n\nThough we have seen them in the async discard workfn as well. It is\nmost likely to happen after a relocation finishes which cancels discard,\ntears down the block group, etc.\n\nFix this fully by taking the lock arou\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22115",
"url": "https://www.suse.com/security/cve/CVE-2025-22115"
},
{
"category": "external",
"summary": "SUSE Bug 1241578 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241578"
},
{
"category": "external",
"summary": "SUSE Bug 1241579 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-24-default-6-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T08:37:43Z",
"details": "important"
}
],
"title": "CVE-2025-22115"
}
]
}
SUSE-SU-2025:20544-1
Vulnerability from csaf_suse - Published: 2025-07-30 16:17 - Updated: 2025-07-30 16:17Summary
Security update for kernel-livepatch-MICRO-6-0-RT_Update_2
Severity
Important
Notes
Title of the patch: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2
Description of the patch: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues:
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233118)
- CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233227)
- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)
- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)
- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)
- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)
- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)
Patchnames: SUSE-SLE-Micro-6.1-kernel-54
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.1 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.1 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.4 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
61 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-livepatch-MICRO-6-0-RT_Update_2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues:\n\n- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233118)\n- CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233227)\n- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)\n- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)\n- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)\n- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)\n- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)\n- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)\n- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)\n- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-kernel-54",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20544-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20544-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520544-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20544-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041110.html"
},
{
"category": "self",
"summary": "SUSE Bug 1233118",
"url": "https://bugzilla.suse.com/1233118"
},
{
"category": "self",
"summary": "SUSE Bug 1233227",
"url": "https://bugzilla.suse.com/1233227"
},
{
"category": "self",
"summary": "SUSE Bug 1234854",
"url": "https://bugzilla.suse.com/1234854"
},
{
"category": "self",
"summary": "SUSE Bug 1234885",
"url": "https://bugzilla.suse.com/1234885"
},
{
"category": "self",
"summary": "SUSE Bug 1234892",
"url": "https://bugzilla.suse.com/1234892"
},
{
"category": "self",
"summary": "SUSE Bug 1235005",
"url": "https://bugzilla.suse.com/1235005"
},
{
"category": "self",
"summary": "SUSE Bug 1235769",
"url": "https://bugzilla.suse.com/1235769"
},
{
"category": "self",
"summary": "SUSE Bug 1235921",
"url": "https://bugzilla.suse.com/1235921"
},
{
"category": "self",
"summary": "SUSE Bug 1238912",
"url": "https://bugzilla.suse.com/1238912"
},
{
"category": "self",
"summary": "SUSE Bug 1241579",
"url": "https://bugzilla.suse.com/1241579"
},
{
"category": "self",
"summary": "SUSE Bug 1243648",
"url": "https://bugzilla.suse.com/1243648"
},
{
"category": "self",
"summary": "SUSE Bug 1244337",
"url": "https://bugzilla.suse.com/1244337"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50208 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50250 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53146 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53166 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53173 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53214 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56558 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57793 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57893 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21772 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22115/"
}
],
"title": "Security update for kernel-livepatch-MICRO-6-0-RT_Update_2",
"tracking": {
"current_release_date": "2025-07-30T16:17:29Z",
"generator": {
"date": "2025-07-30T16:17:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20544-1",
"initial_release_date": "2025-07-30T16:17:29Z",
"revision_history": [
{
"date": "2025-07-30T16:17:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-50208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50208"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages\n\nAvoid memory corruption while setting up Level-2 PBL pages for the non MR\nresources when num_pages \u003e 256K.\n\nThere will be a single PDE page address (contiguous pages in the case of \u003e\nPAGE_SIZE), but, current logic assumes multiple pages, leading to invalid\nmemory access after 256K PBL entries in the PDE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50208",
"url": "https://www.suse.com/security/cve/CVE-2024-50208"
},
{
"category": "external",
"summary": "SUSE Bug 1233117 for CVE-2024-50208",
"url": "https://bugzilla.suse.com/1233117"
},
{
"category": "external",
"summary": "SUSE Bug 1233118 for CVE-2024-50208",
"url": "https://bugzilla.suse.com/1233118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-50208"
},
{
"cve": "CVE-2024-50250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50250"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsdax: dax_unshare_iter needs to copy entire blocks\n\nThe code that copies data from srcmap to iomap in dax_unshare_iter is\nvery very broken, which bfoster\u0027s recent fsx changes have exposed.\n\nIf the pos and len passed to dax_file_unshare are not aligned to an\nfsblock boundary, the iter pos and length in the _iter function will\nreflect this unalignment.\n\ndax_iomap_direct_access always returns a pointer to the start of the\nkmapped fsdax page, even if its pos argument is in the middle of that\npage. This is catastrophic for data integrity when iter-\u003epos is not\naligned to a page, because daddr/saddr do not point to the same byte in\nthe file as iter-\u003epos. Hence we corrupt user data by copying it to the\nwrong place.\n\nIf iter-\u003epos + iomap_length() in the _iter function not aligned to a\npage, then we fail to copy a full block, and only partially populate the\ndestination block. This is catastrophic for data confidentiality\nbecause we expose stale pmem contents.\n\nFix both of these issues by aligning copy_pos/copy_len to a page\nboundary (remember, this is fsdax so 1 fsblock == 1 base page) so that\nwe always copy full blocks.\n\nWe\u0027re not done yet -- there\u0027s no call to invalidate_inode_pages2_range,\nso programs that have the file range mmap\u0027d will continue accessing the\nold memory mapping after the file metadata updates have completed.\n\nBe careful with the return value -- if the unshare succeeds, we still\nneed to return the number of bytes that the iomap iter thinks we\u0027re\noperating on.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50250",
"url": "https://www.suse.com/security/cve/CVE-2024-50250"
},
{
"category": "external",
"summary": "SUSE Bug 1233226 for CVE-2024-50250",
"url": "https://bugzilla.suse.com/1233226"
},
{
"category": "external",
"summary": "SUSE Bug 1233227 for CVE-2024-50250",
"url": "https://bugzilla.suse.com/1233227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-50250"
},
{
"cve": "CVE-2024-53146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent a potential integer overflow\n\nIf the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition\ncan result in an integer overflow. Address this by splitting the\ndecoding into several steps so that decode_cb_compound4res() does\nnot have to perform arithmetic on the unsafe length value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53146",
"url": "https://www.suse.com/security/cve/CVE-2024-53146"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234854 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-53146"
},
{
"cve": "CVE-2024-53166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix bfqq uaf in bfq_limit_depth()\n\nSet new allocated bfqq to bic or remove freed bfqq from bic are both\nprotected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq\nfrom bic without the lock, this can lead to UAF if the io_context is\nshared by multiple tasks.\n\nFor example, test bfq with io_uring can trigger following UAF in v6.6:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50\n\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x47/0x80\n print_address_description.constprop.0+0x66/0x300\n print_report+0x3e/0x70\n kasan_report+0xb4/0xf0\n bfqq_group+0x15/0x50\n bfqq_request_over_limit+0x130/0x9a0\n bfq_limit_depth+0x1b5/0x480\n __blk_mq_alloc_requests+0x2b5/0xa00\n blk_mq_get_new_requests+0x11d/0x1d0\n blk_mq_submit_bio+0x286/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __block_write_full_folio+0x3d0/0x640\n writepage_cb+0x3b/0xc0\n write_cache_pages+0x254/0x6c0\n write_cache_pages+0x254/0x6c0\n do_writepages+0x192/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork_asm+0x1b/0x30\n \u003c/TASK\u003e\n\nAllocated by task 808602:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_slab_alloc+0x83/0x90\n kmem_cache_alloc_node+0x1b1/0x6d0\n bfq_get_queue+0x138/0xfa0\n bfq_get_bfqq_handle_split+0xe3/0x2c0\n bfq_init_rq+0x196/0xbb0\n bfq_insert_request.isra.0+0xb5/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_insert_request+0x15d/0x440\n blk_mq_submit_bio+0x8a4/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __blkdev_direct_IO_async+0x2dd/0x330\n blkdev_write_iter+0x39a/0x450\n io_write+0x22a/0x840\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFreed by task 808589:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x27/0x40\n __kasan_slab_free+0x126/0x1b0\n kmem_cache_free+0x10c/0x750\n bfq_put_queue+0x2dd/0x770\n __bfq_insert_request.isra.0+0x155/0x7a0\n bfq_insert_request.isra.0+0x122/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_dispatch_plug_list+0x528/0x7e0\n blk_mq_flush_plug_list.part.0+0xe5/0x590\n __blk_flush_plug+0x3b/0x90\n blk_finish_plug+0x40/0x60\n do_writepages+0x19d/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFix the problem by protecting bic_to_bfqq() with bfqd-\u003elock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53166",
"url": "https://www.suse.com/security/cve/CVE-2024-53166"
},
{
"category": "external",
"summary": "SUSE Bug 1234884 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234884"
},
{
"category": "external",
"summary": "SUSE Bug 1234885 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-53166"
},
{
"cve": "CVE-2024-53173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53173",
"url": "https://www.suse.com/security/cve/CVE-2024-53173"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234891 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234891"
},
{
"category": "external",
"summary": "SUSE Bug 1234892 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-53173"
},
{
"cve": "CVE-2024-53214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the \u0027Next\nCapability Offset\u0027 field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device-\u003epci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53214",
"url": "https://www.suse.com/security/cve/CVE-2024-53214"
},
{
"category": "external",
"summary": "SUSE Bug 1235004 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235004"
},
{
"category": "external",
"summary": "SUSE Bug 1235005 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-53214"
},
{
"cve": "CVE-2024-56558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56558"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: make sure exp active before svc_export_show\n\nThe function `e_show` was called with protection from RCU. This only\nensures that `exp` will not be freed. Therefore, the reference count for\n`exp` can drop to zero, which will trigger a refcount use-after-free\nwarning when `exp_get` is called. To resolve this issue, use\n`cache_get_rcu` to ensure that `exp` remains active.\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 819 at lib/refcount.c:25\nrefcount_warn_saturate+0xb1/0x120\nCPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb1/0x120\n...\nCall Trace:\n \u003cTASK\u003e\n e_show+0x20b/0x230 [nfsd]\n seq_read_iter+0x589/0x770\n seq_read+0x1e5/0x270\n vfs_read+0x125/0x530\n ksys_read+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56558",
"url": "https://www.suse.com/security/cve/CVE-2024-56558"
},
{
"category": "external",
"summary": "SUSE Bug 1235100 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1235100"
},
{
"category": "external",
"summary": "SUSE Bug 1243648 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1243648"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "moderate"
}
],
"title": "CVE-2024-56558"
},
{
"cve": "CVE-2024-57793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57793"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirt: tdx-guest: Just leak decrypted memory on unrecoverable errors\n\nIn CoCo VMs it is possible for the untrusted host to cause\nset_memory_decrypted() to fail such that an error is returned\nand the resulting memory is shared. Callers need to take care\nto handle these errors to avoid returning decrypted (shared)\nmemory to the page allocator, which could lead to functional\nor security issues.\n\nLeak the decrypted memory when set_memory_decrypted() fails,\nand don\u0027t need to print an error since set_memory_decrypted()\nwill call WARN_ONCE().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57793",
"url": "https://www.suse.com/security/cve/CVE-2024-57793"
},
{
"category": "external",
"summary": "SUSE Bug 1235768 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235768"
},
{
"category": "external",
"summary": "SUSE Bug 1235769 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235769"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-57793"
},
{
"cve": "CVE-2024-57893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57893"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: oss: Fix races at processing SysEx messages\n\nOSS sequencer handles the SysEx messages split in 6 bytes packets, and\nALSA sequencer OSS layer tries to combine those. It stores the data\nin the internal buffer and this access is racy as of now, which may\nlead to the out-of-bounds access.\n\nAs a temporary band-aid fix, introduce a mutex for serializing the\nprocess of the SysEx message packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57893",
"url": "https://www.suse.com/security/cve/CVE-2024-57893"
},
{
"category": "external",
"summary": "SUSE Bug 1235920 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235920"
},
{
"category": "external",
"summary": "SUSE Bug 1235921 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-57893"
},
{
"cve": "CVE-2025-21772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21772"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npartitions: mac: fix handling of bogus partition table\n\nFix several issues in partition probing:\n\n - The bailout for a bad partoffset must use put_dev_sector(), since the\n preceding read_part_sector() succeeded.\n - If the partition table claims a silly sector size like 0xfff bytes\n (which results in partition table entries straddling sector boundaries),\n bail out instead of accessing out-of-bounds memory.\n - We must not assume that the partition table contains proper NUL\n termination - use strnlen() and strncmp() instead of strlen() and\n strcmp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21772",
"url": "https://www.suse.com/security/cve/CVE-2025-21772"
},
{
"category": "external",
"summary": "SUSE Bug 1238911 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238911"
},
{
"category": "external",
"summary": "SUSE Bug 1238912 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2025-21772"
},
{
"cve": "CVE-2025-22115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix block group refcount race in btrfs_create_pending_block_groups()\n\nBlock group creation is done in two phases, which results in a slightly\nunintuitive property: a block group can be allocated/deallocated from\nafter btrfs_make_block_group() adds it to the space_info with\nbtrfs_add_bg_to_space_info(), but before creation is completely completed\nin btrfs_create_pending_block_groups(). As a result, it is possible for a\nblock group to go unused and have \u0027btrfs_mark_bg_unused\u0027 called on it\nconcurrently with \u0027btrfs_create_pending_block_groups\u0027. This causes a\nnumber of issues, which were fixed with the block group flag\n\u0027BLOCK_GROUP_FLAG_NEW\u0027.\n\nHowever, this fix is not quite complete. Since it does not use the\nunused_bg_lock, it is possible for the following race to occur:\n\nbtrfs_create_pending_block_groups btrfs_mark_bg_unused\n if list_empty // false\n list_del_init\n clear_bit\n else if (test_bit) // true\n list_move_tail\n\nAnd we get into the exact same broken ref count and invalid new_bgs\nstate for transaction cleanup that BLOCK_GROUP_FLAG_NEW was designed to\nprevent.\n\nThe broken refcount aspect will result in a warning like:\n\n [1272.943527] refcount_t: underflow; use-after-free.\n [1272.943967] WARNING: CPU: 1 PID: 61 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110\n [1272.944731] Modules linked in: btrfs virtio_net xor zstd_compress raid6_pq null_blk [last unloaded: btrfs]\n [1272.945550] CPU: 1 UID: 0 PID: 61 Comm: kworker/u32:1 Kdump: loaded Tainted: G W 6.14.0-rc5+ #108\n [1272.946368] Tainted: [W]=WARN\n [1272.946585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n [1272.947273] Workqueue: btrfs_discard btrfs_discard_workfn [btrfs]\n [1272.947788] RIP: 0010:refcount_warn_saturate+0xba/0x110\n [1272.949532] RSP: 0018:ffffbf1200247df0 EFLAGS: 00010282\n [1272.949901] RAX: 0000000000000000 RBX: ffffa14b00e3f800 RCX: 0000000000000000\n [1272.950437] RDX: 0000000000000000 RSI: ffffbf1200247c78 RDI: 00000000ffffdfff\n [1272.950986] RBP: ffffa14b00dc2860 R08: 00000000ffffdfff R09: ffffffff90526268\n [1272.951512] R10: ffffffff904762c0 R11: 0000000063666572 R12: ffffa14b00dc28c0\n [1272.952024] R13: 0000000000000000 R14: ffffa14b00dc2868 R15: 000001285dcd12c0\n [1272.952850] FS: 0000000000000000(0000) GS:ffffa14d33c40000(0000) knlGS:0000000000000000\n [1272.953458] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [1272.953931] CR2: 00007f838cbda000 CR3: 000000010104e000 CR4: 00000000000006f0\n [1272.954474] Call Trace:\n [1272.954655] \u003cTASK\u003e\n [1272.954812] ? refcount_warn_saturate+0xba/0x110\n [1272.955173] ? __warn.cold+0x93/0xd7\n [1272.955487] ? refcount_warn_saturate+0xba/0x110\n [1272.955816] ? report_bug+0xe7/0x120\n [1272.956103] ? handle_bug+0x53/0x90\n [1272.956424] ? exc_invalid_op+0x13/0x60\n [1272.956700] ? asm_exc_invalid_op+0x16/0x20\n [1272.957011] ? refcount_warn_saturate+0xba/0x110\n [1272.957399] btrfs_discard_cancel_work.cold+0x26/0x2b [btrfs]\n [1272.957853] btrfs_put_block_group.cold+0x5d/0x8e [btrfs]\n [1272.958289] btrfs_discard_workfn+0x194/0x380 [btrfs]\n [1272.958729] process_one_work+0x130/0x290\n [1272.959026] worker_thread+0x2ea/0x420\n [1272.959335] ? __pfx_worker_thread+0x10/0x10\n [1272.959644] kthread+0xd7/0x1c0\n [1272.959872] ? __pfx_kthread+0x10/0x10\n [1272.960172] ret_from_fork+0x30/0x50\n [1272.960474] ? __pfx_kthread+0x10/0x10\n [1272.960745] ret_from_fork_asm+0x1a/0x30\n [1272.961035] \u003c/TASK\u003e\n [1272.961238] ---[ end trace 0000000000000000 ]---\n\nThough we have seen them in the async discard workfn as well. It is\nmost likely to happen after a relocation finishes which cancels discard,\ntears down the block group, etc.\n\nFix this fully by taking the lock arou\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22115",
"url": "https://www.suse.com/security/cve/CVE-2025-22115"
},
{
"category": "external",
"summary": "SUSE Bug 1241578 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241578"
},
{
"category": "external",
"summary": "SUSE Bug 1241579 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2025-22115"
}
]
}
SUSE-SU-2025:20545-1
Vulnerability from csaf_suse - Published: 2025-07-30 16:17 - Updated: 2025-07-30 16:17Summary
Security update for kernel-livepatch-MICRO-6-0-RT_Update_4
Severity
Important
Notes
Title of the patch: Security update for kernel-livepatch-MICRO-6-0-RT_Update_4
Description of the patch: This update for kernel-livepatch-MICRO-6-0-RT_Update_4 fixes the following issues:
- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)
- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)
- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)
- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)
- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)
Patchnames: SUSE-SLE-Micro-6.1-kernel-57
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.4 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
51 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-livepatch-MICRO-6-0-RT_Update_4",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-livepatch-MICRO-6-0-RT_Update_4 fixes the following issues:\n\n- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854)\n- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885)\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892)\n- CVE-2024-53214: vfio/pci: properly hide first-in-list PCIe extended capability (bsc#1235005)\n- CVE-2024-57793: virt: tdx-guest: just leak decrypted memory on unrecoverable errors (bsc#1235769)\n- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921)\n- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912)\n- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579)\n- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-kernel-57",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20545-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20545-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520545-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20545-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041109.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234854",
"url": "https://bugzilla.suse.com/1234854"
},
{
"category": "self",
"summary": "SUSE Bug 1234885",
"url": "https://bugzilla.suse.com/1234885"
},
{
"category": "self",
"summary": "SUSE Bug 1234892",
"url": "https://bugzilla.suse.com/1234892"
},
{
"category": "self",
"summary": "SUSE Bug 1235005",
"url": "https://bugzilla.suse.com/1235005"
},
{
"category": "self",
"summary": "SUSE Bug 1235769",
"url": "https://bugzilla.suse.com/1235769"
},
{
"category": "self",
"summary": "SUSE Bug 1235921",
"url": "https://bugzilla.suse.com/1235921"
},
{
"category": "self",
"summary": "SUSE Bug 1238912",
"url": "https://bugzilla.suse.com/1238912"
},
{
"category": "self",
"summary": "SUSE Bug 1241579",
"url": "https://bugzilla.suse.com/1241579"
},
{
"category": "self",
"summary": "SUSE Bug 1243648",
"url": "https://bugzilla.suse.com/1243648"
},
{
"category": "self",
"summary": "SUSE Bug 1244337",
"url": "https://bugzilla.suse.com/1244337"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53146 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53166 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53173 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53214 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56558 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57793 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57893 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21772 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22115/"
}
],
"title": "Security update for kernel-livepatch-MICRO-6-0-RT_Update_4",
"tracking": {
"current_release_date": "2025-07-30T16:17:29Z",
"generator": {
"date": "2025-07-30T16:17:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20545-1",
"initial_release_date": "2025-07-30T16:17:29Z",
"revision_history": [
{
"date": "2025-07-30T16:17:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-53146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent a potential integer overflow\n\nIf the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition\ncan result in an integer overflow. Address this by splitting the\ndecoding into several steps so that decode_cb_compound4res() does\nnot have to perform arithmetic on the unsafe length value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53146",
"url": "https://www.suse.com/security/cve/CVE-2024-53146"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234854 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-53146"
},
{
"cve": "CVE-2024-53166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix bfqq uaf in bfq_limit_depth()\n\nSet new allocated bfqq to bic or remove freed bfqq from bic are both\nprotected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq\nfrom bic without the lock, this can lead to UAF if the io_context is\nshared by multiple tasks.\n\nFor example, test bfq with io_uring can trigger following UAF in v6.6:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50\n\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x47/0x80\n print_address_description.constprop.0+0x66/0x300\n print_report+0x3e/0x70\n kasan_report+0xb4/0xf0\n bfqq_group+0x15/0x50\n bfqq_request_over_limit+0x130/0x9a0\n bfq_limit_depth+0x1b5/0x480\n __blk_mq_alloc_requests+0x2b5/0xa00\n blk_mq_get_new_requests+0x11d/0x1d0\n blk_mq_submit_bio+0x286/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __block_write_full_folio+0x3d0/0x640\n writepage_cb+0x3b/0xc0\n write_cache_pages+0x254/0x6c0\n write_cache_pages+0x254/0x6c0\n do_writepages+0x192/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork_asm+0x1b/0x30\n \u003c/TASK\u003e\n\nAllocated by task 808602:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_slab_alloc+0x83/0x90\n kmem_cache_alloc_node+0x1b1/0x6d0\n bfq_get_queue+0x138/0xfa0\n bfq_get_bfqq_handle_split+0xe3/0x2c0\n bfq_init_rq+0x196/0xbb0\n bfq_insert_request.isra.0+0xb5/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_insert_request+0x15d/0x440\n blk_mq_submit_bio+0x8a4/0xb00\n submit_bio_noacct_nocheck+0x331/0x400\n __blkdev_direct_IO_async+0x2dd/0x330\n blkdev_write_iter+0x39a/0x450\n io_write+0x22a/0x840\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFreed by task 808589:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x27/0x40\n __kasan_slab_free+0x126/0x1b0\n kmem_cache_free+0x10c/0x750\n bfq_put_queue+0x2dd/0x770\n __bfq_insert_request.isra.0+0x155/0x7a0\n bfq_insert_request.isra.0+0x122/0x480\n bfq_insert_requests+0x156/0x180\n blk_mq_dispatch_plug_list+0x528/0x7e0\n blk_mq_flush_plug_list.part.0+0xe5/0x590\n __blk_flush_plug+0x3b/0x90\n blk_finish_plug+0x40/0x60\n do_writepages+0x19d/0x310\n filemap_fdatawrite_wbc+0x95/0xc0\n __filemap_fdatawrite_range+0x99/0xd0\n filemap_write_and_wait_range.part.0+0x4d/0xa0\n blkdev_read_iter+0xef/0x1e0\n io_read+0x1b6/0x8a0\n io_issue_sqe+0x87/0x300\n io_wq_submit_work+0xeb/0x390\n io_worker_handle_work+0x24d/0x550\n io_wq_worker+0x27f/0x6c0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x1b/0x30\n\nFix the problem by protecting bic_to_bfqq() with bfqd-\u003elock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53166",
"url": "https://www.suse.com/security/cve/CVE-2024-53166"
},
{
"category": "external",
"summary": "SUSE Bug 1234884 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234884"
},
{
"category": "external",
"summary": "SUSE Bug 1234885 for CVE-2024-53166",
"url": "https://bugzilla.suse.com/1234885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-53166"
},
{
"cve": "CVE-2024-53173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53173",
"url": "https://www.suse.com/security/cve/CVE-2024-53173"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234891 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234891"
},
{
"category": "external",
"summary": "SUSE Bug 1234892 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-53173"
},
{
"cve": "CVE-2024-53214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the \u0027Next\nCapability Offset\u0027 field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device-\u003epci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53214",
"url": "https://www.suse.com/security/cve/CVE-2024-53214"
},
{
"category": "external",
"summary": "SUSE Bug 1235004 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235004"
},
{
"category": "external",
"summary": "SUSE Bug 1235005 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-53214"
},
{
"cve": "CVE-2024-56558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56558"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: make sure exp active before svc_export_show\n\nThe function `e_show` was called with protection from RCU. This only\nensures that `exp` will not be freed. Therefore, the reference count for\n`exp` can drop to zero, which will trigger a refcount use-after-free\nwarning when `exp_get` is called. To resolve this issue, use\n`cache_get_rcu` to ensure that `exp` remains active.\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 819 at lib/refcount.c:25\nrefcount_warn_saturate+0xb1/0x120\nCPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb1/0x120\n...\nCall Trace:\n \u003cTASK\u003e\n e_show+0x20b/0x230 [nfsd]\n seq_read_iter+0x589/0x770\n seq_read+0x1e5/0x270\n vfs_read+0x125/0x530\n ksys_read+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56558",
"url": "https://www.suse.com/security/cve/CVE-2024-56558"
},
{
"category": "external",
"summary": "SUSE Bug 1235100 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1235100"
},
{
"category": "external",
"summary": "SUSE Bug 1243648 for CVE-2024-56558",
"url": "https://bugzilla.suse.com/1243648"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "moderate"
}
],
"title": "CVE-2024-56558"
},
{
"cve": "CVE-2024-57793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57793"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirt: tdx-guest: Just leak decrypted memory on unrecoverable errors\n\nIn CoCo VMs it is possible for the untrusted host to cause\nset_memory_decrypted() to fail such that an error is returned\nand the resulting memory is shared. Callers need to take care\nto handle these errors to avoid returning decrypted (shared)\nmemory to the page allocator, which could lead to functional\nor security issues.\n\nLeak the decrypted memory when set_memory_decrypted() fails,\nand don\u0027t need to print an error since set_memory_decrypted()\nwill call WARN_ONCE().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57793",
"url": "https://www.suse.com/security/cve/CVE-2024-57793"
},
{
"category": "external",
"summary": "SUSE Bug 1235768 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235768"
},
{
"category": "external",
"summary": "SUSE Bug 1235769 for CVE-2024-57793",
"url": "https://bugzilla.suse.com/1235769"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-57793"
},
{
"cve": "CVE-2024-57893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57893"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: oss: Fix races at processing SysEx messages\n\nOSS sequencer handles the SysEx messages split in 6 bytes packets, and\nALSA sequencer OSS layer tries to combine those. It stores the data\nin the internal buffer and this access is racy as of now, which may\nlead to the out-of-bounds access.\n\nAs a temporary band-aid fix, introduce a mutex for serializing the\nprocess of the SysEx message packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57893",
"url": "https://www.suse.com/security/cve/CVE-2024-57893"
},
{
"category": "external",
"summary": "SUSE Bug 1235920 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235920"
},
{
"category": "external",
"summary": "SUSE Bug 1235921 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2024-57893"
},
{
"cve": "CVE-2025-21772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21772"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npartitions: mac: fix handling of bogus partition table\n\nFix several issues in partition probing:\n\n - The bailout for a bad partoffset must use put_dev_sector(), since the\n preceding read_part_sector() succeeded.\n - If the partition table claims a silly sector size like 0xfff bytes\n (which results in partition table entries straddling sector boundaries),\n bail out instead of accessing out-of-bounds memory.\n - We must not assume that the partition table contains proper NUL\n termination - use strnlen() and strncmp() instead of strlen() and\n strcmp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21772",
"url": "https://www.suse.com/security/cve/CVE-2025-21772"
},
{
"category": "external",
"summary": "SUSE Bug 1238911 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238911"
},
{
"category": "external",
"summary": "SUSE Bug 1238912 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2025-21772"
},
{
"cve": "CVE-2025-22115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix block group refcount race in btrfs_create_pending_block_groups()\n\nBlock group creation is done in two phases, which results in a slightly\nunintuitive property: a block group can be allocated/deallocated from\nafter btrfs_make_block_group() adds it to the space_info with\nbtrfs_add_bg_to_space_info(), but before creation is completely completed\nin btrfs_create_pending_block_groups(). As a result, it is possible for a\nblock group to go unused and have \u0027btrfs_mark_bg_unused\u0027 called on it\nconcurrently with \u0027btrfs_create_pending_block_groups\u0027. This causes a\nnumber of issues, which were fixed with the block group flag\n\u0027BLOCK_GROUP_FLAG_NEW\u0027.\n\nHowever, this fix is not quite complete. Since it does not use the\nunused_bg_lock, it is possible for the following race to occur:\n\nbtrfs_create_pending_block_groups btrfs_mark_bg_unused\n if list_empty // false\n list_del_init\n clear_bit\n else if (test_bit) // true\n list_move_tail\n\nAnd we get into the exact same broken ref count and invalid new_bgs\nstate for transaction cleanup that BLOCK_GROUP_FLAG_NEW was designed to\nprevent.\n\nThe broken refcount aspect will result in a warning like:\n\n [1272.943527] refcount_t: underflow; use-after-free.\n [1272.943967] WARNING: CPU: 1 PID: 61 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110\n [1272.944731] Modules linked in: btrfs virtio_net xor zstd_compress raid6_pq null_blk [last unloaded: btrfs]\n [1272.945550] CPU: 1 UID: 0 PID: 61 Comm: kworker/u32:1 Kdump: loaded Tainted: G W 6.14.0-rc5+ #108\n [1272.946368] Tainted: [W]=WARN\n [1272.946585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n [1272.947273] Workqueue: btrfs_discard btrfs_discard_workfn [btrfs]\n [1272.947788] RIP: 0010:refcount_warn_saturate+0xba/0x110\n [1272.949532] RSP: 0018:ffffbf1200247df0 EFLAGS: 00010282\n [1272.949901] RAX: 0000000000000000 RBX: ffffa14b00e3f800 RCX: 0000000000000000\n [1272.950437] RDX: 0000000000000000 RSI: ffffbf1200247c78 RDI: 00000000ffffdfff\n [1272.950986] RBP: ffffa14b00dc2860 R08: 00000000ffffdfff R09: ffffffff90526268\n [1272.951512] R10: ffffffff904762c0 R11: 0000000063666572 R12: ffffa14b00dc28c0\n [1272.952024] R13: 0000000000000000 R14: ffffa14b00dc2868 R15: 000001285dcd12c0\n [1272.952850] FS: 0000000000000000(0000) GS:ffffa14d33c40000(0000) knlGS:0000000000000000\n [1272.953458] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [1272.953931] CR2: 00007f838cbda000 CR3: 000000010104e000 CR4: 00000000000006f0\n [1272.954474] Call Trace:\n [1272.954655] \u003cTASK\u003e\n [1272.954812] ? refcount_warn_saturate+0xba/0x110\n [1272.955173] ? __warn.cold+0x93/0xd7\n [1272.955487] ? refcount_warn_saturate+0xba/0x110\n [1272.955816] ? report_bug+0xe7/0x120\n [1272.956103] ? handle_bug+0x53/0x90\n [1272.956424] ? exc_invalid_op+0x13/0x60\n [1272.956700] ? asm_exc_invalid_op+0x16/0x20\n [1272.957011] ? refcount_warn_saturate+0xba/0x110\n [1272.957399] btrfs_discard_cancel_work.cold+0x26/0x2b [btrfs]\n [1272.957853] btrfs_put_block_group.cold+0x5d/0x8e [btrfs]\n [1272.958289] btrfs_discard_workfn+0x194/0x380 [btrfs]\n [1272.958729] process_one_work+0x130/0x290\n [1272.959026] worker_thread+0x2ea/0x420\n [1272.959335] ? __pfx_worker_thread+0x10/0x10\n [1272.959644] kthread+0xd7/0x1c0\n [1272.959872] ? __pfx_kthread+0x10/0x10\n [1272.960172] ret_from_fork+0x30/0x50\n [1272.960474] ? __pfx_kthread+0x10/0x10\n [1272.960745] ret_from_fork_asm+0x1a/0x30\n [1272.961035] \u003c/TASK\u003e\n [1272.961238] ---[ end trace 0000000000000000 ]---\n\nThough we have seen them in the async discard workfn as well. It is\nmost likely to happen after a relocation finishes which cancels discard,\ntears down the block group, etc.\n\nFix this fully by taking the lock arou\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22115",
"url": "https://www.suse.com/security/cve/CVE-2025-22115"
},
{
"category": "external",
"summary": "SUSE Bug 1241578 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241578"
},
{
"category": "external",
"summary": "SUSE Bug 1241579 for CVE-2025-22115",
"url": "https://bugzilla.suse.com/1241579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-22-rt-5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T16:17:29Z",
"details": "important"
}
],
"title": "CVE-2025-22115"
}
]
}
WID-SEC-W-2024-3762
Vulnerability from csaf_certbund - Published: 2024-12-29 23:00 - Updated: 2026-05-20 22:00Summary
Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff: Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen und um nicht näher beschriebene Effekte zu erzielen.
Betroffene Betriebssysteme: - Linux
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
Affected products
Known affected
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
IBM QRadar SIEM <7.5.0 UP11 IF04
IBM / QRadar SIEM
|
<7.5.0 UP11 IF04 | ||
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM DataPower Gateway <10.6.0.7
IBM / DataPower Gateway
|
<10.6.0.7 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Red Hat OpenShift Container Platform <4.16.38
Red Hat / OpenShift
|
Container Platform <4.16.38 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Red Hat OpenShift Container Platform <4.12.75
Red Hat / OpenShift
|
Container Platform <4.12.75 | ||
|
Red Hat OpenShift Container Platform <4.13.56
Red Hat / OpenShift
|
Container Platform <4.13.56 | ||
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Red Hat OpenShift Container Platform <4.14.49
Red Hat / OpenShift
|
Container Platform <4.14.49 | ||
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
IBM DataPower Gateway <10.5.0.19
IBM / DataPower Gateway
|
<10.5.0.19 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
Dell Secure Connect Gateway Appliance <5.32.00.18
Dell / Secure Connect Gateway
|
Appliance <5.32.00.18 |
References
995 references
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und um nicht n\u00e4her beschriebene Effekte zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3762 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3762.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3762 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3762"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20018 vom 2025-01-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20018.html"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53180",
"url": "https://lore.kernel.org/linux-cve-announce/2024122719-CVE-2024-53180-78ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53182",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-53182-8a61@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53183",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-53183-9efa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53184",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-53184-1a1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53185",
"url": "https://lore.kernel.org/linux-cve-announce/2024122721-CVE-2024-53185-16d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53186",
"url": "https://lore.kernel.org/linux-cve-announce/2024122721-CVE-2024-53186-7c05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53187",
"url": "https://lore.kernel.org/linux-cve-announce/2024122722-CVE-2024-53187-909e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53188",
"url": "https://lore.kernel.org/linux-cve-announce/2024122722-CVE-2024-53188-be4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53189",
"url": "https://lore.kernel.org/linux-cve-announce/2024122722-CVE-2024-53189-1b90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53194",
"url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-53194-9edf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53195",
"url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-53195-772a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53196",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53196-758a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53197",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53197-6aef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53198",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53198-ce0e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53199",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-53199-3a00@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53200",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-53200-1320@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53201",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-53201-2534@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53202",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-53202-f699@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53203",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-53203-80fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53204",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-53204-0f6e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53205",
"url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-53205-1be1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53206",
"url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-53206-d85d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53207",
"url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-53207-72f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53208",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-53208-dff3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53209",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-53209-b6b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53210",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-53210-c51c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53211",
"url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-53211-9837@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53212",
"url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-53212-495a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53213",
"url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-53213-baa6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53214",
"url": "https://lore.kernel.org/linux-cve-announce/2024122731-CVE-2024-53214-5fbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53215",
"url": "https://lore.kernel.org/linux-cve-announce/2024122731-CVE-2024-53215-7de4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53216",
"url": "https://lore.kernel.org/linux-cve-announce/2024122732-CVE-2024-53216-ba8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53217",
"url": "https://lore.kernel.org/linux-cve-announce/2024122732-CVE-2024-53217-4f05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53218",
"url": "https://lore.kernel.org/linux-cve-announce/2024122732-CVE-2024-53218-4330@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53219",
"url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-53219-1a04@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53220",
"url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-53220-3664@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53221",
"url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-53221-d8b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53222",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53222-6c79@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53223",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53223-7669@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53224",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53224-2509@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53225",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-53225-8deb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53226",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-53226-5c23@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53227",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-53227-d872@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53228",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-53228-0c5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53229",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-53229-f5cc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53230",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-53230-5851@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53231",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-53231-fe0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53232",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-53232-6919@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53233",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-53233-ab02@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53234",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-53234-4ee6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53235",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-53235-80a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53236",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-53236-0ab4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53237",
"url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-53237-2fa6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53238",
"url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-53238-ea1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-53239",
"url": "https://lore.kernel.org/linux-cve-announce/2024122740-CVE-2024-53239-b661@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56531",
"url": "https://lore.kernel.org/linux-cve-announce/2024122721-CVE-2024-56531-6a91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56532",
"url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-56532-6931@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56533",
"url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-56533-5de6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56534",
"url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-56534-6e4d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56535",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-56535-4683@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56536",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-56536-a7c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56537",
"url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-56537-59f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56538",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-56538-379d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56539",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-56539-4d60@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56540",
"url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-56540-d2f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56541",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-56541-1c83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56542",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-56542-d3dc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56543",
"url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-56543-a959@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56544",
"url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-56544-42cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56545",
"url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-56545-0bfa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56546",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-56546-3138@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56547",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-56547-c340@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56548",
"url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-56548-8bfd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56549",
"url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-56549-ebcd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56550",
"url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56550-68f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56551",
"url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56551-4ad2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56552",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56552-aca0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56553",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56553-e097@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56554",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56554-9ee7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56555",
"url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56555-6abc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56556",
"url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56556-96b8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56557",
"url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56557-7440@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56558",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56558-9fd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56559",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56559-b560@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56560",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56560-e044@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56561",
"url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56561-a041@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56562",
"url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56562-9fd5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56563",
"url": "https://lore.kernel.org/linux-cve-announce/2024122714-CVE-2024-56563-148f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56564",
"url": "https://lore.kernel.org/linux-cve-announce/2024122714-CVE-2024-56564-7587@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56565",
"url": "https://lore.kernel.org/linux-cve-announce/2024122714-CVE-2024-56565-1a08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56566",
"url": "https://lore.kernel.org/linux-cve-announce/2024122715-CVE-2024-56566-0a7e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56567",
"url": "https://lore.kernel.org/linux-cve-announce/2024122715-CVE-2024-56567-a306@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56568",
"url": "https://lore.kernel.org/linux-cve-announce/2024122715-CVE-2024-56568-76a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56569",
"url": "https://lore.kernel.org/linux-cve-announce/2024122716-CVE-2024-56569-cc71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56570",
"url": "https://lore.kernel.org/linux-cve-announce/2024122716-CVE-2024-56570-7580@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56571",
"url": "https://lore.kernel.org/linux-cve-announce/2024122716-CVE-2024-56571-2bbc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56572",
"url": "https://lore.kernel.org/linux-cve-announce/2024122717-CVE-2024-56572-b0fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56573",
"url": "https://lore.kernel.org/linux-cve-announce/2024122717-CVE-2024-56573-f5d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56574",
"url": "https://lore.kernel.org/linux-cve-announce/2024122717-CVE-2024-56574-68a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56575",
"url": "https://lore.kernel.org/linux-cve-announce/2024122718-CVE-2024-56575-5f0b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56576",
"url": "https://lore.kernel.org/linux-cve-announce/2024122718-CVE-2024-56576-9756@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56577",
"url": "https://lore.kernel.org/linux-cve-announce/2024122718-CVE-2024-56577-42c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56578",
"url": "https://lore.kernel.org/linux-cve-announce/2024122719-CVE-2024-56578-48e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56579",
"url": "https://lore.kernel.org/linux-cve-announce/2024122719-CVE-2024-56579-6134@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56580",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-56580-40b9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56581",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-56581-501d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56582",
"url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-56582-17af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56583",
"url": "https://lore.kernel.org/linux-cve-announce/2024122754-CVE-2024-56583-b1dc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56584",
"url": "https://lore.kernel.org/linux-cve-announce/2024122757-CVE-2024-56584-dad9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56585",
"url": "https://lore.kernel.org/linux-cve-announce/2024122757-CVE-2024-56585-ad56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56586",
"url": "https://lore.kernel.org/linux-cve-announce/2024122757-CVE-2024-56586-bece@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56587",
"url": "https://lore.kernel.org/linux-cve-announce/2024122758-CVE-2024-56587-1786@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56588",
"url": "https://lore.kernel.org/linux-cve-announce/2024122758-CVE-2024-56588-87ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56589",
"url": "https://lore.kernel.org/linux-cve-announce/2024122758-CVE-2024-56589-5cce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56590",
"url": "https://lore.kernel.org/linux-cve-announce/2024122759-CVE-2024-56590-d4ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56591",
"url": "https://lore.kernel.org/linux-cve-announce/2024122759-CVE-2024-56591-eaf9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56592",
"url": "https://lore.kernel.org/linux-cve-announce/2024122700-CVE-2024-56592-d4b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56593",
"url": "https://lore.kernel.org/linux-cve-announce/2024122700-CVE-2024-56593-3974@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56594",
"url": "https://lore.kernel.org/linux-cve-announce/2024122700-CVE-2024-56594-3c24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56595",
"url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56595-0584@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56596",
"url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56596-2add@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56597",
"url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56597-d77b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56598",
"url": "https://lore.kernel.org/linux-cve-announce/2024122702-CVE-2024-56598-3955@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56599",
"url": "https://lore.kernel.org/linux-cve-announce/2024122702-CVE-2024-56599-54af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56600",
"url": "https://lore.kernel.org/linux-cve-announce/2024122702-CVE-2024-56600-7867@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56601",
"url": "https://lore.kernel.org/linux-cve-announce/2024122703-CVE-2024-56601-2150@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56602",
"url": "https://lore.kernel.org/linux-cve-announce/2024122703-CVE-2024-56602-d030@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56603",
"url": "https://lore.kernel.org/linux-cve-announce/2024122703-CVE-2024-56603-3db8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56604",
"url": "https://lore.kernel.org/linux-cve-announce/2024122704-CVE-2024-56604-8494@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56605",
"url": "https://lore.kernel.org/linux-cve-announce/2024122704-CVE-2024-56605-d424@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56606",
"url": "https://lore.kernel.org/linux-cve-announce/2024122704-CVE-2024-56606-bf3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56607",
"url": "https://lore.kernel.org/linux-cve-announce/2024122705-CVE-2024-56607-031e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56608",
"url": "https://lore.kernel.org/linux-cve-announce/2024122705-CVE-2024-56608-30fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56609",
"url": "https://lore.kernel.org/linux-cve-announce/2024122706-CVE-2024-56609-7fe3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56610",
"url": "https://lore.kernel.org/linux-cve-announce/2024122706-CVE-2024-56610-905f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56611",
"url": "https://lore.kernel.org/linux-cve-announce/2024122706-CVE-2024-56611-262a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56612",
"url": "https://lore.kernel.org/linux-cve-announce/2024122707-CVE-2024-56612-a24e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56613",
"url": "https://lore.kernel.org/linux-cve-announce/2024122707-CVE-2024-56613-0897@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56614",
"url": "https://lore.kernel.org/linux-cve-announce/2024122707-CVE-2024-56614-17c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56615",
"url": "https://lore.kernel.org/linux-cve-announce/2024122708-CVE-2024-56615-5148@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56616",
"url": "https://lore.kernel.org/linux-cve-announce/2024122708-CVE-2024-56616-ae89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56617",
"url": "https://lore.kernel.org/linux-cve-announce/2024122708-CVE-2024-56617-7f21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56618",
"url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56618-44a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56619",
"url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56619-501d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56620",
"url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56620-d1a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56621",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56621-98bf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56622",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56622-cee7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56623",
"url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56623-e4c7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56624",
"url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56624-35f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56625",
"url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56625-82a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56626",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56626-f2f9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56627",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56627-f398@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56628",
"url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56628-c347@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56629",
"url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56629-83fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56630",
"url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56630-c856@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56631",
"url": "https://lore.kernel.org/linux-cve-announce/2024122731-CVE-2024-56631-548f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56632",
"url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-56632-ea20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56633",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-56633-ac1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56634",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-56634-f6d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56635",
"url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-56635-3014@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56636",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-56636-cdeb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56637",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-56637-23bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56638",
"url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-56638-3a3d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56639",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-56639-809a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56640",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-56640-ef22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56641",
"url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-56641-5492@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56642",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56642-71ee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56643",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56643-8470@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56644",
"url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56644-83c2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56645",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-56645-bc11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56646",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-56646-e78e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56647",
"url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-56647-d71f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56648",
"url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-56648-5623@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56649",
"url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-56649-33a6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56650",
"url": "https://lore.kernel.org/linux-cve-announce/2024122740-CVE-2024-56650-4d51@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56651",
"url": "https://lore.kernel.org/linux-cve-announce/2024122740-CVE-2024-56651-2d22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56652",
"url": "https://lore.kernel.org/linux-cve-announce/2024122748-CVE-2024-56652-31db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56653",
"url": "https://lore.kernel.org/linux-cve-announce/2024122749-CVE-2024-56653-bb35@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56654",
"url": "https://lore.kernel.org/linux-cve-announce/2024122749-CVE-2024-56654-66a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56655",
"url": "https://lore.kernel.org/linux-cve-announce/2024122749-CVE-2024-56655-e94f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56656",
"url": "https://lore.kernel.org/linux-cve-announce/2024122750-CVE-2024-56656-84a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56657",
"url": "https://lore.kernel.org/linux-cve-announce/2024122750-CVE-2024-56657-4f33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56658",
"url": "https://lore.kernel.org/linux-cve-announce/2024122750-CVE-2024-56658-01fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56659",
"url": "https://lore.kernel.org/linux-cve-announce/2024122751-CVE-2024-56659-6675@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56660",
"url": "https://lore.kernel.org/linux-cve-announce/2024122751-CVE-2024-56660-fb9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56661",
"url": "https://lore.kernel.org/linux-cve-announce/2024122751-CVE-2024-56661-a403@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56662",
"url": "https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56662-b7e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56663",
"url": "https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56663-66d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56664",
"url": "https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56664-9dc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56665",
"url": "https://lore.kernel.org/linux-cve-announce/2024122753-CVE-2024-56665-5df3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56666",
"url": "https://lore.kernel.org/linux-cve-announce/2024122753-CVE-2024-56666-93aa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56667",
"url": "https://lore.kernel.org/linux-cve-announce/2024122753-CVE-2024-56667-3c3f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56668",
"url": "https://lore.kernel.org/linux-cve-announce/2024122754-CVE-2024-56668-0d8d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56669",
"url": "https://lore.kernel.org/linux-cve-announce/2024122754-CVE-2024-56669-2ea9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56670",
"url": "https://lore.kernel.org/linux-cve-announce/2024122755-CVE-2024-56670-929d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56671",
"url": "https://lore.kernel.org/linux-cve-announce/2024122755-CVE-2024-56671-89d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56672",
"url": "https://lore.kernel.org/linux-cve-announce/2024122755-CVE-2024-56672-8d29@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56673",
"url": "https://lore.kernel.org/linux-cve-announce/2024122756-CVE-2024-56673-1ce5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56674",
"url": "https://lore.kernel.org/linux-cve-announce/2024122756-CVE-2024-56674-8005@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56675",
"url": "https://lore.kernel.org/linux-cve-announce/2024122756-CVE-2024-56675-e996@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56676",
"url": "https://lore.kernel.org/linux-cve-announce/2024122829-CVE-2024-56676-0d17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56677",
"url": "https://lore.kernel.org/linux-cve-announce/2024122831-CVE-2024-56677-f922@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56678",
"url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56678-977d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56679",
"url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56679-02b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56680",
"url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56680-fac9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56681",
"url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56681-d0c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56682",
"url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56682-3219@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56683",
"url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56683-14c3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56684",
"url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56684-55a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56685",
"url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56685-f49e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56686",
"url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56686-b432@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56687",
"url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56687-99e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56688",
"url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56688-4e02@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56689",
"url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56689-69ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56690",
"url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56690-b77f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56691",
"url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56691-c981@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56692",
"url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56692-e6ad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56693",
"url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56693-b3c6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56694",
"url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56694-c701@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56695",
"url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56695-110a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56696",
"url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56696-2b90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56697",
"url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56697-062c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56698",
"url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56698-6b0b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56699",
"url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56699-a3d3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56700",
"url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56700-d3d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56701",
"url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56701-d424@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56702",
"url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56702-172d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56703",
"url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56703-683a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56704",
"url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56704-881e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56705",
"url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56705-049b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56706",
"url": "https://lore.kernel.org/linux-cve-announce/2024122838-CVE-2024-56706-d292@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56707",
"url": "https://lore.kernel.org/linux-cve-announce/2024122838-CVE-2024-56707-783f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56708",
"url": "https://lore.kernel.org/linux-cve-announce/2024122838-CVE-2024-56708-2702@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56709",
"url": "https://lore.kernel.org/linux-cve-announce/2024122918-CVE-2024-56709-655c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56710",
"url": "https://lore.kernel.org/linux-cve-announce/2024122913-CVE-2024-56710-78af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56711",
"url": "https://lore.kernel.org/linux-cve-announce/2024122913-CVE-2024-56711-d4f9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56712",
"url": "https://lore.kernel.org/linux-cve-announce/2024122914-CVE-2024-56712-d62a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56713",
"url": "https://lore.kernel.org/linux-cve-announce/2024122914-CVE-2024-56713-f78a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56714",
"url": "https://lore.kernel.org/linux-cve-announce/2024122914-CVE-2024-56714-0de2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56715",
"url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56715-7db1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56716",
"url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56716-7a52@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56717",
"url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56717-546c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56718",
"url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56718-be98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56719",
"url": "https://lore.kernel.org/linux-cve-announce/2024122916-CVE-2024-56719-609b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56720",
"url": "https://lore.kernel.org/linux-cve-announce/2024122920-CVE-2024-56720-614a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56721",
"url": "https://lore.kernel.org/linux-cve-announce/2024122922-CVE-2024-56721-aaac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56722",
"url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56722-5594@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56723",
"url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56723-f74b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56724",
"url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56724-a800@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56725",
"url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56725-af15@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56726",
"url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56726-3a9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56727",
"url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56727-41d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56728",
"url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56728-68d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56729",
"url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56729-8f1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56730",
"url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56730-3e54@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56739",
"url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56739-0a67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56740",
"url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56740-6b7b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56741",
"url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56741-3dbc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56742",
"url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56742-b3d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56743",
"url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56743-39a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56744",
"url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56744-fc8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56745",
"url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56745-b06b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56746",
"url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56746-d329@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56747",
"url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56747-7c03@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56748",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56748-eb85@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56749",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56749-14d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56750",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56750-db4d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56751",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56751-bcf3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56752",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56752-09d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56753",
"url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56753-32df@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56754",
"url": "https://lore.kernel.org/linux-cve-announce/2024122928-CVE-2024-56754-9c9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56755",
"url": "https://lore.kernel.org/linux-cve-announce/2024122928-CVE-2024-56755-b189@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-56756",
"url": "https://lore.kernel.org/linux-cve-announce/2024122928-CVE-2024-56756-32fb@gregkh/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20019 vom 2025-01-14",
"url": "http://linux.oracle.com/errata/ELSA-2025-20019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0152-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-2 vom 2025-06-19",
"url": "https://ubuntu.com/security/notices/USN-7585-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-1 vom 2025-06-19",
"url": "https://ubuntu.com/security/notices/USN-7585-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01995-1 vom 2025-06-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021572.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0203-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOWH4UGAPWTJ6YHNMWYKOS2OKUX53GLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7221-1 vom 2025-01-22",
"url": "https://ubuntu.com/security/notices/USN-7221-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0202-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BJBRXAP3YP5FGCBO64GJZN6ZQOUKD53F/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0230-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-061 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-061.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-079 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-079.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0231-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-195 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-195.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-062 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-062.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-197 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-197.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-196 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-196.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5860 vom 2025-02-08",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00023.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0428-1 vom 2025-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20100 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0517-1 vom 2025-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0499-1 vom 2025-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0556-1 vom 2025-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0557-1 vom 2025-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0555-1 vom 2025-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0564-1 vom 2025-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0577-1 vom 2025-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0576-1 vom 2025-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7277-1 vom 2025-02-19",
"url": "https://ubuntu.com/security/notices/USN-7277-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7276-1 vom 2025-02-19",
"url": "https://ubuntu.com/security/notices/USN-7276-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0603-1 vom 2025-02-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0517-2 vom 2025-02-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-094 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-094.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-063 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-063.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7310-1 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7310-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4076 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4075 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0771-1 vom 2025-03-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6X627UISONPV7CQLLHUDVJCDEIODQO4O/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7323-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7323-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7329-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7329-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7327-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7327-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0784-1 vom 2025-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7331-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7331-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7328-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7328-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-201 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-201.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-199 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-199.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7323-2 vom 2025-03-06",
"url": "https://ubuntu.com/security/notices/USN-7323-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-200 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-200.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1961 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/ALAS-2025-1961.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2474 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2474"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2475 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2475"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2476 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2476"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2473 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2473"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2775 vom 2025-03-07",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2775.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2490 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2490"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2489 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2489"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2488 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2488"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2514 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2514"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2501 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2501"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2510 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2510"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2512 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2512"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2517 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2517"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2528 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2528"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2524 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2524"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2525 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2525"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20152 vom 2025-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20152.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2473 vom 2025-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-2473.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2627 vom 2025-03-11",
"url": "https://access.redhat.com/errata/RHSA-2025:2627"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2646 vom 2025-03-11",
"url": "https://access.redhat.com/errata/RHSA-2025:2646"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0833-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020502.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0577-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0833-1 vom 2025-03-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVOTJPDFQQWPNLUFPKTQVNNMK5RQPZGP/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0835-1 vom 2025-03-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LBO7AHILADM6B4UZWMWGQKE6YTZU2AGF/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2627 vom 2025-03-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-2627.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7328-2 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7328-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020509.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-067 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-067.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OVTPVRIMWEEQPMDTJ24J7EW5NO7I4MQK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0853-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020506.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-096 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-096.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-082 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-082.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OVTPVRIMWEEQPMDTJ24J7EW5NO7I4MQK/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7328-3 vom 2025-03-14",
"url": "https://ubuntu.com/security/notices/USN-7328-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0867-1 vom 2025-03-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0886-1 vom 2025-03-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020529.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1966 vom 2025-03-17",
"url": "https://alas.aws.amazon.com/ALAS-2025-1966.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2705 vom 2025-03-18",
"url": "https://access.redhat.com/errata/RHSA-2025:2705"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0885-1 vom 2025-03-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020530.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0889-1 vom 2025-03-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020527.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0888-1 vom 2025-03-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020528.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0903-1 vom 2025-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020537.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0910-1 vom 2025-03-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PMKGYKPVAMPW4FP63FSEQWWVHEMWJQ4W/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0911-1 vom 2025-03-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OYWTACUZODLJ4QTEQCBEVWO6HSYPFPDZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0919-1 vom 2025-03-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5CDUDOQ553DU7Q7RIVM54ETDEW7FBDXH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0917-1 vom 2025-03-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4QSDDY3MMRA6J6OVKONDM3ZBWSDU7FXC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0906-1 vom 2025-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020539.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2710 vom 2025-03-20",
"url": "https://access.redhat.com/errata/RHSA-2025:2710"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0949-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020555.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0946-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020557.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0945-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0937-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020547.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0929-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020549.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0962-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020561.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0920-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020553.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0950-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020556.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0952-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020554.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0922-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020552.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2696 vom 2025-03-19",
"url": "https://access.redhat.com/errata/RHSA-2025:2696"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2701 vom 2025-03-20",
"url": "https://access.redhat.com/errata/RHSA-2025:2701"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20190 vom 2025-03-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-20190.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0983-1 vom 2025-03-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020579.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2800 vom 2025-03-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2800.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3055 vom 2025-03-26",
"url": "https://access.redhat.com/errata/RHSA-2025:3055"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0110-1 vom 2025-03-26",
"url": "https://ubuntu.com/security/notices/LSN-0110-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7388-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7385-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7385-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7383-2 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7383-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7383-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7383-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7382-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7382-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7387-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7381-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7381-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7386-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7386-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7380-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7380-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7384-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7384-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7379-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7379-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7391-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7389-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7390-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7393-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2501 vom 2025-03-31",
"url": "https://linux.oracle.com/errata/ELSA-2025-2501.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4102 vom 2025-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7384-2 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7384-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7379-2 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7379-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-4"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-087 vom 2025-04-02",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-087.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7401-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7402-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7402-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7402-2 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7402-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7403-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7403-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3301 vom 2025-04-03",
"url": "https://access.redhat.com/errata/RHSA-2025:3301"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7408-2 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7408-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7408-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-3 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7406-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7407-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7406-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-2 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7406-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02073-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021623.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02072-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021624.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02071-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021625.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02070-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021626.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-4 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7406-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7413-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7415-1 vom 2025-04-04",
"url": "https://ubuntu.com/security/notices/USN-7415-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02096-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021636.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02095-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021637.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7598-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7598-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02077-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021629.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-4 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02087-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021628.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02075-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021631.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02076-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021630.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7402-3 vom 2025-04-04",
"url": "https://ubuntu.com/security/notices/USN-7402-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7420-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7420-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-5 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7406-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7421-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7408-3 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7408-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-6 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7406-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7402-4 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7402-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7408-4 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7408-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7428-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7428-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7428-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7428-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1194-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1195-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020680.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3573 vom 2025-04-10",
"url": "https://access.redhat.com/errata/RHSA-2025:3573"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1213-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/64D5YFJLDESGQOR3OGPOEV5S4M3DYYAU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1207-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DECHNUXZTJLZSS6KYZ73PAZINXEFVAXW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1225-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMQIDOZZ3LRBGKAI3UWUKDCXNJWRXYGY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1214-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/E5GKFXZBQHJUTREIB4A5EOCW6NL3FDET/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20270 vom 2025-04-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-20270.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1236-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020691.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1232-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020692.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1231-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020693.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1257-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020699.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1259-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020698.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1248-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020697.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1238-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020690.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1252-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020696.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1254-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020695.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1260-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5C772I5KLAAUMXFCSPXGHE5ETFPZGIIY/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20271 vom 2025-04-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-20271.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1276-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HNHWRAKE373CKVYIQLYK32RFAKCWRO3X/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1275-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RNXRVNMFX7NWUIAIFLJ6AM3Z2KVVN44B/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1278-1 vom 2025-04-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020701.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1262-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YQ5OGGLUK4JYNQDMHQJCE7NAM5KWAUQ6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1263-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q4U3LRNKLFTX56NC6NKHFDU35E5WDD75/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0111-1 vom 2025-04-16",
"url": "https://ubuntu.com/security/notices/LSN-0111-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2826 vom 2025-04-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2826.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1970 vom 2025-04-17",
"url": "https://alas.aws.amazon.com/ALAS-2025-1970.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7402-5 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7402-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7450-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7453-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7452-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7451-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7449-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7455-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7455-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7449-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7460-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7460-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7459-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7455-3 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7455-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7461-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7455-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7455-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7461-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7463-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7458-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7455-4 vom 2025-04-25",
"url": "https://ubuntu.com/security/notices/USN-7455-4"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7231915 vom 2025-04-26",
"url": "https://www.ibm.com/support/pages/node/7231915"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7468-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1392-1 vom 2025-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020747.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1385-1 vom 2025-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020749.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1387-1 vom 2025-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020748.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7455-5 vom 2025-04-29",
"url": "https://ubuntu.com/security/notices/USN-7455-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7459-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1402-1 vom 2025-04-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020751.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-228 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-228.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-226 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-226.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-227 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-227.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1408-1 vom 2025-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020752.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1403-1 vom 2025-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020753.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1416-1 vom 2025-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020756.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1423-1 vom 2025-05-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020762.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1425-1 vom 2025-05-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020761.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1418-1 vom 2025-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020757.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1422-1 vom 2025-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020760.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-3 vom 2025-05-02",
"url": "https://ubuntu.com/security/notices/USN-7461-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7475-1 vom 2025-05-02",
"url": "https://ubuntu.com/security/notices/USN-7475-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1444-1 vom 2025-05-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VYATS2QSLTZMNBKYQXKCWJV5AF5Z5P22/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1445-1 vom 2025-05-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GPMTFUDWFWZSMC6NLZLZHEWKB34AHTSR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1444-1 vom 2025-05-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYATS2QSLTZMNBKYQXKCWJV5AF5Z5P22/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1448-1 vom 2025-05-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/K6HQ3R43TDF2TCZD7MI4L7EGIC7Q62S4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1449-1 vom 2025-05-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7FXV2VJ2RQ3IILO3YRZFLSX7MF3HEXSP/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7492-2 vom 2025-05-06",
"url": "https://ubuntu.com/security/notices/USN-7492-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7492-1 vom 2025-05-06",
"url": "https://ubuntu.com/security/notices/USN-7492-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7498-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7498-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7500-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7500-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7500-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7500-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1467-1 vom 2025-05-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020788.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1468-1 vom 2025-05-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020787.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1463-1 vom 2025-05-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020789.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1454-1 vom 2025-05-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020790.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20320 vom 2025-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-20320.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13",
"url": "https://ubuntu.com/security/notices/USN-7506-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:6966"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-091 vom 2025-05-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-091.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7515-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7514-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1574-1 vom 2025-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7516-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7512-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7517-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7518-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7523-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7511-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7516-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7513-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7522-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7515-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7517-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7516-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01633-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
"url": "https://ubuntu.com/security/notices/USN-7516-5"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5925 vom 2025-05-24",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00088.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7517-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7524-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7516-6"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
"url": "https://ubuntu.com/security/notices/USN-7510-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-4 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7513-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7510-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20341-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020967.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7510-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-5 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7513-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-9"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0112-1 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/LSN-0112-1"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20369-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021005.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-3 vom 2025-06-03",
"url": "https://ubuntu.com/security/notices/USN-7550-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-1 vom 2025-06-03",
"url": "https://ubuntu.com/security/notices/USN-7550-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-2 vom 2025-06-03",
"url": "https://ubuntu.com/security/notices/USN-7550-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20285-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20284-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021042.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20314-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021026.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20315-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20191-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20215-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021115.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-4 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7550-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20212-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021119.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20211-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021121.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20213-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021118.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20214-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021116.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7592-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7592-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-3 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02069-1 vom 2025-06-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021622.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-5 vom 2025-06-05",
"url": "https://ubuntu.com/security/notices/USN-7550-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06",
"url": "https://ubuntu.com/security/notices/USN-7553-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-6 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7550-6"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01918-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7550-7 vom 2025-06-13",
"url": "https://ubuntu.com/security/notices/USN-7550-7"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01966-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01982-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021539.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02108-1 vom 2025-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021649.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02111-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTV4XGEFYU2GZJS4ZQIBBOKJWQIXDQJJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02108-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCVY72CXQLVJY2VD2EIDSTAZLUFI6CIO/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-3 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7585-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02110-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XSASUFU5IZ24MONOJWS4YJZUGRBEES3R/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02101-1 vom 2025-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021646.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02110-1 vom 2025-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021648.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02107-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DMJTJUWG5IUM6EPLUAS2XU22IPHTBLMK/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-4 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7585-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9584 vom 2025-06-25",
"url": "https://access.redhat.com/errata/RHSA-2025:9584"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02106-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKDDBGC6VTCRFMP6WM6AA5JMRG6RDG4B/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02116-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AAQLUV5OW5RLJANJU3SMJEALS56RYAZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02117-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KCGW37UJYNLW5YSZKM6WHKZJ32OWUQZE/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02112-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5C3JTUDN7WKVOE6UEUI2ASU6GVQEQIR6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02113-1 vom 2025-06-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OAB33RMXHG7GA2UKQ5SZBHUE3BNA54QZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02125-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021662.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02127-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021660.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02142-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021685.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02139-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021687.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02126-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021661.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02145-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021689.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02124-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021663.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02138-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021669.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20438-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021671.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02132-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021657.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02144-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021690.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02136-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021682.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20436-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021673.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20437-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021672.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02145-1 vom 2025-06-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/44Y2SH5QFQ55KDYSCFH7PBEZTUZ6DGOC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02134-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021684.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20434-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021675.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20431-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021676.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02144-1 vom 2025-06-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVSWMKBSSS2LFR3HYHQ3ZFKEJE76ALSX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02140-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021686.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02131-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021658.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02128-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021659.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20435-1 vom 2025-06-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02157-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021696.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02156-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021697.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02162-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021702.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02154-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021695.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02155-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021694.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02161-1 vom 2025-06-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021703.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7606-1 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7606-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02173-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021714.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7605-1 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7605-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20451-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021716.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20450-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021717.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02171-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021711.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20449-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021718.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20448-1 vom 2025-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021719.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-5 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7585-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7607-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01",
"url": "https://ubuntu.com/security/notices/USN-7607-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-6 vom 2025-07-03",
"url": "https://ubuntu.com/security/notices/USN-7585-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7605-2 vom 2025-07-04",
"url": "https://ubuntu.com/security/notices/USN-7605-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-5 vom 2025-07-04",
"url": "https://ubuntu.com/security/notices/USN-7591-5"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10536 vom 2025-07-08",
"url": "https://access.redhat.com/errata/RHSA-2025:10536"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10547 vom 2025-07-08",
"url": "https://access.redhat.com/errata/RHSA-2025:10547"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7628-1 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7628-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7627-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08",
"url": "https://ubuntu.com/security/notices/USN-7627-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7607-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10701 vom 2025-07-09",
"url": "https://access.redhat.com/errata/RHSA-2025:10701"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02262-1 vom 2025-07-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B53IHD74IRNJDAOHBW4L7JGWNOM26XE7/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0113-1 vom 2025-07-10",
"url": "https://ubuntu.com/security/notices/LSN-0113-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-7 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7585-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7640-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-6 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7591-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7655-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20480 vom 2025-07-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-20480.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02388-1 vom 2025-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021860.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02387-1 vom 2025-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021861.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02389-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021882.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02400-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFZK6V3WCARPDN2N3X7GFGJTK7UFSP6T/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02399-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76DMKQMABVDV4KDJA6FQ7PDOF7RSG4ZQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02412-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021866.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02411-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DEKG43SVEEUNQXJBCRXWGSWJ6NQ36NUC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02401-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2CTS27REDRGOT26DT2AKNCWHEMLXFPV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02396-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021876.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02391-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021880.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02390-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021881.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02403-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXLF63OLKSA5LWF3BYMVRASA55GHVYJY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02398-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZIQSMDCERQHP4JSQ3YSIO5TMBD637EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02410-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7JYI4RKW2E7EB4ZJ6UB45TTF2H6PEYR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02419-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02444-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAPR5ITSSKHG4EAWNWSLSEMDSVTCH3CA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02434-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HM6XIBRQQ4DT55UN4XNTKFRWGXRY73A5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02449-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOIECZ42HAJGKZ7TVGI4LLLNAG27ZF7L/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02440-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON72ZMOEO6E3K3KZFRVFHX5LUYA6RAXJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02455-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2GXZ2EL5OVKMNFWDPFV7NT367YYOFZO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02445-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYJ3O67PBJST6GKMJJXDEBLGGDV5KJKJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02433-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021883.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02446-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYAKCPI3CQKIWHWVXLDBJMK5CDOB5VRS/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20483-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021917.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02454-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NNLH3GVII5RPJKDTSNRRAF2IHEZBWAO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02451-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22P3K2RHZ424E6JGDSKSXUABXRESY6GY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20475-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021919.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02422-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021884.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02420-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021886.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02436-1 vom 2025-07-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOC4XFCSYMATM6FYIQWRDFK5AQF4P2LT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02428-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021889.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02418-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021888.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02416-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021890.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02415-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021891.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02459-1 vom 2025-07-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNBGONL5CBCKJ2ZQN6XVJFDFNJMHMLDW/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7654-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02456-1 vom 2025-07-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCEGUU6PQXBO5WEH74GQ5P4FSONEMFGS/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02467-1 vom 2025-07-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZCR5NTS22PVXMTMTOFQXV2RRHUGOQ4D/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02467-1 vom 2025-07-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021927.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02469-1 vom 2025-07-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021928.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02468-1 vom 2025-07-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7LXLV4ZFW2U2LQ7EL4MR5BCEPMCAILY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02469-1 vom 2025-07-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DKYAAHCQKONWNPOMLWYIWZDCCWMTQKBP/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02470-1 vom 2025-07-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y3SXNMZSQJRSJC7GHMSO7X66MBDIIFEC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02507-1 vom 2025-07-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021949.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20498-1 vom 2025-07-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021965.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25",
"url": "https://ubuntu.com/security/notices/USN-7671-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20493-1 vom 2025-07-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021967.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7671-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7654-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-1 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-2 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-3 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02601-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022048.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02604-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022046.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02607-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOXFW6IMLHSFMN655UONMR2V76DWL7LG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02610-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRIUGMNHYH2DWCCLRZ5NFTLFBXQCRTE6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02618-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022014.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20527-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20526-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022026.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20525-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022027.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20517-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022034.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20519-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022032.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20518-1 vom 2025-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022033.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02632-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6QW6TXS545RIQWDHD4QUITTGGA4K6MY/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02638-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT3EVLQ3E46O7RVXSFVUBEM6JEJUWQI4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02627-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HNZG2UKJBSDT23RIH4WSPIP5XJJH7AQ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02648-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKXBRO2HUJQNRZTJLJHZC32ZUUQLD7RS/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02673-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPKQ4BU54XGSANMAROPDJAEFKO2OEKKP/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04",
"url": "https://ubuntu.com/security/notices/USN-7671-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02636-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CZW4BWHO76REHV7LNO6WHLF4JRL7WMEJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02652-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPV72PULRBVAYNVLOGDPAXEYAOLJPHYQ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02688-1 vom 2025-08-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NCR2KWOE2L5E5ZMBPLRQ3ZRAPKHOJX5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02691-1 vom 2025-08-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HQYM2FGJQXM5CJJ3L6LDY723WGAYBFPL/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7686-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20545-1 vom 2025-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022099.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20540-1 vom 2025-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022104.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20541-1 vom 2025-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022103.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20544-1 vom 2025-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02697-1 vom 2025-08-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4DC3XA5ITEIHVOJ5XXILV3NMSJPM3PS2/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02698-1 vom 2025-08-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TM2FOPKL26WFLLS5YFPKON7STKP3HL4I/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13598 vom 2025-08-11",
"url": "https://access.redhat.com/errata/RHSA-2025:13598"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20521 vom 2025-08-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20521.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13589 vom 2025-08-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-13589.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4271 vom 2025-08-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13",
"url": "https://ubuntu.com/security/notices/USN-7685-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7930-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7930-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7937-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7937-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7930-2 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7930-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13598 vom 2025-08-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-13598.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7711-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7712-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20576-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20568-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022313.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20578-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022303.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20584-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022297.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20575-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20579-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20610-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022360.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20611-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022359.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20625-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022347.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20620-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022352.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7712-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15011 vom 2025-09-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-15011.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "Dell Security Update vom 2025-10-02",
"url": "https://www.dell.com/support/kbdoc/000376224"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20663.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17161 vom 2025-10-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-17161.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7249042 vom 2025-10-23",
"url": "https://www.ibm.com/support/pages/node/7249042"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19106 vom 2025-10-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-19106.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19447 vom 2025-11-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-19447.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20095 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20095"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20518 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20518"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:2264-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19930 vom 2025-11-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-19930.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:2173-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-25757.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21492 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21492"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21563 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21563"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4123-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7874-2 vom 2025-11-19",
"url": "https://ubuntu.com/security/notices/USN-7874-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7874-1 vom 2025-11-19",
"url": "https://ubuntu.com/security/notices/USN-7874-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:20518 vom 2025-11-21",
"url": "https://errata.build.resf.org/RLSA-2025:20518"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20518 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-20518-0.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:20095 vom 2025-11-27",
"url": "https://errata.build.resf.org/RLSA-2025:20095"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-2 vom 2025-12-03",
"url": "https://ubuntu.com/security/notices/USN-7907-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-1 vom 2025-12-03",
"url": "https://ubuntu.com/security/notices/USN-7907-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7907-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7911-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7911-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-4 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7907-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7874-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7874-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-1 vom 2025-12-10",
"url": "https://ubuntu.com/security/notices/USN-7922-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-3 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7928-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-2 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7922-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-1 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7928-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-2 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7928-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-5 vom 2025-12-12",
"url": "https://ubuntu.com/security/notices/USN-7907-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7939-1 vom 2025-12-17",
"url": "https://ubuntu.com/security/notices/USN-7939-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21063 vom 2025-12-17",
"url": "https://linux.oracle.com/errata/ELSA-2025-21063.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7939-2 vom 2025-12-17",
"url": "https://ubuntu.com/security/notices/USN-7939-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7938-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7938-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-3 vom 2025-12-19",
"url": "https://ubuntu.com/security/notices/USN-7922-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-4 vom 2025-12-19",
"url": "https://ubuntu.com/security/notices/USN-7928-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-4 vom 2026-01-06",
"url": "https://ubuntu.com/security/notices/USN-7922-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-5 vom 2026-01-09",
"url": "https://ubuntu.com/security/notices/USN-7928-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-5 vom 2026-01-12",
"url": "https://ubuntu.com/security/notices/USN-7922-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0140-1 vom 2026-01-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0263-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-1 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7988-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0317-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-2 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7988-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7987-2 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7987-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7986-1 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7986-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7987-1 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7987-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22910 vom 2026-01-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-22910.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23947 vom 2026-01-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-23947.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0385-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024056.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-3 vom 2026-02-05",
"url": "https://ubuntu.com/security/notices/USN-7988-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-4 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-7988-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-3 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-5 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-7988-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-4 vom 2026-02-13",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20329-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20324-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20325-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20305-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20327-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20309-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20330-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20294-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20292-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20300-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-6 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8034-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-8 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-8"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8061-1 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8061-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8070-2 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8070-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8070-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8070-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8070-3 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8070-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4011 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4011"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-1 vom 2026-03-16",
"url": "https://ubuntu.com/security/notices/USN-8098-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-2 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8098-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4745 vom 2026-03-17",
"url": "https://access.redhat.com/errata/RHSA-2026:4745"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-3 vom 2026-03-18",
"url": "https://ubuntu.com/security/notices/USN-8098-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8107-1 vom 2026-03-18",
"url": "https://ubuntu.com/security/notices/USN-8107-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-1 vom 2026-03-20",
"url": "https://ubuntu.com/security/notices/USN-8112-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-2 vom 2026-03-20",
"url": "https://ubuntu.com/security/notices/USN-8112-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-4 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8098-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-3 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8112-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-4 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8112-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-6 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8098-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-5 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8112-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-5 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8098-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-8 vom 2026-03-25",
"url": "https://ubuntu.com/security/notices/USN-8098-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-7 vom 2026-03-25",
"url": "https://ubuntu.com/security/notices/USN-8098-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-9 vom 2026-03-27",
"url": "https://ubuntu.com/security/notices/USN-8098-9"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6164 vom 2026-03-30",
"url": "https://access.redhat.com/errata/RHSA-2026:6164"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8141-1 vom 2026-04-01",
"url": "https://ubuntu.com/security/notices/USN-8141-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8163-1 vom 2026-04-10",
"url": "https://ubuntu.com/security/notices/USN-8163-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8163-2 vom 2026-04-14",
"url": "https://ubuntu.com/security/notices/USN-8163-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8224-1 vom 2026-04-29",
"url": "https://ubuntu.com/security/notices/USN-8224-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6243 vom 2026-05-04",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00154.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4561 vom 2026-05-02",
"url": "https://lists.debian.org/debian-lts-announce/2026/05/msg00005.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:14339 vom 2026-05-06",
"url": "https://access.redhat.com/errata/RHSA-2026:14339"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8243-1 vom 2026-05-07",
"url": "https://ubuntu.com/security/notices/USN-8243-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50261 vom 2026-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50261.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:18134 vom 2026-05-19",
"url": "https://access.redhat.com/errata/RHSA-2026:18134"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:19569 vom 2026-05-20",
"url": "https://access.redhat.com/errata/RHSA-2026:19569"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2026-05-20T22:00:00.000+00:00",
"generator": {
"date": "2026-05-21T07:56:24.234+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.6.0"
}
},
"id": "WID-SEC-W-2024-3762",
"initial_release_date": "2024-12-29T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-29T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-01-15T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-19T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-03T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-09T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-02-11T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-17T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-20T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-27T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-03T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-04T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-05T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-03-06T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat und Amazon aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-03-11T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-13T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-03-16T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE, Amazon und Red Hat aufgenommen"
},
{
"date": "2025-03-18T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-19T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-03-20T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-03-23T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-25T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-26T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-06T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-07T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-14T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-16T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-04-21T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-22T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-23T22:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-27T22:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-04-28T22:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-05-04T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-07T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Red Hat und Amazon aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-25T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von SUSE, Ubuntu und Debian aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Amazon, Debian, SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-05T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-12T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-17T22:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-06-24T22:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von SUSE, Ubuntu und Red Hat aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-07T22:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von Oracle Linux, SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-20T22:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-23T22:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "110",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "111",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "112",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-03T22:00:00.000+00:00",
"number": "113",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "114",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "115",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-08-10T22:00:00.000+00:00",
"number": "116",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-11T22:00:00.000+00:00",
"number": "117",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "118",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "119",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "120",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "121",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "122",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "123",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "124",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "125",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "126",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "127",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "128",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "129",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "130",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "131",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-20T22:00:00.000+00:00",
"number": "132",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "133",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "134",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "135",
"summary": "Neue Updates von Oracle Linux und Dell aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "136",
"summary": "Neue Updates von Red Hat, SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "137",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "138",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "139",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "140",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "141",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "142",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "143",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "144",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "145",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-11T23:00:00.000+00:00",
"number": "146",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "147",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "148",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "149",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-12-21T23:00:00.000+00:00",
"number": "150",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-06T23:00:00.000+00:00",
"number": "151",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "152",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "153",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "154",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "155",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "156",
"summary": "Neue Updates von Ubuntu, SUSE und Oracle Linux aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "157",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "158",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "159",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "160",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "161",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "162",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "163",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "164",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "165",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "166",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "167",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "168",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-03T23:00:00.000+00:00",
"number": "169",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "170",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "171",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "172",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "173",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "174",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "175",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "176",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "177",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "178",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-26T23:00:00.000+00:00",
"number": "179",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-30T22:00:00.000+00:00",
"number": "180",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-04-01T22:00:00.000+00:00",
"number": "181",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "182",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-04-13T22:00:00.000+00:00",
"number": "183",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-04-29T22:00:00.000+00:00",
"number": "184",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-05-03T22:00:00.000+00:00",
"number": "185",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-05-06T22:00:00.000+00:00",
"number": "186",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-05-12T22:00:00.000+00:00",
"number": "187",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-05-18T22:00:00.000+00:00",
"number": "188",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-05-20T22:00:00.000+00:00",
"number": "189",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "189"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T034583",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
"product_id": "T045879"
}
},
{
"category": "product_version",
"name": "8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.4.0.0",
"product_id": "T045879-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
"product_id": "T045881"
}
},
{
"category": "product_version",
"name": "7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.70",
"product_id": "T045881-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
"product_id": "T047343"
}
},
{
"category": "product_version",
"name": "7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.40",
"product_id": "T047343-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
"product_id": "T047344"
}
},
{
"category": "product_version",
"name": "8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.1.10",
"product_id": "T047344-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
}
}
}
],
"category": "product_name",
"name": "PowerProtect Data Domain"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.5.0.19",
"product": {
"name": "IBM DataPower Gateway \u003c10.5.0.19",
"product_id": "T047864"
}
},
{
"category": "product_version",
"name": "10.5.0.19",
"product": {
"name": "IBM DataPower Gateway 10.5.0.19",
"product_id": "T047864-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:10.5.0.19"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.6.0.7",
"product": {
"name": "IBM DataPower Gateway \u003c10.6.0.7",
"product_id": "T047866"
}
},
{
"category": "product_version",
"name": "10.6.0.7",
"product": {
"name": "IBM DataPower Gateway 10.6.0.7",
"product_id": "T047866-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:10.6.0.7"
}
}
}
],
"category": "product_name",
"name": "DataPower Gateway"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11 IF04",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04",
"product_id": "T043169"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11 IF04",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11 IF04",
"product_id": "T043169-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T046484",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T042774",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.13.56",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.13.56",
"product_id": "T042009"
}
},
{
"category": "product_version",
"name": "Container Platform 4.13.56",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13.56",
"product_id": "T042009-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.13.56"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.49",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.49",
"product_id": "T042010"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.49",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.49",
"product_id": "T042010-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.49"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.16.38",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.16.38",
"product_id": "T042315"
}
},
{
"category": "product_version",
"name": "Container Platform 4.16.38",
"product": {
"name": "Red Hat OpenShift Container Platform 4.16.38",
"product_id": "T042315-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.16.38"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.12.75",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.12.75",
"product_id": "T042745"
}
},
{
"category": "product_version",
"name": "Container Platform 4.12.75",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12.75",
"product_id": "T042745-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.12.75"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T042775",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-53172",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53172"
},
{
"cve": "CVE-2024-53176",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53176"
},
{
"cve": "CVE-2024-53178",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53178"
},
{
"cve": "CVE-2024-53179",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53179"
},
{
"cve": "CVE-2024-53180",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53180"
},
{
"cve": "CVE-2024-53181",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53181"
},
{
"cve": "CVE-2024-53182",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53182"
},
{
"cve": "CVE-2024-53183",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53183"
},
{
"cve": "CVE-2024-53184",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53184"
},
{
"cve": "CVE-2024-53185",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53185"
},
{
"cve": "CVE-2024-53186",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53186"
},
{
"cve": "CVE-2024-53187",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53187"
},
{
"cve": "CVE-2024-53188",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53188"
},
{
"cve": "CVE-2024-53189",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53189"
},
{
"cve": "CVE-2024-53191",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53191"
},
{
"cve": "CVE-2024-53194",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53194"
},
{
"cve": "CVE-2024-53195",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53195"
},
{
"cve": "CVE-2024-53196",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53196"
},
{
"cve": "CVE-2024-53197",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53197"
},
{
"cve": "CVE-2024-53198",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53198"
},
{
"cve": "CVE-2024-53199",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53199"
},
{
"cve": "CVE-2024-53200",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53200"
},
{
"cve": "CVE-2024-53201",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53201"
},
{
"cve": "CVE-2024-53202",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53202"
},
{
"cve": "CVE-2024-53203",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53203"
},
{
"cve": "CVE-2024-53204",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53204"
},
{
"cve": "CVE-2024-53205",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53205"
},
{
"cve": "CVE-2024-53206",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53206"
},
{
"cve": "CVE-2024-53207",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53207"
},
{
"cve": "CVE-2024-53208",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53208"
},
{
"cve": "CVE-2024-53209",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53209"
},
{
"cve": "CVE-2024-53210",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53210"
},
{
"cve": "CVE-2024-53211",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53211"
},
{
"cve": "CVE-2024-53212",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53212"
},
{
"cve": "CVE-2024-53213",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53213"
},
{
"cve": "CVE-2024-53214",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53214"
},
{
"cve": "CVE-2024-53215",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53215"
},
{
"cve": "CVE-2024-53216",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53216"
},
{
"cve": "CVE-2024-53217",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53217"
},
{
"cve": "CVE-2024-53218",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53218"
},
{
"cve": "CVE-2024-53219",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53219"
},
{
"cve": "CVE-2024-53220",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53220"
},
{
"cve": "CVE-2024-53221",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53221"
},
{
"cve": "CVE-2024-53222",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53222"
},
{
"cve": "CVE-2024-53223",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53223"
},
{
"cve": "CVE-2024-53224",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53224"
},
{
"cve": "CVE-2024-53225",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53225"
},
{
"cve": "CVE-2024-53226",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53226"
},
{
"cve": "CVE-2024-53227",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53227"
},
{
"cve": "CVE-2024-53228",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53228"
},
{
"cve": "CVE-2024-53229",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53229"
},
{
"cve": "CVE-2024-53230",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53230"
},
{
"cve": "CVE-2024-53231",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53231"
},
{
"cve": "CVE-2024-53232",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53232"
},
{
"cve": "CVE-2024-53233",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53233"
},
{
"cve": "CVE-2024-53234",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53234"
},
{
"cve": "CVE-2024-53235",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53235"
},
{
"cve": "CVE-2024-53236",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53236"
},
{
"cve": "CVE-2024-53237",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53237"
},
{
"cve": "CVE-2024-53238",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53238"
},
{
"cve": "CVE-2024-53239",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-53239"
},
{
"cve": "CVE-2024-56531",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56531"
},
{
"cve": "CVE-2024-56532",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56532"
},
{
"cve": "CVE-2024-56533",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56533"
},
{
"cve": "CVE-2024-56534",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56534"
},
{
"cve": "CVE-2024-56535",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56535"
},
{
"cve": "CVE-2024-56536",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56536"
},
{
"cve": "CVE-2024-56537",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56537"
},
{
"cve": "CVE-2024-56538",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56538"
},
{
"cve": "CVE-2024-56539",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56539"
},
{
"cve": "CVE-2024-56540",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56540"
},
{
"cve": "CVE-2024-56541",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56541"
},
{
"cve": "CVE-2024-56542",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56542"
},
{
"cve": "CVE-2024-56543",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56543"
},
{
"cve": "CVE-2024-56544",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56544"
},
{
"cve": "CVE-2024-56545",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56545"
},
{
"cve": "CVE-2024-56546",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56546"
},
{
"cve": "CVE-2024-56547",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56547"
},
{
"cve": "CVE-2024-56548",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56548"
},
{
"cve": "CVE-2024-56549",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56549"
},
{
"cve": "CVE-2024-56550",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56550"
},
{
"cve": "CVE-2024-56551",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56551"
},
{
"cve": "CVE-2024-56552",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56552"
},
{
"cve": "CVE-2024-56553",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56553"
},
{
"cve": "CVE-2024-56554",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56554"
},
{
"cve": "CVE-2024-56555",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56555"
},
{
"cve": "CVE-2024-56556",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56556"
},
{
"cve": "CVE-2024-56557",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56557"
},
{
"cve": "CVE-2024-56558",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56558"
},
{
"cve": "CVE-2024-56559",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56559"
},
{
"cve": "CVE-2024-56560",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56560"
},
{
"cve": "CVE-2024-56561",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56561"
},
{
"cve": "CVE-2024-56562",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56562"
},
{
"cve": "CVE-2024-56563",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56563"
},
{
"cve": "CVE-2024-56564",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56564"
},
{
"cve": "CVE-2024-56565",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56565"
},
{
"cve": "CVE-2024-56566",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56566"
},
{
"cve": "CVE-2024-56567",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56567"
},
{
"cve": "CVE-2024-56568",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56568"
},
{
"cve": "CVE-2024-56569",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56569"
},
{
"cve": "CVE-2024-56570",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56570"
},
{
"cve": "CVE-2024-56571",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56571"
},
{
"cve": "CVE-2024-56572",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56572"
},
{
"cve": "CVE-2024-56573",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56573"
},
{
"cve": "CVE-2024-56574",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56574"
},
{
"cve": "CVE-2024-56575",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56575"
},
{
"cve": "CVE-2024-56576",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56576"
},
{
"cve": "CVE-2024-56577",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56577"
},
{
"cve": "CVE-2024-56578",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56578"
},
{
"cve": "CVE-2024-56579",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56579"
},
{
"cve": "CVE-2024-56580",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56580"
},
{
"cve": "CVE-2024-56581",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56581"
},
{
"cve": "CVE-2024-56582",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56582"
},
{
"cve": "CVE-2024-56583",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56583"
},
{
"cve": "CVE-2024-56584",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56584"
},
{
"cve": "CVE-2024-56585",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56585"
},
{
"cve": "CVE-2024-56586",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56586"
},
{
"cve": "CVE-2024-56587",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56587"
},
{
"cve": "CVE-2024-56588",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56588"
},
{
"cve": "CVE-2024-56589",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56589"
},
{
"cve": "CVE-2024-56590",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56590"
},
{
"cve": "CVE-2024-56591",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56591"
},
{
"cve": "CVE-2024-56592",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56592"
},
{
"cve": "CVE-2024-56593",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56593"
},
{
"cve": "CVE-2024-56594",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56594"
},
{
"cve": "CVE-2024-56595",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56595"
},
{
"cve": "CVE-2024-56596",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56596"
},
{
"cve": "CVE-2024-56597",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56597"
},
{
"cve": "CVE-2024-56598",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56598"
},
{
"cve": "CVE-2024-56599",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56599"
},
{
"cve": "CVE-2024-56600",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56600"
},
{
"cve": "CVE-2024-56601",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56601"
},
{
"cve": "CVE-2024-56602",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56602"
},
{
"cve": "CVE-2024-56603",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56603"
},
{
"cve": "CVE-2024-56604",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56604"
},
{
"cve": "CVE-2024-56605",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56605"
},
{
"cve": "CVE-2024-56606",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56606"
},
{
"cve": "CVE-2024-56607",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56607"
},
{
"cve": "CVE-2024-56608",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56608"
},
{
"cve": "CVE-2024-56609",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56609"
},
{
"cve": "CVE-2024-56610",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56610"
},
{
"cve": "CVE-2024-56611",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56611"
},
{
"cve": "CVE-2024-56612",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56612"
},
{
"cve": "CVE-2024-56613",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56613"
},
{
"cve": "CVE-2024-56614",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56614"
},
{
"cve": "CVE-2024-56615",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56615"
},
{
"cve": "CVE-2024-56616",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56616"
},
{
"cve": "CVE-2024-56617",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56617"
},
{
"cve": "CVE-2024-56618",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56618"
},
{
"cve": "CVE-2024-56619",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56619"
},
{
"cve": "CVE-2024-56620",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56620"
},
{
"cve": "CVE-2024-56621",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56621"
},
{
"cve": "CVE-2024-56622",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56622"
},
{
"cve": "CVE-2024-56623",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56623"
},
{
"cve": "CVE-2024-56624",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56624"
},
{
"cve": "CVE-2024-56625",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56625"
},
{
"cve": "CVE-2024-56626",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56626"
},
{
"cve": "CVE-2024-56627",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56627"
},
{
"cve": "CVE-2024-56628",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56628"
},
{
"cve": "CVE-2024-56629",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56629"
},
{
"cve": "CVE-2024-56630",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56630"
},
{
"cve": "CVE-2024-56631",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56631"
},
{
"cve": "CVE-2024-56632",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56632"
},
{
"cve": "CVE-2024-56633",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56633"
},
{
"cve": "CVE-2024-56634",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56634"
},
{
"cve": "CVE-2024-56635",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56635"
},
{
"cve": "CVE-2024-56636",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56636"
},
{
"cve": "CVE-2024-56637",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56637"
},
{
"cve": "CVE-2024-56638",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56638"
},
{
"cve": "CVE-2024-56639",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56639"
},
{
"cve": "CVE-2024-56640",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56640"
},
{
"cve": "CVE-2024-56641",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56641"
},
{
"cve": "CVE-2024-56642",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56642"
},
{
"cve": "CVE-2024-56643",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56643"
},
{
"cve": "CVE-2024-56644",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56644"
},
{
"cve": "CVE-2024-56645",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56645"
},
{
"cve": "CVE-2024-56646",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56646"
},
{
"cve": "CVE-2024-56647",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56647"
},
{
"cve": "CVE-2024-56648",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56648"
},
{
"cve": "CVE-2024-56649",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56649"
},
{
"cve": "CVE-2024-56650",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56650"
},
{
"cve": "CVE-2024-56651",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56651"
},
{
"cve": "CVE-2024-56652",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56652"
},
{
"cve": "CVE-2024-56653",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56653"
},
{
"cve": "CVE-2024-56654",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56654"
},
{
"cve": "CVE-2024-56655",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56655"
},
{
"cve": "CVE-2024-56656",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56656"
},
{
"cve": "CVE-2024-56657",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56657"
},
{
"cve": "CVE-2024-56658",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56658"
},
{
"cve": "CVE-2024-56659",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56659"
},
{
"cve": "CVE-2024-56660",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56660"
},
{
"cve": "CVE-2024-56661",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56661"
},
{
"cve": "CVE-2024-56662",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56662"
},
{
"cve": "CVE-2024-56663",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56663"
},
{
"cve": "CVE-2024-56664",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56664"
},
{
"cve": "CVE-2024-56665",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56665"
},
{
"cve": "CVE-2024-56666",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56666"
},
{
"cve": "CVE-2024-56667",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56667"
},
{
"cve": "CVE-2024-56668",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56668"
},
{
"cve": "CVE-2024-56669",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56669"
},
{
"cve": "CVE-2024-56670",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56670"
},
{
"cve": "CVE-2024-56671",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56671"
},
{
"cve": "CVE-2024-56672",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56672"
},
{
"cve": "CVE-2024-56673",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56673"
},
{
"cve": "CVE-2024-56674",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56674"
},
{
"cve": "CVE-2024-56675",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56675"
},
{
"cve": "CVE-2024-56676",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56676"
},
{
"cve": "CVE-2024-56677",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56677"
},
{
"cve": "CVE-2024-56678",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56678"
},
{
"cve": "CVE-2024-56679",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56679"
},
{
"cve": "CVE-2024-56680",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56680"
},
{
"cve": "CVE-2024-56681",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56681"
},
{
"cve": "CVE-2024-56682",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56682"
},
{
"cve": "CVE-2024-56683",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56683"
},
{
"cve": "CVE-2024-56684",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56684"
},
{
"cve": "CVE-2024-56685",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56685"
},
{
"cve": "CVE-2024-56686",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56686"
},
{
"cve": "CVE-2024-56687",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56687"
},
{
"cve": "CVE-2024-56688",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56688"
},
{
"cve": "CVE-2024-56689",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56689"
},
{
"cve": "CVE-2024-56690",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56690"
},
{
"cve": "CVE-2024-56691",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56691"
},
{
"cve": "CVE-2024-56692",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56692"
},
{
"cve": "CVE-2024-56693",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56693"
},
{
"cve": "CVE-2024-56694",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56694"
},
{
"cve": "CVE-2024-56695",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56695"
},
{
"cve": "CVE-2024-56696",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56696"
},
{
"cve": "CVE-2024-56697",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56697"
},
{
"cve": "CVE-2024-56698",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56698"
},
{
"cve": "CVE-2024-56699",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56699"
},
{
"cve": "CVE-2024-56700",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56700"
},
{
"cve": "CVE-2024-56701",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56701"
},
{
"cve": "CVE-2024-56702",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56702"
},
{
"cve": "CVE-2024-56703",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56703"
},
{
"cve": "CVE-2024-56704",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56704"
},
{
"cve": "CVE-2024-56705",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56705"
},
{
"cve": "CVE-2024-56706",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56706"
},
{
"cve": "CVE-2024-56707",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56707"
},
{
"cve": "CVE-2024-56708",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56708"
},
{
"cve": "CVE-2024-56709",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56709"
},
{
"cve": "CVE-2024-56710",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56710"
},
{
"cve": "CVE-2024-56711",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56711"
},
{
"cve": "CVE-2024-56712",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56712"
},
{
"cve": "CVE-2024-56713",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56713"
},
{
"cve": "CVE-2024-56714",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56714"
},
{
"cve": "CVE-2024-56715",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56715"
},
{
"cve": "CVE-2024-56716",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56716"
},
{
"cve": "CVE-2024-56717",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56717"
},
{
"cve": "CVE-2024-56718",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56718"
},
{
"cve": "CVE-2024-56719",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56719"
},
{
"cve": "CVE-2024-56720",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56720"
},
{
"cve": "CVE-2024-56721",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56721"
},
{
"cve": "CVE-2024-56722",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56722"
},
{
"cve": "CVE-2024-56723",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56723"
},
{
"cve": "CVE-2024-56724",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56724"
},
{
"cve": "CVE-2024-56725",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56725"
},
{
"cve": "CVE-2024-56726",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56726"
},
{
"cve": "CVE-2024-56727",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56727"
},
{
"cve": "CVE-2024-56728",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56728"
},
{
"cve": "CVE-2024-56729",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56729"
},
{
"cve": "CVE-2024-56730",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56730"
},
{
"cve": "CVE-2024-56739",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56739"
},
{
"cve": "CVE-2024-56740",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56740"
},
{
"cve": "CVE-2024-56741",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56741"
},
{
"cve": "CVE-2024-56742",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56742"
},
{
"cve": "CVE-2024-56743",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56743"
},
{
"cve": "CVE-2024-56744",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56744"
},
{
"cve": "CVE-2024-56745",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56745"
},
{
"cve": "CVE-2024-56746",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56746"
},
{
"cve": "CVE-2024-56747",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56747"
},
{
"cve": "CVE-2024-56748",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56748"
},
{
"cve": "CVE-2024-56749",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56749"
},
{
"cve": "CVE-2024-56750",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56750"
},
{
"cve": "CVE-2024-56751",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56751"
},
{
"cve": "CVE-2024-56752",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56752"
},
{
"cve": "CVE-2024-56753",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56753"
},
{
"cve": "CVE-2024-56754",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56754"
},
{
"cve": "CVE-2024-56755",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56755"
},
{
"cve": "CVE-2024-56756",
"product_status": {
"known_affected": [
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T043169",
"T042774",
"T042775",
"T047866",
"2951",
"T002207",
"T045879",
"T042315",
"T000126",
"T042745",
"T042009",
"T046484",
"T047343",
"398363",
"T042010",
"T045881",
"T047864",
"T047344",
"T048301"
]
},
"release_date": "2024-12-29T23:00:00.000+00:00",
"title": "CVE-2024-56756"
}
]
}
WID-SEC-W-2025-2855
Vulnerability from csaf_certbund - Published: 2025-12-15 23:00 - Updated: 2025-12-15 23:00Summary
IBM DataPower Gateway: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Das DataPower Gateway ist eine Software zur Unterstützung von Unternehmen bei der Erfüllung der Sicherheits- und Integrationsanforderungen.
Angriff: Ein Angreifer kann mehrere Schwachstellen in IBM DataPower Gateway ausnutzen, um beliebigen Programmcode auszuführen, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder andere, nicht spezifizierte Angriffe durchzuführen.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
References
3 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das DataPower Gateway ist eine Software zur Unterst\u00fctzung von Unternehmen bei der Erf\u00fcllung der Sicherheits- und Integrationsanforderungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in IBM DataPower Gateway ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder andere, nicht spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2855 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2855.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2855 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2855"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7254810 vom 2025-12-15",
"url": "https://www.ibm.com/support/pages/node/7254810"
}
],
"source_lang": "en-US",
"title": "IBM DataPower Gateway: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-12-15T23:00:00.000+00:00",
"generator": {
"date": "2025-12-16T11:15:03.684+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2855",
"initial_release_date": "2025-12-15T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.6.6.0",
"product": {
"name": "IBM DataPower Gateway \u003c10.6.6.0",
"product_id": "T049457"
}
},
{
"category": "product_version",
"name": "10.6.6.0",
"product": {
"name": "IBM DataPower Gateway 10.6.6.0",
"product_id": "T049457-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:10.6.6.0"
}
}
}
],
"category": "product_name",
"name": "DataPower Gateway"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10044",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2016-10044"
},
{
"cve": "CVE-2024-39500",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-39500"
},
{
"cve": "CVE-2024-42265",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42265"
},
{
"cve": "CVE-2024-42291",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42291"
},
{
"cve": "CVE-2024-42294",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42294"
},
{
"cve": "CVE-2024-42304",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42304"
},
{
"cve": "CVE-2024-42312",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42312"
},
{
"cve": "CVE-2024-42316",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42316"
},
{
"cve": "CVE-2024-42321",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42321"
},
{
"cve": "CVE-2024-43828",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-43828"
},
{
"cve": "CVE-2024-43846",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-43846"
},
{
"cve": "CVE-2024-43853",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-43853"
},
{
"cve": "CVE-2024-43871",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-43871"
},
{
"cve": "CVE-2024-43898",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-43898"
},
{
"cve": "CVE-2024-44958",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-44958"
},
{
"cve": "CVE-2024-44975",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-44975"
},
{
"cve": "CVE-2024-44987",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-44987"
},
{
"cve": "CVE-2024-44989",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-44989"
},
{
"cve": "CVE-2024-45022",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-45022"
},
{
"cve": "CVE-2024-46750",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-46750"
},
{
"cve": "CVE-2024-46787",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-46787"
},
{
"cve": "CVE-2024-47660",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47660"
},
{
"cve": "CVE-2024-47668",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47668"
},
{
"cve": "CVE-2024-47678",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47678"
},
{
"cve": "CVE-2024-47685",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47685"
},
{
"cve": "CVE-2024-47700",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47700"
},
{
"cve": "CVE-2024-47705",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47705"
},
{
"cve": "CVE-2024-47706",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47706"
},
{
"cve": "CVE-2024-47710",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47710"
},
{
"cve": "CVE-2024-47719",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47719"
},
{
"cve": "CVE-2024-47745",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47745"
},
{
"cve": "CVE-2024-49851",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49851"
},
{
"cve": "CVE-2024-49860",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49860"
},
{
"cve": "CVE-2024-49870",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49870"
},
{
"cve": "CVE-2024-49875",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49875"
},
{
"cve": "CVE-2024-49881",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49881"
},
{
"cve": "CVE-2024-49882",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49882"
},
{
"cve": "CVE-2024-49883",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49883"
},
{
"cve": "CVE-2024-49884",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49884"
},
{
"cve": "CVE-2024-49885",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49885"
},
{
"cve": "CVE-2024-49886",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49886"
},
{
"cve": "CVE-2024-49889",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49889"
},
{
"cve": "CVE-2024-49927",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49927"
},
{
"cve": "CVE-2024-49933",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49933"
},
{
"cve": "CVE-2024-49935",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49935"
},
{
"cve": "CVE-2024-49954",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49954"
},
{
"cve": "CVE-2024-49959",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49959"
},
{
"cve": "CVE-2024-49960",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49960"
},
{
"cve": "CVE-2024-49962",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49962"
},
{
"cve": "CVE-2024-49968",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49968"
},
{
"cve": "CVE-2024-49975",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49975"
},
{
"cve": "CVE-2024-49983",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49983"
},
{
"cve": "CVE-2024-49994",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49994"
},
{
"cve": "CVE-2024-50002",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50002"
},
{
"cve": "CVE-2024-50006",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50006"
},
{
"cve": "CVE-2024-50014",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50014"
},
{
"cve": "CVE-2024-50015",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50015"
},
{
"cve": "CVE-2024-50019",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50019"
},
{
"cve": "CVE-2024-50024",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50024"
},
{
"cve": "CVE-2024-50027",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50027"
},
{
"cve": "CVE-2024-50028",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50028"
},
{
"cve": "CVE-2024-50038",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50038"
},
{
"cve": "CVE-2024-50039",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50039"
},
{
"cve": "CVE-2024-50046",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50046"
},
{
"cve": "CVE-2024-50055",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50055"
},
{
"cve": "CVE-2024-50058",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50058"
},
{
"cve": "CVE-2024-50064",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50064"
},
{
"cve": "CVE-2024-50067",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50067"
},
{
"cve": "CVE-2024-50073",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50073"
},
{
"cve": "CVE-2024-50074",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50074"
},
{
"cve": "CVE-2024-50081",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50081"
},
{
"cve": "CVE-2024-50082",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50082"
},
{
"cve": "CVE-2024-50101",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50101"
},
{
"cve": "CVE-2024-50106",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50106"
},
{
"cve": "CVE-2024-50141",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50141"
},
{
"cve": "CVE-2024-50153",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50153"
},
{
"cve": "CVE-2024-50169",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50169"
},
{
"cve": "CVE-2024-50186",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50186"
},
{
"cve": "CVE-2024-50191",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50191"
},
{
"cve": "CVE-2024-50200",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50200"
},
{
"cve": "CVE-2024-50215",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50215"
},
{
"cve": "CVE-2024-50256",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50256"
},
{
"cve": "CVE-2024-50271",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50271"
},
{
"cve": "CVE-2024-50272",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50272"
},
{
"cve": "CVE-2024-50301",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50301"
},
{
"cve": "CVE-2024-53044",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53044"
},
{
"cve": "CVE-2024-53057",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53057"
},
{
"cve": "CVE-2024-53070",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53070"
},
{
"cve": "CVE-2024-53082",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53082"
},
{
"cve": "CVE-2024-53085",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53085"
},
{
"cve": "CVE-2024-53096",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53096"
},
{
"cve": "CVE-2024-53097",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53097"
},
{
"cve": "CVE-2024-53103",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53103"
},
{
"cve": "CVE-2024-53105",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53105"
},
{
"cve": "CVE-2024-53110",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53110"
},
{
"cve": "CVE-2024-53117",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53117"
},
{
"cve": "CVE-2024-53118",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53118"
},
{
"cve": "CVE-2024-53124",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53124"
},
{
"cve": "CVE-2024-53136",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53136"
},
{
"cve": "CVE-2024-53142",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53142"
},
{
"cve": "CVE-2024-53160",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53160"
},
{
"cve": "CVE-2024-53166",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53166"
},
{
"cve": "CVE-2024-53173",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53173"
},
{
"cve": "CVE-2024-53174",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53174"
},
{
"cve": "CVE-2024-53203",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53203"
},
{
"cve": "CVE-2024-53222",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53222"
},
{
"cve": "CVE-2024-53681",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53681"
},
{
"cve": "CVE-2024-56558",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56558"
},
{
"cve": "CVE-2024-56566",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56566"
},
{
"cve": "CVE-2024-56600",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56600"
},
{
"cve": "CVE-2024-56601",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56601"
},
{
"cve": "CVE-2024-56611",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56611"
},
{
"cve": "CVE-2024-56644",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56644"
},
{
"cve": "CVE-2024-56647",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56647"
},
{
"cve": "CVE-2024-56688",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56688"
},
{
"cve": "CVE-2024-56693",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56693"
},
{
"cve": "CVE-2024-56783",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56783"
},
{
"cve": "CVE-2024-57843",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-57843"
},
{
"cve": "CVE-2024-57884",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-57884"
},
{
"cve": "CVE-2024-57888",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-57888"
},
{
"cve": "CVE-2024-57929",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-57929"
},
{
"cve": "CVE-2025-21666",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-21666"
},
{
"cve": "CVE-2025-21669",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-21669"
},
{
"cve": "CVE-2025-21694",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-21694"
},
{
"cve": "CVE-2025-21999",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-21999"
},
{
"cve": "CVE-2025-22058",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-22058"
},
{
"cve": "CVE-2025-22113",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-22113"
},
{
"cve": "CVE-2025-22121",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-22121"
},
{
"cve": "CVE-2025-37785",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-37785"
},
{
"cve": "CVE-2025-38089",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-38089"
},
{
"cve": "CVE-2025-38200",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-38200"
},
{
"cve": "CVE-2025-38461",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-38461"
},
{
"cve": "CVE-2025-8058",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-8058"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…