Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-39477
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T04:26:15.943Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://git.kernel.org/stable/c/aa998f9dcb34c28448f86e8f5490f20d5eb0eac7", }, { tags: [ "x_transferred", ], url: "https://git.kernel.org/stable/c/8daf9c702ee7f825f0de8600abff764acfedea13", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2024-39477", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-10T17:07:38.781989Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-11T17:34:39.612Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Linux", programFiles: [ "mm/hugetlb.c", ], repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", vendor: "Linux", versions: [ { lessThan: "aa998f9dcb34c28448f86e8f5490f20d5eb0eac7", status: "affected", version: "df7a6d1f64056aec572162c5d35ed9ff86ece6f3", versionType: "git", }, { lessThan: "8daf9c702ee7f825f0de8600abff764acfedea13", status: "affected", version: "df7a6d1f64056aec572162c5d35ed9ff86ece6f3", versionType: "git", }, ], }, { defaultStatus: "affected", product: "Linux", programFiles: [ "mm/hugetlb.c", ], repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", vendor: "Linux", versions: [ { status: "affected", version: "6.9", }, { lessThan: "6.9", status: "unaffected", version: "0", versionType: "semver", }, { lessThanOrEqual: "6.9.*", status: "unaffected", version: "6.9.5", versionType: "semver", }, { lessThanOrEqual: "*", status: "unaffected", version: "6.10", versionType: "original_commit_for_fix", }, ], }, ], descriptions: [ { lang: "en", value: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: do not call vma_add_reservation upon ENOMEM\n\nsysbot reported a splat [1] on __unmap_hugepage_range(). This is because\nvma_needs_reservation() can return -ENOMEM if\nallocate_file_region_entries() fails to allocate the file_region struct\nfor the reservation.\n\nCheck for that and do not call vma_add_reservation() if that is the case,\notherwise region_abort() and region_del() will see that we do not have any\nfile_regions.\n\nIf we detect that vma_needs_reservation() returned -ENOMEM, we clear the\nhugetlb_restore_reserve flag as if this reservation was still consumed, so\nfree_huge_folio() will not increment the resv count.\n\n[1] https://lore.kernel.org/linux-mm/0000000000004096100617c58d54@google.com/T/#ma5983bc1ab18a54910da83416b3f89f3c7ee43aa", }, ], providerMetadata: { dateUpdated: "2024-12-19T09:06:56.000Z", orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", shortName: "Linux", }, references: [ { url: "https://git.kernel.org/stable/c/aa998f9dcb34c28448f86e8f5490f20d5eb0eac7", }, { url: "https://git.kernel.org/stable/c/8daf9c702ee7f825f0de8600abff764acfedea13", }, ], title: "mm/hugetlb: do not call vma_add_reservation upon ENOMEM", x_generator: { engine: "bippy-5f407fcff5a0", }, }, }, cveMetadata: { assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", assignerShortName: "Linux", cveId: "CVE-2024-39477", datePublished: "2024-07-05T06:55:07.268Z", dateReserved: "2024-06-25T14:23:23.746Z", dateUpdated: "2024-12-19T09:06:56.000Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2024-39477\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-05T07:15:10.413\",\"lastModified\":\"2024-11-21T09:27:45.047\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm/hugetlb: do not call vma_add_reservation upon ENOMEM\\n\\nsysbot reported a splat [1] on __unmap_hugepage_range(). This is because\\nvma_needs_reservation() can return -ENOMEM if\\nallocate_file_region_entries() fails to allocate the file_region struct\\nfor the reservation.\\n\\nCheck for that and do not call vma_add_reservation() if that is the case,\\notherwise region_abort() and region_del() will see that we do not have any\\nfile_regions.\\n\\nIf we detect that vma_needs_reservation() returned -ENOMEM, we clear the\\nhugetlb_restore_reserve flag as if this reservation was still consumed, so\\nfree_huge_folio() will not increment the resv count.\\n\\n[1] https://lore.kernel.org/linux-mm/0000000000004096100617c58d54@google.com/T/#ma5983bc1ab18a54910da83416b3f89f3c7ee43aa\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvió la siguiente vulnerabilidad: mm/hugetlb: no llame a vma_add_reservation cuando ENOMEM sysbot informó un splat [1] en __unmap_hugepage_range(). Esto se debe a que vma_needs_reservation() puede devolver -ENOMEM si allocate_file_region_entries() no puede asignar la estructura file_region para la reserva. Verifique eso y no llame a vma_add_reservation() si ese es el caso; de lo contrario, region_abort() y region_del() verán que no tenemos ningún file_regions. Si detectamos que vma_needs_reservation() devolvió -ENOMEM, borramos el indicador hugetlb_restore_reserve como si esta reserva todavía estuviera consumida, por lo que free_huge_folio() no incrementará el recuento de resv. [1] https://lore.kernel.org/linux-mm/0000000000004096100617c58d54@google.com/T/#ma5983bc1ab18a54910da83416b3f89f3c7ee43aa\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.9\",\"versionEndExcluding\":\"6.9.5\",\"matchCriteriaId\":\"54EDFD02-25E6-4BC8-9AD0-0A59881F400A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C40DD2D9-90E3-4E95-9F1A-E7C680F11F2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D5209E-E390-45C5-A5D1-C9EDB40819F7\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/8daf9c702ee7f825f0de8600abff764acfedea13\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/aa998f9dcb34c28448f86e8f5490f20d5eb0eac7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8daf9c702ee7f825f0de8600abff764acfedea13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/aa998f9dcb34c28448f86e8f5490f20d5eb0eac7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/aa998f9dcb34c28448f86e8f5490f20d5eb0eac7\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/8daf9c702ee7f825f0de8600abff764acfedea13\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T04:26:15.943Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-39477\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T17:07:38.781989Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:25.040Z\"}}], \"cna\": {\"title\": \"mm/hugetlb: do not call vma_add_reservation upon ENOMEM\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"df7a6d1f64056aec572162c5d35ed9ff86ece6f3\", \"lessThan\": \"aa998f9dcb34c28448f86e8f5490f20d5eb0eac7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"df7a6d1f64056aec572162c5d35ed9ff86ece6f3\", \"lessThan\": \"8daf9c702ee7f825f0de8600abff764acfedea13\", \"versionType\": \"git\"}], \"programFiles\": [\"mm/hugetlb.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.9\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.9\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.9.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"mm/hugetlb.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/aa998f9dcb34c28448f86e8f5490f20d5eb0eac7\"}, {\"url\": \"https://git.kernel.org/stable/c/8daf9c702ee7f825f0de8600abff764acfedea13\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm/hugetlb: do not call vma_add_reservation upon ENOMEM\\n\\nsysbot reported a splat [1] on __unmap_hugepage_range(). This is because\\nvma_needs_reservation() can return -ENOMEM if\\nallocate_file_region_entries() fails to allocate the file_region struct\\nfor the reservation.\\n\\nCheck for that and do not call vma_add_reservation() if that is the case,\\notherwise region_abort() and region_del() will see that we do not have any\\nfile_regions.\\n\\nIf we detect that vma_needs_reservation() returned -ENOMEM, we clear the\\nhugetlb_restore_reserve flag as if this reservation was still consumed, so\\nfree_huge_folio() will not increment the resv count.\\n\\n[1] https://lore.kernel.org/linux-mm/0000000000004096100617c58d54@google.com/T/#ma5983bc1ab18a54910da83416b3f89f3c7ee43aa\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:06:56.000Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2024-39477\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:06:56.000Z\", \"dateReserved\": \"2024-06-25T14:23:23.746Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-05T06:55:07.268Z\", \"assignerShortName\": \"Linux\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
fkie_cve-2024-39477
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | 6.10.0 | |
linux | linux_kernel | 6.10.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "54EDFD02-25E6-4BC8-9AD0-0A59881F400A", versionEndExcluding: "6.9.5", versionStartIncluding: "6.9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*", matchCriteriaId: "C40DD2D9-90E3-4E95-9F1A-E7C680F11F2A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:6.10.0:rc2:*:*:*:*:*:*", matchCriteriaId: "54D5209E-E390-45C5-A5D1-C9EDB40819F7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: do not call vma_add_reservation upon ENOMEM\n\nsysbot reported a splat [1] on __unmap_hugepage_range(). This is because\nvma_needs_reservation() can return -ENOMEM if\nallocate_file_region_entries() fails to allocate the file_region struct\nfor the reservation.\n\nCheck for that and do not call vma_add_reservation() if that is the case,\notherwise region_abort() and region_del() will see that we do not have any\nfile_regions.\n\nIf we detect that vma_needs_reservation() returned -ENOMEM, we clear the\nhugetlb_restore_reserve flag as if this reservation was still consumed, so\nfree_huge_folio() will not increment the resv count.\n\n[1] https://lore.kernel.org/linux-mm/0000000000004096100617c58d54@google.com/T/#ma5983bc1ab18a54910da83416b3f89f3c7ee43aa", }, { lang: "es", value: "En el kernel de Linux, se resolvió la siguiente vulnerabilidad: mm/hugetlb: no llame a vma_add_reservation cuando ENOMEM sysbot informó un splat [1] en __unmap_hugepage_range(). Esto se debe a que vma_needs_reservation() puede devolver -ENOMEM si allocate_file_region_entries() no puede asignar la estructura file_region para la reserva. Verifique eso y no llame a vma_add_reservation() si ese es el caso; de lo contrario, region_abort() y region_del() verán que no tenemos ningún file_regions. Si detectamos que vma_needs_reservation() devolvió -ENOMEM, borramos el indicador hugetlb_restore_reserve como si esta reserva todavía estuviera consumida, por lo que free_huge_folio() no incrementará el recuento de resv. [1] https://lore.kernel.org/linux-mm/0000000000004096100617c58d54@google.com/T/#ma5983bc1ab18a54910da83416b3f89f3c7ee43aa", }, ], id: "CVE-2024-39477", lastModified: "2024-11-21T09:27:45.047", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-07-05T07:15:10.413", references: [ { source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", tags: [ "Mailing List", "Patch", ], url: "https://git.kernel.org/stable/c/8daf9c702ee7f825f0de8600abff764acfedea13", }, { source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", tags: [ "Mailing List", "Patch", ], url: "https://git.kernel.org/stable/c/aa998f9dcb34c28448f86e8f5490f20d5eb0eac7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", ], url: "https://git.kernel.org/stable/c/8daf9c702ee7f825f0de8600abff764acfedea13", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", ], url: "https://git.kernel.org/stable/c/aa998f9dcb34c28448f86e8f5490f20d5eb0eac7", }, ], sourceIdentifier: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-770", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
WID-SEC-W-2024-1528
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1528 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1528.json", }, { category: "self", summary: "WID-SEC-2024-1528 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1528", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070512-CVE-2024-39472-f977@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070516-CVE-2024-39473-d28c@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070518-CVE-2024-39474-97cf@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070518-CVE-2024-39475-ac04@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070518-CVE-2024-39476-aa2d@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070519-CVE-2024-39477-5c3f@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070519-CVE-2024-39478-7e1c@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070519-CVE-2024-39479-5bd1@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070519-CVE-2024-39480-b85a@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070520-CVE-2024-39481-108f@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070520-CVE-2024-39482-8ed3@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070520-CVE-2024-39483-92bf@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070521-CVE-2024-39484-afbf@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070521-CVE-2024-39485-0f50@gregkh/", }, { category: "external", summary: "Debian Security Advisory DSA-5730 vom 2024-07-16", url: "https://lists.debian.org/debian-security-announce/2024/msg00141.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2493-1 vom 2024-07-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018984.html", }, { category: "external", summary: "Debian Security Advisory DSA-5731 vom 2024-07-17", url: "https://lists.debian.org/debian-security-announce/2024/msg00142.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2802-1 vom 2024-08-07", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:5101 vom 2024-08-08", url: "https://access.redhat.com/errata/RHSA-2024:5101", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2024-1945 vom 2024-08-07", url: "https://alas.aws.amazon.com/ALAS-2024-1945.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:5102 vom 2024-08-08", url: "https://access.redhat.com/errata/RHSA-2024:5102", }, { category: "external", summary: "Ubuntu Security Notice USN-6952-1 vom 2024-08-09", url: "https://ubuntu.com/security/notices/USN-6952-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6949-1 vom 2024-08-09", url: "https://ubuntu.com/security/notices/USN-6949-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6951-1 vom 2024-08-09", url: "https://ubuntu.com/security/notices/USN-6951-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6953-1 vom 2024-08-09", url: "https://ubuntu.com/security/notices/USN-6953-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-5101 vom 2024-08-09", url: "https://linux.oracle.com/errata/ELSA-2024-5101.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6955-1 vom 2024-08-12", url: "https://ubuntu.com/security/notices/USN-6955-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12585 vom 2024-08-13", url: "https://linux.oracle.com/errata/ELSA-2024-12585.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12584 vom 2024-08-13", url: "https://linux.oracle.com/errata/ELSA-2024-12584.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12581 vom 2024-08-13", url: "https://linux.oracle.com/errata/ELSA-2024-12581.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2024-2613 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALAS-2024-2613.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-077 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-077.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-176 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-176.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-175 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-175.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-177 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-177.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-178 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-178.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6949-2 vom 2024-08-13", url: "https://ubuntu.com/security/notices/USN-6949-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6952-2 vom 2024-08-13", url: "https://ubuntu.com/security/notices/USN-6952-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6951-2 vom 2024-08-14", url: "https://ubuntu.com/security/notices/USN-6951-2", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6973-1 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6973-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6974-1 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6974-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6975-1 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6975-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6976-1 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6976-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6951-4 vom 2024-08-21", url: "https://ubuntu.com/security/notices/USN-6951-4", }, { category: "external", summary: "Ubuntu Security Notice USN-6972-1 vom 2024-08-21", url: "https://ubuntu.com/security/notices/USN-6972-1", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-179 vom 2024-08-21", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-179.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-180 vom 2024-08-21", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-180.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6979-1 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6979-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6972-2 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6972-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6974-2 vom 2024-08-23", url: "https://ubuntu.com/security/notices/USN-6974-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6973-2 vom 2024-08-23", url: "https://ubuntu.com/security/notices/USN-6973-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6973-2 vom 2024-08-23", url: "https://ubuntu.com/security/notices/USN-6972-3", }, { category: "external", summary: "Ubuntu Security Notice USN-6973-3 vom 2024-08-26", url: "https://ubuntu.com/security/notices/USN-6973-3", }, { category: "external", summary: "Ubuntu Security Notice USN-6972-4 vom 2024-08-29", url: "https://ubuntu.com/security/notices/USN-6972-4", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:5928 vom 2024-08-28", url: "https://access.redhat.com/errata/RHSA-2024:5928", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-5928 vom 2024-08-29", url: "https://linux.oracle.com/errata/ELSA-2024-5928.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6973-4 vom 2024-09-02", url: "https://ubuntu.com/security/notices/USN-6973-4", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-189 vom 2024-09-04", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-189.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12618 vom 2024-09-12", url: "https://linux.oracle.com/errata/ELSA-2024-12618.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6999-1 vom 2024-09-11", url: "https://ubuntu.com/security/notices/USN-6999-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12611 vom 2024-09-11", url: "https://linux.oracle.com/errata/ELSA-2024-12611.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7003-2 vom 2024-09-12", url: "https://ubuntu.com/security/notices/USN-7003-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7006-1 vom 2024-09-12", url: "https://ubuntu.com/security/notices/USN-7006-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7004-1 vom 2024-09-12", url: "https://ubuntu.com/security/notices/USN-7004-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7005-1 vom 2024-09-12", url: "https://ubuntu.com/security/notices/USN-7005-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7007-1 vom 2024-09-13", url: "https://ubuntu.com/security/notices/USN-7007-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7008-1 vom 2024-09-13", url: "https://ubuntu.com/security/notices/USN-7008-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7005-2 vom 2024-09-13", url: "https://ubuntu.com/security/notices/USN-7005-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7009-1 vom 2024-09-13", url: "https://ubuntu.com/security/notices/USN-7009-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7007-2 vom 2024-09-23", url: "https://ubuntu.com/security/notices/USN-7007-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7028-1 vom 2024-09-23", url: "https://ubuntu.com/security/notices/USN-7028-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6999-2 vom 2024-09-23", url: "https://ubuntu.com/security/notices/USN-6999-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7007-3 vom 2024-09-23", url: "https://ubuntu.com/security/notices/USN-7007-3", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7029-1 vom 2024-09-23", url: "https://ubuntu.com/security/notices/USN-7029-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:8107 vom 2024-10-15", url: "https://access.redhat.com/errata/RHSA-2024:8107", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:8157 vom 2024-10-16", url: "https://access.redhat.com/errata/RHSA-2024:8157", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:8162 vom 2024-10-16", url: "https://access.redhat.com/errata/RHSA-2024:8162", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:8158 vom 2024-10-16", url: "https://access.redhat.com/errata/RHSA-2024:8158", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-8162 vom 2024-10-16", url: "https://linux.oracle.com/errata/ELSA-2024-8162.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7028-2 vom 2024-10-17", url: "https://ubuntu.com/security/notices/USN-7028-2", }, { category: "external", summary: "Rocky Linux Security Advisory RLSA-2024:8162 vom 2024-10-25", url: "https://errata.build.resf.org/RLSA-2024:8162", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:8617 vom 2024-10-30", url: "https://access.redhat.com/errata/RHSA-2024:8617", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-8617 vom 2024-10-31", url: "https://linux.oracle.com/errata/ELSA-2024-8617.html", }, { category: "external", summary: "IBM Security Bulletin", url: "https://www.ibm.com/support/pages/node/7174634", }, { category: "external", summary: "Rocky Linux Security Advisory RLSA-2024:8617 vom 2024-11-08", url: "https://errata.build.resf.org/RLSA-2024:8617", }, { category: "external", summary: "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", url: "https://ubuntu.com/security/notices/USN-7100-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", url: "https://ubuntu.com/security/notices/USN-7100-2", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9315", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", url: "https://linux.oracle.com/errata/ELSA-2024-12815.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/", }, { category: "external", summary: "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", url: "https://ubuntu.com/security/notices/USN-7123-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12851 vom 2024-12-05", url: "http://linux.oracle.com/errata/ELSA-2024-12851.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", url: "https://ubuntu.com/security/notices/USN-7144-1", }, { category: "external", summary: "ORACLE OVMSA-2024-0016 vom 2024-12-10", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2024-December/001104.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", url: "https://ubuntu.com/security/notices/USN-7155-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", url: "https://ubuntu.com/security/notices/USN-7156-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", url: "https://ubuntu.com/security/notices/USN-7154-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html", }, { category: "external", summary: "Debian Security Advisory DLA-4008 vom 2025-01-03", url: "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", url: "https://ubuntu.com/security/notices/USN-7154-2", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7196-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7194-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen", tracking: { current_release_date: "2025-01-19T23:00:00.000+00:00", generator: { date: "2025-01-20T09:20:55.822+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2024-1528", initial_release_date: "2024-07-04T22:00:00.000+00:00", revision_history: [ { date: "2024-07-04T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-07-15T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Debian aufgenommen", }, { date: "2024-07-16T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Debian aufgenommen", }, { date: "2024-07-18T22:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-08-06T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-08-07T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Red Hat und Amazon aufgenommen", }, { date: "2024-08-08T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-08-11T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-08-12T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-08-13T22:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE, Amazon und Ubuntu aufgenommen", }, { date: "2024-08-14T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Ubuntu und SUSE aufgenommen", }, { date: "2024-08-15T22:00:00.000+00:00", number: "12", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-08-18T22:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-08-19T22:00:00.000+00:00", number: "14", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-08-21T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Ubuntu und Amazon aufgenommen", }, { date: "2024-08-22T22:00:00.000+00:00", number: "16", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-08-25T22:00:00.000+00:00", number: "17", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-08-26T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-08-28T22:00:00.000+00:00", number: "19", summary: "Neue Updates von Ubuntu und Red Hat aufgenommen", }, { date: "2024-08-29T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-09-02T22:00:00.000+00:00", number: "21", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-09-04T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2024-09-10T22:00:00.000+00:00", number: "23", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-09-11T22:00:00.000+00:00", number: "24", summary: "Neue Updates von Oracle Linux und Ubuntu aufgenommen", }, { date: "2024-09-12T22:00:00.000+00:00", number: "25", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-09-15T22:00:00.000+00:00", number: "26", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-09-22T22:00:00.000+00:00", number: "27", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-09-23T22:00:00.000+00:00", number: "28", summary: "Neue Updates von Ubuntu und SUSE aufgenommen", }, { date: "2024-10-14T22:00:00.000+00:00", number: "29", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-10-15T22:00:00.000+00:00", number: "30", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-10-16T22:00:00.000+00:00", number: "31", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-10-17T22:00:00.000+00:00", number: "32", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-10-27T23:00:00.000+00:00", number: "33", summary: "Neue Updates von Rocky Enterprise Software Foundation aufgenommen", }, { date: "2024-10-29T23:00:00.000+00:00", number: "34", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-10-31T23:00:00.000+00:00", number: "35", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-11-10T23:00:00.000+00:00", number: "36", summary: "Neue Updates von Rocky Enterprise Software Foundation aufgenommen", }, { date: "2024-11-11T23:00:00.000+00:00", number: "37", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-11-12T23:00:00.000+00:00", number: "38", summary: "Neue Updates von Ubuntu und Red Hat aufgenommen", }, { date: "2024-11-13T23:00:00.000+00:00", number: "39", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-11-20T23:00:00.000+00:00", number: "40", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-11-28T23:00:00.000+00:00", number: "41", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-12-05T23:00:00.000+00:00", number: "42", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-12-09T23:00:00.000+00:00", number: "43", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-12-10T23:00:00.000+00:00", number: "44", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2024-12-12T23:00:00.000+00:00", number: "45", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-12-17T23:00:00.000+00:00", number: "46", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2025-01-02T23:00:00.000+00:00", number: "47", summary: "Neue Updates von Debian aufgenommen", }, { date: "2025-01-06T23:00:00.000+00:00", number: "48", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2025-01-08T23:00:00.000+00:00", number: "49", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2025-01-09T23:00:00.000+00:00", number: "50", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2025-01-15T23:00:00.000+00:00", number: "51", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2025-01-19T23:00:00.000+00:00", number: "52", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "52", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { branches: [ { category: "product_version_range", name: "<7.5.0 UP10 IF01", product: { name: "IBM QRadar SIEM <7.5.0 UP10 IF01", product_id: "T038741", }, }, { category: "product_version", name: "7.5.0 UP10 IF01", product: { name: "IBM QRadar SIEM 7.5.0 UP10 IF01", product_id: "T038741-fixed", product_identification_helper: { cpe: "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01", }, }, }, ], category: "product_name", name: "QRadar SIEM", }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Open Source Linux Kernel", product: { name: "Open Source Linux Kernel", product_id: "T030205", product_identification_helper: { cpe: "cpe:/o:linux:linux_kernel:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, { branches: [ { category: "product_version", name: "3", product: { name: "Oracle VM 3", product_id: "T030927", product_identification_helper: { cpe: "cpe:/a:oracle:vm:3", }, }, }, ], category: "product_name", name: "VM", }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "RESF Rocky Linux", product: { name: "RESF Rocky Linux", product_id: "T032255", product_identification_helper: { cpe: "cpe:/o:resf:rocky_linux:-", }, }, }, ], category: "vendor", name: "RESF", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2024-39472", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39472", }, { cve: "CVE-2024-39473", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39473", }, { cve: "CVE-2024-39474", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39474", }, { cve: "CVE-2024-39475", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39475", }, { cve: "CVE-2024-39476", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39476", }, { cve: "CVE-2024-39477", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39477", }, { cve: "CVE-2024-39478", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39478", }, { cve: "CVE-2024-39479", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39479", }, { cve: "CVE-2024-39480", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39480", }, { cve: "CVE-2024-39481", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39481", }, { cve: "CVE-2024-39482", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39482", }, { cve: "CVE-2024-39483", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39483", }, { cve: "CVE-2024-39484", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39484", }, { cve: "CVE-2024-39485", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39485", }, ], }
wid-sec-w-2024-1528
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1528 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1528.json", }, { category: "self", summary: "WID-SEC-2024-1528 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1528", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070512-CVE-2024-39472-f977@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070516-CVE-2024-39473-d28c@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070518-CVE-2024-39474-97cf@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070518-CVE-2024-39475-ac04@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070518-CVE-2024-39476-aa2d@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070519-CVE-2024-39477-5c3f@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070519-CVE-2024-39478-7e1c@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070519-CVE-2024-39479-5bd1@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070519-CVE-2024-39480-b85a@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070520-CVE-2024-39481-108f@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070520-CVE-2024-39482-8ed3@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070520-CVE-2024-39483-92bf@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070521-CVE-2024-39484-afbf@gregkh", }, { category: "external", summary: "Linux CVE Announce vom 2024-07-04", url: "http://lore.kernel.org/linux-cve-announce/2024070521-CVE-2024-39485-0f50@gregkh/", }, { category: "external", summary: "Debian Security Advisory DSA-5730 vom 2024-07-16", url: "https://lists.debian.org/debian-security-announce/2024/msg00141.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2493-1 vom 2024-07-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018984.html", }, { category: "external", summary: "Debian Security Advisory DSA-5731 vom 2024-07-17", url: "https://lists.debian.org/debian-security-announce/2024/msg00142.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2802-1 vom 2024-08-07", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:5101 vom 2024-08-08", url: "https://access.redhat.com/errata/RHSA-2024:5101", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2024-1945 vom 2024-08-07", url: "https://alas.aws.amazon.com/ALAS-2024-1945.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:5102 vom 2024-08-08", url: "https://access.redhat.com/errata/RHSA-2024:5102", }, { category: "external", summary: "Ubuntu Security Notice USN-6952-1 vom 2024-08-09", url: "https://ubuntu.com/security/notices/USN-6952-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6949-1 vom 2024-08-09", url: "https://ubuntu.com/security/notices/USN-6949-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6951-1 vom 2024-08-09", url: "https://ubuntu.com/security/notices/USN-6951-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6953-1 vom 2024-08-09", url: "https://ubuntu.com/security/notices/USN-6953-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-5101 vom 2024-08-09", url: "https://linux.oracle.com/errata/ELSA-2024-5101.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6955-1 vom 2024-08-12", url: "https://ubuntu.com/security/notices/USN-6955-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12585 vom 2024-08-13", url: "https://linux.oracle.com/errata/ELSA-2024-12585.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12584 vom 2024-08-13", url: "https://linux.oracle.com/errata/ELSA-2024-12584.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12581 vom 2024-08-13", url: "https://linux.oracle.com/errata/ELSA-2024-12581.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2024-2613 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALAS-2024-2613.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-077 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-077.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-176 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-176.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-175 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-175.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-177 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-177.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-178 vom 2024-08-13", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-178.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6949-2 vom 2024-08-13", url: "https://ubuntu.com/security/notices/USN-6949-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6952-2 vom 2024-08-13", url: "https://ubuntu.com/security/notices/USN-6952-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6951-2 vom 2024-08-14", url: "https://ubuntu.com/security/notices/USN-6951-2", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6973-1 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6973-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6974-1 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6974-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6975-1 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6975-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6976-1 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6976-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6951-4 vom 2024-08-21", url: "https://ubuntu.com/security/notices/USN-6951-4", }, { category: "external", summary: "Ubuntu Security Notice USN-6972-1 vom 2024-08-21", url: "https://ubuntu.com/security/notices/USN-6972-1", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-179 vom 2024-08-21", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-179.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-180 vom 2024-08-21", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-180.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6979-1 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6979-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6972-2 vom 2024-08-22", url: "https://ubuntu.com/security/notices/USN-6972-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6974-2 vom 2024-08-23", url: "https://ubuntu.com/security/notices/USN-6974-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6973-2 vom 2024-08-23", url: "https://ubuntu.com/security/notices/USN-6973-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6973-2 vom 2024-08-23", url: "https://ubuntu.com/security/notices/USN-6972-3", }, { category: "external", summary: "Ubuntu Security Notice USN-6973-3 vom 2024-08-26", url: "https://ubuntu.com/security/notices/USN-6973-3", }, { category: "external", summary: "Ubuntu Security Notice USN-6972-4 vom 2024-08-29", url: "https://ubuntu.com/security/notices/USN-6972-4", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:5928 vom 2024-08-28", url: "https://access.redhat.com/errata/RHSA-2024:5928", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-5928 vom 2024-08-29", url: "https://linux.oracle.com/errata/ELSA-2024-5928.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6973-4 vom 2024-09-02", url: "https://ubuntu.com/security/notices/USN-6973-4", }, { category: "external", summary: "Amazon Linux Security Advisory ALASLIVEPATCH-2024-189 vom 2024-09-04", url: "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-189.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12618 vom 2024-09-12", url: "https://linux.oracle.com/errata/ELSA-2024-12618.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6999-1 vom 2024-09-11", url: "https://ubuntu.com/security/notices/USN-6999-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12611 vom 2024-09-11", url: "https://linux.oracle.com/errata/ELSA-2024-12611.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7003-2 vom 2024-09-12", url: "https://ubuntu.com/security/notices/USN-7003-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7006-1 vom 2024-09-12", url: "https://ubuntu.com/security/notices/USN-7006-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7004-1 vom 2024-09-12", url: "https://ubuntu.com/security/notices/USN-7004-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7005-1 vom 2024-09-12", url: "https://ubuntu.com/security/notices/USN-7005-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7007-1 vom 2024-09-13", url: "https://ubuntu.com/security/notices/USN-7007-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7008-1 vom 2024-09-13", url: "https://ubuntu.com/security/notices/USN-7008-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7005-2 vom 2024-09-13", url: "https://ubuntu.com/security/notices/USN-7005-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7009-1 vom 2024-09-13", url: "https://ubuntu.com/security/notices/USN-7009-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7007-2 vom 2024-09-23", url: "https://ubuntu.com/security/notices/USN-7007-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7028-1 vom 2024-09-23", url: "https://ubuntu.com/security/notices/USN-7028-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6999-2 vom 2024-09-23", url: "https://ubuntu.com/security/notices/USN-6999-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7007-3 vom 2024-09-23", url: "https://ubuntu.com/security/notices/USN-7007-3", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7029-1 vom 2024-09-23", url: "https://ubuntu.com/security/notices/USN-7029-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:8107 vom 2024-10-15", url: "https://access.redhat.com/errata/RHSA-2024:8107", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:8157 vom 2024-10-16", url: "https://access.redhat.com/errata/RHSA-2024:8157", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:8162 vom 2024-10-16", url: "https://access.redhat.com/errata/RHSA-2024:8162", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:8158 vom 2024-10-16", url: "https://access.redhat.com/errata/RHSA-2024:8158", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-8162 vom 2024-10-16", url: "https://linux.oracle.com/errata/ELSA-2024-8162.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7028-2 vom 2024-10-17", url: "https://ubuntu.com/security/notices/USN-7028-2", }, { category: "external", summary: "Rocky Linux Security Advisory RLSA-2024:8162 vom 2024-10-25", url: "https://errata.build.resf.org/RLSA-2024:8162", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:8617 vom 2024-10-30", url: "https://access.redhat.com/errata/RHSA-2024:8617", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-8617 vom 2024-10-31", url: "https://linux.oracle.com/errata/ELSA-2024-8617.html", }, { category: "external", summary: "IBM Security Bulletin", url: "https://www.ibm.com/support/pages/node/7174634", }, { category: "external", summary: "Rocky Linux Security Advisory RLSA-2024:8617 vom 2024-11-08", url: "https://errata.build.resf.org/RLSA-2024:8617", }, { category: "external", summary: "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", url: "https://ubuntu.com/security/notices/USN-7100-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", url: "https://ubuntu.com/security/notices/USN-7100-2", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", url: "https://access.redhat.com/errata/RHSA-2024:9315", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", url: "https://linux.oracle.com/errata/ELSA-2024-12815.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/", }, { category: "external", summary: "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", url: "https://ubuntu.com/security/notices/USN-7123-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12851 vom 2024-12-05", url: "http://linux.oracle.com/errata/ELSA-2024-12851.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", url: "https://ubuntu.com/security/notices/USN-7144-1", }, { category: "external", summary: "ORACLE OVMSA-2024-0016 vom 2024-12-10", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2024-December/001104.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", url: "https://ubuntu.com/security/notices/USN-7155-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", url: "https://ubuntu.com/security/notices/USN-7156-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", url: "https://ubuntu.com/security/notices/USN-7154-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html", }, { category: "external", summary: "Debian Security Advisory DLA-4008 vom 2025-01-03", url: "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", url: "https://ubuntu.com/security/notices/USN-7154-2", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7196-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7194-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen", tracking: { current_release_date: "2025-01-19T23:00:00.000+00:00", generator: { date: "2025-01-20T09:20:55.822+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2024-1528", initial_release_date: "2024-07-04T22:00:00.000+00:00", revision_history: [ { date: "2024-07-04T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-07-15T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Debian aufgenommen", }, { date: "2024-07-16T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Debian aufgenommen", }, { date: "2024-07-18T22:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-08-06T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-08-07T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Red Hat und Amazon aufgenommen", }, { date: "2024-08-08T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-08-11T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-08-12T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-08-13T22:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE, Amazon und Ubuntu aufgenommen", }, { date: "2024-08-14T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Ubuntu und SUSE aufgenommen", }, { date: "2024-08-15T22:00:00.000+00:00", number: "12", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-08-18T22:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-08-19T22:00:00.000+00:00", number: "14", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-08-21T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Ubuntu und Amazon aufgenommen", }, { date: "2024-08-22T22:00:00.000+00:00", number: "16", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-08-25T22:00:00.000+00:00", number: "17", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-08-26T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-08-28T22:00:00.000+00:00", number: "19", summary: "Neue Updates von Ubuntu und Red Hat aufgenommen", }, { date: "2024-08-29T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-09-02T22:00:00.000+00:00", number: "21", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-09-04T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2024-09-10T22:00:00.000+00:00", number: "23", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-09-11T22:00:00.000+00:00", number: "24", summary: "Neue Updates von Oracle Linux und Ubuntu aufgenommen", }, { date: "2024-09-12T22:00:00.000+00:00", number: "25", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-09-15T22:00:00.000+00:00", number: "26", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-09-22T22:00:00.000+00:00", number: "27", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-09-23T22:00:00.000+00:00", number: "28", summary: "Neue Updates von Ubuntu und SUSE aufgenommen", }, { date: "2024-10-14T22:00:00.000+00:00", number: "29", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-10-15T22:00:00.000+00:00", number: "30", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-10-16T22:00:00.000+00:00", number: "31", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-10-17T22:00:00.000+00:00", number: "32", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-10-27T23:00:00.000+00:00", number: "33", summary: "Neue Updates von Rocky Enterprise Software Foundation aufgenommen", }, { date: "2024-10-29T23:00:00.000+00:00", number: "34", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-10-31T23:00:00.000+00:00", number: "35", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-11-10T23:00:00.000+00:00", number: "36", summary: "Neue Updates von Rocky Enterprise Software Foundation aufgenommen", }, { date: "2024-11-11T23:00:00.000+00:00", number: "37", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-11-12T23:00:00.000+00:00", number: "38", summary: "Neue Updates von Ubuntu und Red Hat aufgenommen", }, { date: "2024-11-13T23:00:00.000+00:00", number: "39", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-11-20T23:00:00.000+00:00", number: "40", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-11-28T23:00:00.000+00:00", number: "41", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-12-05T23:00:00.000+00:00", number: "42", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-12-09T23:00:00.000+00:00", number: "43", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-12-10T23:00:00.000+00:00", number: "44", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2024-12-12T23:00:00.000+00:00", number: "45", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-12-17T23:00:00.000+00:00", number: "46", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2025-01-02T23:00:00.000+00:00", number: "47", summary: "Neue Updates von Debian aufgenommen", }, { date: "2025-01-06T23:00:00.000+00:00", number: "48", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2025-01-08T23:00:00.000+00:00", number: "49", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2025-01-09T23:00:00.000+00:00", number: "50", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2025-01-15T23:00:00.000+00:00", number: "51", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2025-01-19T23:00:00.000+00:00", number: "52", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "52", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { branches: [ { category: "product_version_range", name: "<7.5.0 UP10 IF01", product: { name: "IBM QRadar SIEM <7.5.0 UP10 IF01", product_id: "T038741", }, }, { category: "product_version", name: "7.5.0 UP10 IF01", product: { name: "IBM QRadar SIEM 7.5.0 UP10 IF01", product_id: "T038741-fixed", product_identification_helper: { cpe: "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01", }, }, }, ], category: "product_name", name: "QRadar SIEM", }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Open Source Linux Kernel", product: { name: "Open Source Linux Kernel", product_id: "T030205", product_identification_helper: { cpe: "cpe:/o:linux:linux_kernel:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, { branches: [ { category: "product_version", name: "3", product: { name: "Oracle VM 3", product_id: "T030927", product_identification_helper: { cpe: "cpe:/a:oracle:vm:3", }, }, }, ], category: "product_name", name: "VM", }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "RESF Rocky Linux", product: { name: "RESF Rocky Linux", product_id: "T032255", product_identification_helper: { cpe: "cpe:/o:resf:rocky_linux:-", }, }, }, ], category: "vendor", name: "RESF", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2024-39472", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39472", }, { cve: "CVE-2024-39473", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39473", }, { cve: "CVE-2024-39474", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39474", }, { cve: "CVE-2024-39475", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39475", }, { cve: "CVE-2024-39476", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39476", }, { cve: "CVE-2024-39477", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39477", }, { cve: "CVE-2024-39478", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39478", }, { cve: "CVE-2024-39479", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39479", }, { cve: "CVE-2024-39480", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39480", }, { cve: "CVE-2024-39481", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39481", }, { cve: "CVE-2024-39482", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39482", }, { cve: "CVE-2024-39483", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39483", }, { cve: "CVE-2024-39484", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39484", }, { cve: "CVE-2024-39485", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie Crypto, bcache oder md/raid5, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einem Pufferüberlauf oder einer NULL- Pointer-Dereferenz und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T030205", "398363", "T004914", "T030927", "T032255", "T038741", ], }, release_date: "2024-07-04T22:00:00.000+00:00", title: "CVE-2024-39485", }, ], }
ghsa-pqcx-8276-jv6c
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
mm/hugetlb: do not call vma_add_reservation upon ENOMEM
sysbot reported a splat [1] on __unmap_hugepage_range(). This is because vma_needs_reservation() can return -ENOMEM if allocate_file_region_entries() fails to allocate the file_region struct for the reservation.
Check for that and do not call vma_add_reservation() if that is the case, otherwise region_abort() and region_del() will see that we do not have any file_regions.
If we detect that vma_needs_reservation() returned -ENOMEM, we clear the hugetlb_restore_reserve flag as if this reservation was still consumed, so free_huge_folio() will not increment the resv count.
[1] https://lore.kernel.org/linux-mm/0000000000004096100617c58d54@google.com/T/#ma5983bc1ab18a54910da83416b3f89f3c7ee43aa
{ affected: [], aliases: [ "CVE-2024-39477", ], database_specific: { cwe_ids: [ "CWE-770", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2024-07-05T07:15:10Z", severity: "MODERATE", }, details: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: do not call vma_add_reservation upon ENOMEM\n\nsysbot reported a splat [1] on __unmap_hugepage_range(). This is because\nvma_needs_reservation() can return -ENOMEM if\nallocate_file_region_entries() fails to allocate the file_region struct\nfor the reservation.\n\nCheck for that and do not call vma_add_reservation() if that is the case,\notherwise region_abort() and region_del() will see that we do not have any\nfile_regions.\n\nIf we detect that vma_needs_reservation() returned -ENOMEM, we clear the\nhugetlb_restore_reserve flag as if this reservation was still consumed, so\nfree_huge_folio() will not increment the resv count.\n\n[1] https://lore.kernel.org/linux-mm/0000000000004096100617c58d54@google.com/T/#ma5983bc1ab18a54910da83416b3f89f3c7ee43aa", id: "GHSA-pqcx-8276-jv6c", modified: "2024-07-08T18:31:16Z", published: "2024-07-05T09:33:44Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-39477", }, { type: "WEB", url: "https://git.kernel.org/stable/c/8daf9c702ee7f825f0de8600abff764acfedea13", }, { type: "WEB", url: "https://git.kernel.org/stable/c/aa998f9dcb34c28448f86e8f5490f20d5eb0eac7", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.