Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-56581 (GCVE-0-2024-56581)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
► | Linux | Linux |
Version: fd708b81d972a0714b02a60eb4792fdbf15868c4 Version: fd708b81d972a0714b02a60eb4792fdbf15868c4 Version: fd708b81d972a0714b02a60eb4792fdbf15868c4 Version: fd708b81d972a0714b02a60eb4792fdbf15868c4 Version: fd708b81d972a0714b02a60eb4792fdbf15868c4 Version: fd708b81d972a0714b02a60eb4792fdbf15868c4 Version: fd708b81d972a0714b02a60eb4792fdbf15868c4 |
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-56581", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-11T15:42:39.280771Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-11T15:45:24.590Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/btrfs/ref-verify.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "dfb9fe7de61f34cc241ab3900bdde93341096e0e", "status": "affected", "version": "fd708b81d972a0714b02a60eb4792fdbf15868c4", "versionType": "git" }, { "lessThan": "6fd018aa168e472ce35be32296d109db6adb87ea", "status": "affected", "version": "fd708b81d972a0714b02a60eb4792fdbf15868c4", "versionType": "git" }, { "lessThan": "d2b85ce0561fde894e28fa01bd5d32820d585006", "status": "affected", "version": "fd708b81d972a0714b02a60eb4792fdbf15868c4", "versionType": "git" }, { "lessThan": "6370db28af9a8ae3bbdfe97f8a48f8f995e144cf", "status": "affected", "version": "fd708b81d972a0714b02a60eb4792fdbf15868c4", "versionType": "git" }, { "lessThan": "4275ac2741941c9c7c2293619fdbacb9f70ba85b", "status": "affected", "version": "fd708b81d972a0714b02a60eb4792fdbf15868c4", "versionType": "git" }, { "lessThan": "a6f9e7a0bf1185c9070c0de03bb85eafb9abd650", "status": "affected", "version": "fd708b81d972a0714b02a60eb4792fdbf15868c4", "versionType": "git" }, { "lessThan": "7c4e39f9d2af4abaf82ca0e315d1fd340456620f", "status": "affected", "version": "fd708b81d972a0714b02a60eb4792fdbf15868c4", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/btrfs/ref-verify.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.15" }, { "lessThan": "4.15", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.287", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.231", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.174", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.120", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.64", "versionType": "semver" }, { "lessThanOrEqual": "6.12.*", "status": "unaffected", "version": "6.12.4", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.13", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.4.287", "versionStartIncluding": "4.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.10.231", "versionStartIncluding": "4.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.174", "versionStartIncluding": "4.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.120", "versionStartIncluding": "4.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6.64", "versionStartIncluding": "4.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.4", "versionStartIncluding": "4.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.13", "versionStartIncluding": "4.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: ref-verify: fix use-after-free after invalid ref action\n\nAt btrfs_ref_tree_mod() after we successfully inserted the new ref entry\n(local variable \u0027ref\u0027) into the respective block entry\u0027s rbtree (local\nvariable \u0027be\u0027), if we find an unexpected action of BTRFS_DROP_DELAYED_REF,\nwe error out and free the ref entry without removing it from the block\nentry\u0027s rbtree. Then in the error path of btrfs_ref_tree_mod() we call\nbtrfs_free_ref_cache(), which iterates over all block entries and then\ncalls free_block_entry() for each one, and there we will trigger a\nuse-after-free when we are called against the block entry to which we\nadded the freed ref entry to its rbtree, since the rbtree still points\nto the block entry, as we didn\u0027t remove it from the rbtree before freeing\nit in the error path at btrfs_ref_tree_mod(). Fix this by removing the\nnew ref entry from the rbtree before freeing it.\n\nSyzbot report this with the following stack traces:\n\n BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615\n __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523\n update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\n btrfs_insert_empty_items+0x9c/0x1a0 fs/btrfs/ctree.c:4314\n btrfs_insert_empty_item fs/btrfs/ctree.h:669 [inline]\n btrfs_insert_orphan_item+0x1f1/0x320 fs/btrfs/orphan.c:23\n btrfs_orphan_add+0x6d/0x1a0 fs/btrfs/inode.c:3482\n btrfs_unlink+0x267/0x350 fs/btrfs/inode.c:4293\n vfs_unlink+0x365/0x650 fs/namei.c:4469\n do_unlinkat+0x4ae/0x830 fs/namei.c:4533\n __do_sys_unlinkat fs/namei.c:4576 [inline]\n __se_sys_unlinkat fs/namei.c:4569 [inline]\n __x64_sys_unlinkat+0xcc/0xf0 fs/namei.c:4569\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n BTRFS error (device loop0 state EA): Ref action 1, root 5, ref_root 5, parent 0, owner 260, offset 0, num_refs 1\n __btrfs_mod_ref+0x76b/0xac0 fs/btrfs/extent-tree.c:2521\n update_ref_for_cow+0x96a/0x11f0\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\n btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411\n __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030\n btrfs_update_delayed_inode fs/btrfs/delayed-inode.c:1114 [inline]\n __btrfs_commit_inode_delayed_items+0x2318/0x24a0 fs/btrfs/delayed-inode.c:1137\n __btrfs_run_delayed_items+0x213/0x490 fs/btrfs/delayed-inode.c:1171\n btrfs_commit_transaction+0x8a8/0x3740 fs/btrfs/transaction.c:2313\n prepare_to_relocate+0x3c4/0x4c0 fs/btrfs/relocation.c:3586\n relocate_block_group+0x16c/0xd40 fs/btrfs/relocation.c:3611\n btrfs_relocate_block_group+0x77d/0xd90 fs/btrfs/relocation.c:4081\n btrfs_relocate_chunk+0x12c/0x3b0 fs/btrfs/volumes.c:3377\n __btrfs_balance+0x1b0f/0x26b0 fs/btrfs/volumes.c:4161\n btrfs_balance+0xbdc/0x10c0 fs/btrfs/volumes.c:4538\n BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615\n __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523\n update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\n btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411\n __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030\n btrfs_update_delayed_i\n---truncated---" } ], "providerMetadata": { "dateUpdated": "2025-05-04T09:58:58.116Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/dfb9fe7de61f34cc241ab3900bdde93341096e0e" }, { "url": "https://git.kernel.org/stable/c/6fd018aa168e472ce35be32296d109db6adb87ea" }, { "url": "https://git.kernel.org/stable/c/d2b85ce0561fde894e28fa01bd5d32820d585006" }, { "url": "https://git.kernel.org/stable/c/6370db28af9a8ae3bbdfe97f8a48f8f995e144cf" }, { "url": "https://git.kernel.org/stable/c/4275ac2741941c9c7c2293619fdbacb9f70ba85b" }, { "url": "https://git.kernel.org/stable/c/a6f9e7a0bf1185c9070c0de03bb85eafb9abd650" }, { "url": "https://git.kernel.org/stable/c/7c4e39f9d2af4abaf82ca0e315d1fd340456620f" } ], "title": "btrfs: ref-verify: fix use-after-free after invalid ref action", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-56581", "datePublished": "2024-12-27T14:23:23.193Z", "dateReserved": "2024-12-27T14:03:06.000Z", "dateUpdated": "2025-05-04T09:58:58.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-56581\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-12-27T15:15:17.207\",\"lastModified\":\"2025-02-11T16:15:43.770\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbtrfs: ref-verify: fix use-after-free after invalid ref action\\n\\nAt btrfs_ref_tree_mod() after we successfully inserted the new ref entry\\n(local variable \u0027ref\u0027) into the respective block entry\u0027s rbtree (local\\nvariable \u0027be\u0027), if we find an unexpected action of BTRFS_DROP_DELAYED_REF,\\nwe error out and free the ref entry without removing it from the block\\nentry\u0027s rbtree. Then in the error path of btrfs_ref_tree_mod() we call\\nbtrfs_free_ref_cache(), which iterates over all block entries and then\\ncalls free_block_entry() for each one, and there we will trigger a\\nuse-after-free when we are called against the block entry to which we\\nadded the freed ref entry to its rbtree, since the rbtree still points\\nto the block entry, as we didn\u0027t remove it from the rbtree before freeing\\nit in the error path at btrfs_ref_tree_mod(). Fix this by removing the\\nnew ref entry from the rbtree before freeing it.\\n\\nSyzbot report this with the following stack traces:\\n\\n BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615\\n __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523\\n update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512\\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\\n btrfs_insert_empty_items+0x9c/0x1a0 fs/btrfs/ctree.c:4314\\n btrfs_insert_empty_item fs/btrfs/ctree.h:669 [inline]\\n btrfs_insert_orphan_item+0x1f1/0x320 fs/btrfs/orphan.c:23\\n btrfs_orphan_add+0x6d/0x1a0 fs/btrfs/inode.c:3482\\n btrfs_unlink+0x267/0x350 fs/btrfs/inode.c:4293\\n vfs_unlink+0x365/0x650 fs/namei.c:4469\\n do_unlinkat+0x4ae/0x830 fs/namei.c:4533\\n __do_sys_unlinkat fs/namei.c:4576 [inline]\\n __se_sys_unlinkat fs/namei.c:4569 [inline]\\n __x64_sys_unlinkat+0xcc/0xf0 fs/namei.c:4569\\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\\n BTRFS error (device loop0 state EA): Ref action 1, root 5, ref_root 5, parent 0, owner 260, offset 0, num_refs 1\\n __btrfs_mod_ref+0x76b/0xac0 fs/btrfs/extent-tree.c:2521\\n update_ref_for_cow+0x96a/0x11f0\\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\\n btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411\\n __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030\\n btrfs_update_delayed_inode fs/btrfs/delayed-inode.c:1114 [inline]\\n __btrfs_commit_inode_delayed_items+0x2318/0x24a0 fs/btrfs/delayed-inode.c:1137\\n __btrfs_run_delayed_items+0x213/0x490 fs/btrfs/delayed-inode.c:1171\\n btrfs_commit_transaction+0x8a8/0x3740 fs/btrfs/transaction.c:2313\\n prepare_to_relocate+0x3c4/0x4c0 fs/btrfs/relocation.c:3586\\n relocate_block_group+0x16c/0xd40 fs/btrfs/relocation.c:3611\\n btrfs_relocate_block_group+0x77d/0xd90 fs/btrfs/relocation.c:4081\\n btrfs_relocate_chunk+0x12c/0x3b0 fs/btrfs/volumes.c:3377\\n __btrfs_balance+0x1b0f/0x26b0 fs/btrfs/volumes.c:4161\\n btrfs_balance+0xbdc/0x10c0 fs/btrfs/volumes.c:4538\\n BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615\\n __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523\\n update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512\\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\\n btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411\\n __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030\\n btrfs_update_delayed_i\\n---truncated---\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: ref-verify: corrige use-after-free despu\u00e9s de una acci\u00f3n de referencia no v\u00e1lida En btrfs_ref_tree_mod() despu\u00e9s de que insertamos exitosamente la nueva entrada de referencia (variable local \u0027ref\u0027) en el rbtree de la entrada de bloque respectiva (variable local \u0027be\u0027), si encontramos una acci\u00f3n inesperada de BTRFS_DROP_DELAYED_REF, generamos un error y liberamos la entrada de referencia sin eliminarla del rbtree de la entrada de bloque. Luego, en la ruta de error de btrfs_ref_tree_mod(), llamamos a btrfs_free_ref_cache(), que itera sobre todas las entradas de bloque y luego llama a free_block_entry() para cada una, y all\u00ed activaremos un use-after-free cuando se nos llame contra la entrada de bloque a la que agregamos la entrada de referencia liberada a su rbtree, ya que el rbtree todav\u00eda apunta a la entrada de bloque, ya que no la eliminamos del rbtree antes de liberarla en la ruta de error en btrfs_ref_tree_mod(). Solucione esto eliminando la nueva entrada de referencia del rbtree antes de liberarla. Syzbot informa esto con los siguientes seguimientos de pila: Error BTRFS (estado EA del bucle0 del dispositivo): Ref acci\u00f3n 2, ra\u00edz 5, ref_root 0, padre 8564736, propietario 0, desplazamiento 0, num_refs 18446744073709551615 __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523 update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512 btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594 btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754 btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116 btrfs_insert_empty_items+0x9c/0x1a0 fs/btrfs/ctree.c:4314 btrfs_insert_empty_item fs/btrfs/ctree.h:669 [en l\u00ednea] btrfs_insert_orphan_item+0x1f1/0x320 fs/btrfs/orphan.c:23 btrfs_orphan_add+0x6d/0x1a0 fs/btrfs/inode.c:3482 btrfs_unlink+0x267/0x350 fs/btrfs/inode.c:4293 vfs_unlink+0x365/0x650 fs/namei.c:4469 do_unlinkat+0x4ae/0x830 fs/namei.c:4533 __do_sys_unlinkat fs/namei.c:4576 [en l\u00ednea] __se_sys_unlinkat fs/namei.c:4569 [en l\u00ednea] __x64_sys_unlinkat+0xcc/0xf0 fs/namei.c:4569 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Error BTRFS (estado del dispositivo loop0 EA): Ref acci\u00f3n 1, ra\u00edz 5, ref_root 5, padre 0, propietario 260, desplazamiento 0, n\u00fam_refs 1 __btrfs_mod_ref+0x76b/0xac0 fs/btrfs/extent-tree.c:2521 actualizaci\u00f3n_ref_para_vaca+0x96a/0x11f0 btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594 btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754 btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116 btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411 __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030 btrfs_update_delayed_inode fs/btrfs/delayed-inode.c:1114 [en l\u00ednea] __btrfs_commit_inode_delayed_items+0x2318/0x24a0 fs/btrfs/delayed-inode.c:1137 __btrfs_run_delayed_items+0x213/0x490 fs/btrfs/delayed-inode.c:1171 btrfs_commit_transaction+0x8a8/0x3740 fs/btrfs/transaction.c:2313 prepare_to_relocate+0x3c4/0x4c0 fs/btrfs/relocation.c:3586 relocate_block_group+0x16c/0xd40 fs/btrfs/relocation.c:3611 btrfs_relocate_block_group+0x77d/0xd90 fs/btrfs/relocation.c:4081 btrfs_relocate_chunk+0x12c/0x3b0 fs/btrfs/volumes.c:3377 __btrfs_balance+0x1b0f/0x26b0 fs/btrfs/volumes.c:4161 btrfs_balance+0xbdc/0x10c0 fs/btrfs/volumes.c:4538 Error BTRFS (estado del dispositivo loop0 EA): Acci\u00f3n de referencia 2, ra\u00edz 5, ref_root 0, padre 8564736, propietario 0, desplazamiento 0, num_refs 18446744073709551615 __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523 actualizaci\u00f3n_ref_para_vaca+0x9cd/0x11f0 fs/btrfs/ctree.c:512 btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594 btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754 btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116 btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411 __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030 btrfs_update_delayed_i ---truncado---\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"5.4.287\",\"matchCriteriaId\":\"3B88B3CC-D264-4F47-A543-C7C84926AE08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.231\",\"matchCriteriaId\":\"B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.174\",\"matchCriteriaId\":\"419FD073-1517-4FD5-8158-F94BC68A1E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.120\",\"matchCriteriaId\":\"09AC6122-E2A4-40FE-9D33-268A1B2EC265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.64\",\"matchCriteriaId\":\"CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.12.4\",\"matchCriteriaId\":\"04756810-D093-4B43-B1D9-CF5035968061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62567B3C-6CEE-46D0-BC2E-B3717FBF7D13\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/4275ac2741941c9c7c2293619fdbacb9f70ba85b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6370db28af9a8ae3bbdfe97f8a48f8f995e144cf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6fd018aa168e472ce35be32296d109db6adb87ea\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7c4e39f9d2af4abaf82ca0e315d1fd340456620f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a6f9e7a0bf1185c9070c0de03bb85eafb9abd650\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d2b85ce0561fde894e28fa01bd5d32820d585006\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/dfb9fe7de61f34cc241ab3900bdde93341096e0e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-56581\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-11T15:42:39.280771Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-11T15:42:40.932Z\"}}], \"cna\": {\"title\": \"btrfs: ref-verify: fix use-after-free after invalid ref action\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"fd708b81d972a0714b02a60eb4792fdbf15868c4\", \"lessThan\": \"dfb9fe7de61f34cc241ab3900bdde93341096e0e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fd708b81d972a0714b02a60eb4792fdbf15868c4\", \"lessThan\": \"6fd018aa168e472ce35be32296d109db6adb87ea\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fd708b81d972a0714b02a60eb4792fdbf15868c4\", \"lessThan\": \"d2b85ce0561fde894e28fa01bd5d32820d585006\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fd708b81d972a0714b02a60eb4792fdbf15868c4\", \"lessThan\": \"6370db28af9a8ae3bbdfe97f8a48f8f995e144cf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fd708b81d972a0714b02a60eb4792fdbf15868c4\", \"lessThan\": \"4275ac2741941c9c7c2293619fdbacb9f70ba85b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fd708b81d972a0714b02a60eb4792fdbf15868c4\", \"lessThan\": \"a6f9e7a0bf1185c9070c0de03bb85eafb9abd650\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fd708b81d972a0714b02a60eb4792fdbf15868c4\", \"lessThan\": \"7c4e39f9d2af4abaf82ca0e315d1fd340456620f\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/btrfs/ref-verify.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.15\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.15\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.4.287\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.231\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.174\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.120\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.64\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.12.*\"}, {\"status\": \"unaffected\", \"version\": \"6.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/btrfs/ref-verify.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/dfb9fe7de61f34cc241ab3900bdde93341096e0e\"}, {\"url\": \"https://git.kernel.org/stable/c/6fd018aa168e472ce35be32296d109db6adb87ea\"}, {\"url\": \"https://git.kernel.org/stable/c/d2b85ce0561fde894e28fa01bd5d32820d585006\"}, {\"url\": \"https://git.kernel.org/stable/c/6370db28af9a8ae3bbdfe97f8a48f8f995e144cf\"}, {\"url\": \"https://git.kernel.org/stable/c/4275ac2741941c9c7c2293619fdbacb9f70ba85b\"}, {\"url\": \"https://git.kernel.org/stable/c/a6f9e7a0bf1185c9070c0de03bb85eafb9abd650\"}, {\"url\": \"https://git.kernel.org/stable/c/7c4e39f9d2af4abaf82ca0e315d1fd340456620f\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbtrfs: ref-verify: fix use-after-free after invalid ref action\\n\\nAt btrfs_ref_tree_mod() after we successfully inserted the new ref entry\\n(local variable \u0027ref\u0027) into the respective block entry\u0027s rbtree (local\\nvariable \u0027be\u0027), if we find an unexpected action of BTRFS_DROP_DELAYED_REF,\\nwe error out and free the ref entry without removing it from the block\\nentry\u0027s rbtree. Then in the error path of btrfs_ref_tree_mod() we call\\nbtrfs_free_ref_cache(), which iterates over all block entries and then\\ncalls free_block_entry() for each one, and there we will trigger a\\nuse-after-free when we are called against the block entry to which we\\nadded the freed ref entry to its rbtree, since the rbtree still points\\nto the block entry, as we didn\u0027t remove it from the rbtree before freeing\\nit in the error path at btrfs_ref_tree_mod(). Fix this by removing the\\nnew ref entry from the rbtree before freeing it.\\n\\nSyzbot report this with the following stack traces:\\n\\n BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615\\n __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523\\n update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512\\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\\n btrfs_insert_empty_items+0x9c/0x1a0 fs/btrfs/ctree.c:4314\\n btrfs_insert_empty_item fs/btrfs/ctree.h:669 [inline]\\n btrfs_insert_orphan_item+0x1f1/0x320 fs/btrfs/orphan.c:23\\n btrfs_orphan_add+0x6d/0x1a0 fs/btrfs/inode.c:3482\\n btrfs_unlink+0x267/0x350 fs/btrfs/inode.c:4293\\n vfs_unlink+0x365/0x650 fs/namei.c:4469\\n do_unlinkat+0x4ae/0x830 fs/namei.c:4533\\n __do_sys_unlinkat fs/namei.c:4576 [inline]\\n __se_sys_unlinkat fs/namei.c:4569 [inline]\\n __x64_sys_unlinkat+0xcc/0xf0 fs/namei.c:4569\\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\\n BTRFS error (device loop0 state EA): Ref action 1, root 5, ref_root 5, parent 0, owner 260, offset 0, num_refs 1\\n __btrfs_mod_ref+0x76b/0xac0 fs/btrfs/extent-tree.c:2521\\n update_ref_for_cow+0x96a/0x11f0\\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\\n btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411\\n __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030\\n btrfs_update_delayed_inode fs/btrfs/delayed-inode.c:1114 [inline]\\n __btrfs_commit_inode_delayed_items+0x2318/0x24a0 fs/btrfs/delayed-inode.c:1137\\n __btrfs_run_delayed_items+0x213/0x490 fs/btrfs/delayed-inode.c:1171\\n btrfs_commit_transaction+0x8a8/0x3740 fs/btrfs/transaction.c:2313\\n prepare_to_relocate+0x3c4/0x4c0 fs/btrfs/relocation.c:3586\\n relocate_block_group+0x16c/0xd40 fs/btrfs/relocation.c:3611\\n btrfs_relocate_block_group+0x77d/0xd90 fs/btrfs/relocation.c:4081\\n btrfs_relocate_chunk+0x12c/0x3b0 fs/btrfs/volumes.c:3377\\n __btrfs_balance+0x1b0f/0x26b0 fs/btrfs/volumes.c:4161\\n btrfs_balance+0xbdc/0x10c0 fs/btrfs/volumes.c:4538\\n BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615\\n __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523\\n update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512\\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\\n btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411\\n __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030\\n btrfs_update_delayed_i\\n---truncated---\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.287\", \"versionStartIncluding\": \"4.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.231\", \"versionStartIncluding\": \"4.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.174\", \"versionStartIncluding\": \"4.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.120\", \"versionStartIncluding\": \"4.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.64\", \"versionStartIncluding\": \"4.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.12.4\", \"versionStartIncluding\": \"4.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.13\", \"versionStartIncluding\": \"4.15\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:58:58.116Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-56581\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:58:58.116Z\", \"dateReserved\": \"2024-12-27T14:03:06.000Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-12-27T14:23:23.193Z\", \"assignerShortName\": \"Linux\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
fkie_cve-2024-56581
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▶ | URL | Tags | |
---|---|---|---|
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/4275ac2741941c9c7c2293619fdbacb9f70ba85b | Patch | |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/6370db28af9a8ae3bbdfe97f8a48f8f995e144cf | Patch | |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/6fd018aa168e472ce35be32296d109db6adb87ea | Patch | |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/7c4e39f9d2af4abaf82ca0e315d1fd340456620f | Patch | |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/a6f9e7a0bf1185c9070c0de03bb85eafb9abd650 | Patch | |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d2b85ce0561fde894e28fa01bd5d32820d585006 | Patch | |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/dfb9fe7de61f34cc241ab3900bdde93341096e0e | Patch |
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | 6.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B88B3CC-D264-4F47-A543-C7C84926AE08", "versionEndExcluding": "5.4.287", "versionStartIncluding": "4.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935", "versionEndExcluding": "5.10.231", "versionStartIncluding": "5.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89", "versionEndExcluding": "5.15.174", "versionStartIncluding": "5.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265", "versionEndExcluding": "6.1.120", "versionStartIncluding": "5.16", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7", "versionEndExcluding": "6.6.64", "versionStartIncluding": "6.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "04756810-D093-4B43-B1D9-CF5035968061", "versionEndExcluding": "6.12.4", "versionStartIncluding": "6.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: ref-verify: fix use-after-free after invalid ref action\n\nAt btrfs_ref_tree_mod() after we successfully inserted the new ref entry\n(local variable \u0027ref\u0027) into the respective block entry\u0027s rbtree (local\nvariable \u0027be\u0027), if we find an unexpected action of BTRFS_DROP_DELAYED_REF,\nwe error out and free the ref entry without removing it from the block\nentry\u0027s rbtree. Then in the error path of btrfs_ref_tree_mod() we call\nbtrfs_free_ref_cache(), which iterates over all block entries and then\ncalls free_block_entry() for each one, and there we will trigger a\nuse-after-free when we are called against the block entry to which we\nadded the freed ref entry to its rbtree, since the rbtree still points\nto the block entry, as we didn\u0027t remove it from the rbtree before freeing\nit in the error path at btrfs_ref_tree_mod(). Fix this by removing the\nnew ref entry from the rbtree before freeing it.\n\nSyzbot report this with the following stack traces:\n\n BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615\n __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523\n update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\n btrfs_insert_empty_items+0x9c/0x1a0 fs/btrfs/ctree.c:4314\n btrfs_insert_empty_item fs/btrfs/ctree.h:669 [inline]\n btrfs_insert_orphan_item+0x1f1/0x320 fs/btrfs/orphan.c:23\n btrfs_orphan_add+0x6d/0x1a0 fs/btrfs/inode.c:3482\n btrfs_unlink+0x267/0x350 fs/btrfs/inode.c:4293\n vfs_unlink+0x365/0x650 fs/namei.c:4469\n do_unlinkat+0x4ae/0x830 fs/namei.c:4533\n __do_sys_unlinkat fs/namei.c:4576 [inline]\n __se_sys_unlinkat fs/namei.c:4569 [inline]\n __x64_sys_unlinkat+0xcc/0xf0 fs/namei.c:4569\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n BTRFS error (device loop0 state EA): Ref action 1, root 5, ref_root 5, parent 0, owner 260, offset 0, num_refs 1\n __btrfs_mod_ref+0x76b/0xac0 fs/btrfs/extent-tree.c:2521\n update_ref_for_cow+0x96a/0x11f0\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\n btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411\n __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030\n btrfs_update_delayed_inode fs/btrfs/delayed-inode.c:1114 [inline]\n __btrfs_commit_inode_delayed_items+0x2318/0x24a0 fs/btrfs/delayed-inode.c:1137\n __btrfs_run_delayed_items+0x213/0x490 fs/btrfs/delayed-inode.c:1171\n btrfs_commit_transaction+0x8a8/0x3740 fs/btrfs/transaction.c:2313\n prepare_to_relocate+0x3c4/0x4c0 fs/btrfs/relocation.c:3586\n relocate_block_group+0x16c/0xd40 fs/btrfs/relocation.c:3611\n btrfs_relocate_block_group+0x77d/0xd90 fs/btrfs/relocation.c:4081\n btrfs_relocate_chunk+0x12c/0x3b0 fs/btrfs/volumes.c:3377\n __btrfs_balance+0x1b0f/0x26b0 fs/btrfs/volumes.c:4161\n btrfs_balance+0xbdc/0x10c0 fs/btrfs/volumes.c:4538\n BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615\n __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523\n update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\n btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411\n __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030\n btrfs_update_delayed_i\n---truncated---" }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: ref-verify: corrige use-after-free despu\u00e9s de una acci\u00f3n de referencia no v\u00e1lida En btrfs_ref_tree_mod() despu\u00e9s de que insertamos exitosamente la nueva entrada de referencia (variable local \u0027ref\u0027) en el rbtree de la entrada de bloque respectiva (variable local \u0027be\u0027), si encontramos una acci\u00f3n inesperada de BTRFS_DROP_DELAYED_REF, generamos un error y liberamos la entrada de referencia sin eliminarla del rbtree de la entrada de bloque. Luego, en la ruta de error de btrfs_ref_tree_mod(), llamamos a btrfs_free_ref_cache(), que itera sobre todas las entradas de bloque y luego llama a free_block_entry() para cada una, y all\u00ed activaremos un use-after-free cuando se nos llame contra la entrada de bloque a la que agregamos la entrada de referencia liberada a su rbtree, ya que el rbtree todav\u00eda apunta a la entrada de bloque, ya que no la eliminamos del rbtree antes de liberarla en la ruta de error en btrfs_ref_tree_mod(). Solucione esto eliminando la nueva entrada de referencia del rbtree antes de liberarla. Syzbot informa esto con los siguientes seguimientos de pila: Error BTRFS (estado EA del bucle0 del dispositivo): Ref acci\u00f3n 2, ra\u00edz 5, ref_root 0, padre 8564736, propietario 0, desplazamiento 0, num_refs 18446744073709551615 __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523 update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512 btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594 btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754 btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116 btrfs_insert_empty_items+0x9c/0x1a0 fs/btrfs/ctree.c:4314 btrfs_insert_empty_item fs/btrfs/ctree.h:669 [en l\u00ednea] btrfs_insert_orphan_item+0x1f1/0x320 fs/btrfs/orphan.c:23 btrfs_orphan_add+0x6d/0x1a0 fs/btrfs/inode.c:3482 btrfs_unlink+0x267/0x350 fs/btrfs/inode.c:4293 vfs_unlink+0x365/0x650 fs/namei.c:4469 do_unlinkat+0x4ae/0x830 fs/namei.c:4533 __do_sys_unlinkat fs/namei.c:4576 [en l\u00ednea] __se_sys_unlinkat fs/namei.c:4569 [en l\u00ednea] __x64_sys_unlinkat+0xcc/0xf0 fs/namei.c:4569 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Error BTRFS (estado del dispositivo loop0 EA): Ref acci\u00f3n 1, ra\u00edz 5, ref_root 5, padre 0, propietario 260, desplazamiento 0, n\u00fam_refs 1 __btrfs_mod_ref+0x76b/0xac0 fs/btrfs/extent-tree.c:2521 actualizaci\u00f3n_ref_para_vaca+0x96a/0x11f0 btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594 btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754 btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116 btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411 __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030 btrfs_update_delayed_inode fs/btrfs/delayed-inode.c:1114 [en l\u00ednea] __btrfs_commit_inode_delayed_items+0x2318/0x24a0 fs/btrfs/delayed-inode.c:1137 __btrfs_run_delayed_items+0x213/0x490 fs/btrfs/delayed-inode.c:1171 btrfs_commit_transaction+0x8a8/0x3740 fs/btrfs/transaction.c:2313 prepare_to_relocate+0x3c4/0x4c0 fs/btrfs/relocation.c:3586 relocate_block_group+0x16c/0xd40 fs/btrfs/relocation.c:3611 btrfs_relocate_block_group+0x77d/0xd90 fs/btrfs/relocation.c:4081 btrfs_relocate_chunk+0x12c/0x3b0 fs/btrfs/volumes.c:3377 __btrfs_balance+0x1b0f/0x26b0 fs/btrfs/volumes.c:4161 btrfs_balance+0xbdc/0x10c0 fs/btrfs/volumes.c:4538 Error BTRFS (estado del dispositivo loop0 EA): Acci\u00f3n de referencia 2, ra\u00edz 5, ref_root 0, padre 8564736, propietario 0, desplazamiento 0, num_refs 18446744073709551615 __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523 actualizaci\u00f3n_ref_para_vaca+0x9cd/0x11f0 fs/btrfs/ctree.c:512 btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594 btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754 btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116 btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411 __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030 btrfs_update_delayed_i ---truncado---" } ], "id": "CVE-2024-56581", "lastModified": "2025-02-11T16:15:43.770", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-12-27T15:15:17.207", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/4275ac2741941c9c7c2293619fdbacb9f70ba85b" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/6370db28af9a8ae3bbdfe97f8a48f8f995e144cf" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/6fd018aa168e472ce35be32296d109db6adb87ea" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/7c4e39f9d2af4abaf82ca0e315d1fd340456620f" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/a6f9e7a0bf1185c9070c0de03bb85eafb9abd650" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/d2b85ce0561fde894e28fa01bd5d32820d585006" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/dfb9fe7de61f34cc241ab3900bdde93341096e0e" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
ssa-355557
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SINEC OS before V3.2 contains third-party components with multiple vulnerabilities.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-355557.html" }, { "category": "self", "summary": "SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-355557.json" } ], "title": "SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2", "tracking": { "current_release_date": "2025-08-12T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-355557", "initial_release_date": "2025-08-12T00:00:00Z", "revision_history": [ { "date": "2025-08-12T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.2", "product": { "name": "RUGGEDCOM RST2428P (6GK6242-6PA00)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6GK6242-6PA00" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RST2428P (6GK6242-6PA00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.2", "product": { "name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family", "product_id": "2" } } ], "category": "product_name", "name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.2", "product": { "name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family", "product_id": "3" } } ], "category": "product_name", "name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-47316", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfsd: NULL dereference in nfs3svc_encode_getaclres.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2021-47316" }, { "cve": "CVE-2022-48666", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "scsi: core: use-after-free vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2022-48666" }, { "cve": "CVE-2022-48827", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "NFSD: vulnerability caused by loff_t overflow on the server when a client reads near the maximum offset, causing the server to return an EINVAL error, which the client retries indefinitely, instead of handling out-of-range READ requests by returning a short result with an EOF flag.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2022-48827" }, { "cve": "CVE-2022-48828", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NFSD: Vulnerability caused by an underflow in ia_size due to a mismatch between signed and unsigned 64-bit file size values, which can cause issues when handling large file sizes from NFS clients.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2022-48828" }, { "cve": "CVE-2022-48829", "cwe": { "id": "CWE-253", "name": "Incorrect Check of Function Return Value" }, "notes": [ { "category": "summary", "text": "NFSD: Vulnerability handling large file sizes for NFSv3 improperly capping client size values larger than s64_max, leading to unexpected behavior and potential data corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2022-48829" }, { "cve": "CVE-2022-49034", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sh: cpuinfo: warning for CONFIG_CPUMASK_OFFSTACK. When CONFIG_CPUMASK_OFFSTACK and CONFIG_DEBUG_PER_CPU_MAPS are selected, cpu_max_bits_warn() generates a runtime warning when showing /proc/cpuinfo.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2022-49034" }, { "cve": "CVE-2023-52887", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: can: j1939: vulnerability related to error handling for closely received RTS messages in xtp_rx_rts_session_new, which is addressed by replacing less informative backtraces with a new method that provides clearer error messages and allows for early termination of problematic sessions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52887" }, { "cve": "CVE-2023-52917", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir(). The debugfs_create_dir() function returns error pointers. It never returns NULL. So use IS_ERR() to check it.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52917" }, { "cve": "CVE-2024-9681", "cwe": { "id": "CWE-697", "name": "Incorrect Comparison" }, "notes": [ { "category": "summary", "text": "When curl is asked to use HSTS, the expiry time for a subdomain might\r\noverwrite a parent domain\u0027s cache entry, making it end sooner or later than\r\notherwise intended.\r\n\r\nThis affects curl using applications that enable HSTS and use URLs with the\r\ninsecure `HTTP://` scheme and perform transfers with hosts like\r\n`x.example.com` as well as `example.com` where the first host is a subdomain\r\nof the second host.\r\n\r\n(The HSTS cache either needs to have been populated manually or there needs to\r\nhave been previous HTTPS accesses done as the cache needs to have entries for\r\nthe domains involved to trigger this problem.)\r\n\r\nWhen `x.example.com` responds with `Strict-Transport-Security:` headers, this\r\nbug can make the subdomain\u0027s expiry timeout *bleed over* and get set for the\r\nparent domain `example.com` in curl\u0027s HSTS cache.\r\n\r\nThe result of a triggered bug is that HTTP accesses to `example.com` get\r\nconverted to HTTPS for a different period of time than what was asked for by\r\nthe origin server. If `example.com` for example stops supporting HTTPS at its\r\nexpiry time, curl might then fail to access `http://example.com` until the\r\n(wrongly set) timeout expires. This bug can also expire the parent\u0027s entry\r\n*earlier*, thus making curl inadvertently switch back to insecure HTTP earlier\r\nthan otherwise intended.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-9681" }, { "cve": "CVE-2024-36484", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36484" }, { "cve": "CVE-2024-36894", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36894" }, { "cve": "CVE-2024-36901", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a chance that ip6_dst_idev() returns NULL in ip6_output().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36901" }, { "cve": "CVE-2024-36938", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Denial of Service Vulnerability in the Linux Kernel: bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue Fix NULL pointer data-races in sk_psock_skb_ingress_enqueue() which syzbot reported.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36938" }, { "cve": "CVE-2024-36974", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP. If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev-\u003enum_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36974" }, { "cve": "CVE-2024-36978", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: sched: sch_multiq: possible OOB write in multiq_tune() q-\u003ebands will be assigned to qopt-\u003ebands to execute subsequent code logic after kmalloc. So the old q-\u003ebands should not be used in kmalloc. Otherwise, an out-of-bounds write will occur.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-36978" }, { "cve": "CVE-2024-37078", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: kernel vulnerability due to lack of writeback flag waiting. When the log writer starts a writeback for segment summary blocks or a super root block that use the backing devices page cache, it does not wait for the ongoing folio/page writeback, resulting in an inconsistent writeback state.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-37078" }, { "cve": "CVE-2024-38586", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "r8169: possible ring buffer corruption on fragmented Tx packets. Vulnerability on the RTL8125b when transmitting small fragmented packets, whereby invalid entries were inserted into the transmit ring buffer, subsequently leading to calls to dma_unmap_single() with a null address. This was caused by rtl8169_start_xmit() not noticing changes to nr_frags which may occur when small packets are padded (to work around hardware quirks) in rtl8169_tso_csum_v2().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-38586" }, { "cve": "CVE-2024-38619", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb-storage: alauda: Check whether the media is initialized. The member \"uzonesize\" of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and alauda_write_lba().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-38619" }, { "cve": "CVE-2024-39468", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "smb: client: Deadlock in smb2_find_smb_tcon().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39468" }, { "cve": "CVE-2024-39469", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors The error handling in nilfs_empty_dir() when a directory folio/page read fails is incorrect, as in the old ext2 implementation, and if the folio/page cannot be read or nilfs_check_folio() fails, it will falsely determine the directory as empty and corrupt the file system. In addition, since nilfs_empty_dir() does not immediately return on a failed folio/page read, but continues to loop, this can cause a long loop with I/O if i_size of the directory\u0027s inode is also corrupted, causing the log writer thread to wait and hang, as reported by syzbot. Fix these issues by making nilfs_empty_dir() immediately return a false value (0) if it fails to get a directory folio/page.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39469" }, { "cve": "CVE-2024-39482", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bcache: Variable length array abuse in btree_iter.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39482" }, { "cve": "CVE-2024-39484", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "mmc: davinci: Vulnerability from resource leaks. Using __exit for the remove function results in the remove callback being discarded with CONFIG_MMC_DAVINCI=y. When such a device gets unbound (e.g. using sysfs or hotplug), the driver is just removed without the cleanup being performed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39484" }, { "cve": "CVE-2024-39487", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39487" }, { "cve": "CVE-2024-39495", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "greybus: use-after-free vulnerability in gb_interface_release due to race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39495" }, { "cve": "CVE-2024-39499", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "vmci: speculation leaks by sanitizing event in event_deliver(). event_msg is controlled by user-space, event_msg-\u003eevent_data.event is passed to event_deliver() and used as an index without sanitization, leading to information leaks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39499" }, { "cve": "CVE-2024-39501", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drivers: core: synchronize really_probe() and dev_uevent(). Synchronize the dev-\u003edriver usage in really_probe() and dev_uevent(). These can run in different threads, what can result in the following race condition for dev-\u003edriver uninitialization.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39501" }, { "cve": "CVE-2024-39502", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "ionic: use after netif_napi_del(). When queues are started, netif_napi_add() and napi_enable() are called. If there are 4 queues and only 3 queues are used for the current configuration, only 3 queues\u0027 napi should be registered and enabled. The ionic_qcq_enable() checks whether the .poll pointer is not NULL for enabling only the using queue\u0027 napi. Unused queues\u0027 napi will not be registered by netif_napi_add(), so the .poll pointer indicates NULL. But it couldn\u0027t distinguish whether the napi was unregistered or not because netif_napi_del() doesn\u0027t reset the .poll pointer to NULL. So, ionic_qcq_enable() calls napi_enable() for the queue, which was unregistered by netif_napi_del().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39502" }, { "cve": "CVE-2024-39503", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "netfilter: ipset: race between namespace cleanup and gc in the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39503" }, { "cve": "CVE-2024-39505", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/komeda: check for error-valued pointer. komeda_pipeline_get_state() may return an error-valued pointer, thus check the pointer for negative or null value before dereferencing.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39505" }, { "cve": "CVE-2024-39506", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet. In lio_vf_rep_copy_packet() pg_info-\u003epage is compared to a NULL value, but then it is unconditionally passed to skb_add_rx_frag(), which could lead to null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39506" }, { "cve": "CVE-2024-39509", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "HID: core: remove unnecessary WARN_ON() in implement(). There is a warning in a call to implement() when trying to write a value into a field of smaller size in an output report. Since implement() already has a warn message printed out with the help of hid_warn() and value in question gets trimmed with: ... value \u0026= m; ... WARN_ON may be considered superfluous.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39509" }, { "cve": "CVE-2024-40901", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40901" }, { "cve": "CVE-2024-40902", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "jfs: xattr: buffer overflow for invalid xattr. When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. But when that xattr size is bigger than the expected size, printing it out can cause an access off the end of the buffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40902" }, { "cve": "CVE-2024-40904", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "USB: class: cdc-wdm: CPU lockup caused by excessive log messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40904" }, { "cve": "CVE-2024-40905", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipv6: possible race in __fib6_drop_pcpu_from().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40905" }, { "cve": "CVE-2024-40912", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: deadlock in ieee80211_sta_ps_deliver_wakeup().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40912" }, { "cve": "CVE-2024-40916", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found When reading EDID fails and driver reports no modes available, the DRM core adds an artificial 1024x786 mode to the connector.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40916" }, { "cve": "CVE-2024-40929", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: iwlwifi: mvm: check n_ssids before accessing the ssids.In some versions of cfg80211, the ssids poinet might be a valid one even though n_ssids is 0. Accessing the pointer in this case will cuase an out-of-bound access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40929" }, { "cve": "CVE-2024-40931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mptcp: ensure snd_una is properly initialized on connect.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40931" }, { "cve": "CVE-2024-40932", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/exynos/vidi: memory leak in .get_modes().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40932" }, { "cve": "CVE-2024-40934", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() Fix a memory leak on logi_dj_recv_send_report() error path.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40934" }, { "cve": "CVE-2024-40941", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "wifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation. In case the firmware sends a notification that claims it has more data than it has, it will read past that was allocated for the notification.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40941" }, { "cve": "CVE-2024-40942", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects The hwmp code use objects of type mesh_preq_queue, added to a list in ieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath gets deleted, ex mesh interface is removed, the entries in that list will never get cleaned.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40942" }, { "cve": "CVE-2024-40943", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ocfs2: fix races between hole punching and AIO+DIO.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40943" }, { "cve": "CVE-2024-40945", "cwe": { "id": "CWE-393", "name": "Return of Wrong Status Code" }, "notes": [ { "category": "summary", "text": "iommu: Return right value in iommu_sva_bind_device() iommu_sva_bind_device() should return either a sva bond handle or an ERR_PTR value in error cases. Existing drivers (idxd and uacce) only check the return value with IS_ERR(). This could potentially lead to a kernel NULL pointer dereference issue if the function returns NULL instead of an error pointer. In reality, this doesn\u0027t cause any problems because iommu_sva_bind_device() only returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40945" }, { "cve": "CVE-2024-40947", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ima: Avoid blocking in RCU read-side critical section, a panic happens in ima_match_policy.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40947" }, { "cve": "CVE-2024-40958", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning: refcount_t: addition on 0; use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40958" }, { "cve": "CVE-2024-40959", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40959" }, { "cve": "CVE-2024-40960", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ipv6: prevent possible NULL dereference in rt6_probe() syzbot caught a NULL dereference in rt6_probe() [1] Bail out if __in6_dev_get() returns NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40960" }, { "cve": "CVE-2024-40961", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ipv6: prevent possible NULL deref in fib6_nh_init() syzbot reminds us that in6_dev_get() can return NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40961" }, { "cve": "CVE-2024-40963", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mips: bmips: BCM6358: Some device have CBR address set to 0 causing kernel panic when arch_sync_dma_for_cpu_all is called.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40963" }, { "cve": "CVE-2024-40968", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "MIPS:The standard PCIe configuration read-write interface is used to access the configuration space of the peripheral PCIe devices of the mips processor after the PCIe link surprise down, it can generate kernel panic caused by \"Data bus error\".", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40968" }, { "cve": "CVE-2024-40971", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "f2fs: remove clear SB_INLINECRYPT flag in default_options In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set. If create new file or open file during this gap, these files will not use inlinecrypt. Worse case, it may lead to data corruption if wrappedkey_v0 is enable.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40971" }, { "cve": "CVE-2024-40974", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/pseries: stack corruption at runtime when plpar_hcall9() stores results past the end of the array.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40974" }, { "cve": "CVE-2024-40976", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/lima: There is a race condition in which a rendering job might take just long enough to trigger the drm sched job timeout handler but also still complete before the hard reset is done by the timeout handler. This runs into race conditions not expected by the timeout handler. In some very specific cases it currently may result in a refcount imbalance on lima_pm_idle, with a stack dump.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40976" }, { "cve": "CVE-2024-40978", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qedi: crash while reading debugfs attribute. The qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly on a __user pointer, which results into the crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40978" }, { "cve": "CVE-2024-40980", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drop_monitor: replace spin_lock by raw_spin_lock trace_drop_common() is called with preemption disabled, and it acquires a spin_lock. This is problematic for RT kernels because spin_locks are sleeping locks in this configuration, which causes the following splat.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40980" }, { "cve": "CVE-2024-40981", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "batman-adv: empty buckets in batadv_purge_orig_ref() are pointing to soft lockups in batadv_purge_orig_ref().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40981" }, { "cve": "CVE-2024-40983", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: possible crash before doing decryption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40983" }, { "cve": "CVE-2024-40984", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ACPICA: Revert \"ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40984" }, { "cve": "CVE-2024-40987", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: UBSAN warning in kv_dpm.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40987" }, { "cve": "CVE-2024-40988", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/radeon: UBSAN warning in kv_dpm.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40988" }, { "cve": "CVE-2024-40990", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ptp: integer overflow in max_vclocks_store.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40990" }, { "cve": "CVE-2024-40995", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/sched: act_api: possible infinite loop in tcf_idr_check_alloc().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-40995" }, { "cve": "CVE-2024-41000", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "block/ioctl: prefer different overflow check Running syzkaller with the newly reintroduced signed integer overflow sanitizer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41000" }, { "cve": "CVE-2024-41004", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tracing: Build event generation tests only as modules The kprobes and synth event generation test modules add events and lock (get a reference) those event file reference in module init function, and unlock and delete it in module exit function. This is because those are designed for playing as modules. If we make those modules as built-in, those events are left locked in the kernel, and never be removed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41004" }, { "cve": "CVE-2024-41005", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "netpoll: race condition in netpoll_owner_active KCSAN detected a race condition in netpoll.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41005" }, { "cve": "CVE-2024-41006", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "netrom: a memory leak in nr_heartbeat_expiry().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41006" }, { "cve": "CVE-2024-41007", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "tcp: avoid too many retransmit packets If a TCP socket is using TCP_USER_TIMEOUT.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41007" }, { "cve": "CVE-2024-41009", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "bpf: Fix overrunning reservations in ringbuf.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41009" }, { "cve": "CVE-2024-41012", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "filelock: Remove locks reliably when fcntl/close race is detected When fcntl_setlk() races with close(), it removes the created lock with do_lock_file_wait().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41012" }, { "cve": "CVE-2024-41015", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: add bounds checking to ocfs2_check_dir_entry(). This adds sanity checks for ocfs2_dir_entry to make sure all members of ocfs2_dir_entry don\u0027t stray beyond valid memory region.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41015" }, { "cve": "CVE-2024-41017", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: vulnerability involves the risk of accessing memory beyond the end of ealist, which can lead to undefined behavior or crashes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41017" }, { "cve": "CVE-2024-41020", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "filelock: race condition vulnerability between fcntl and close operations, which can lead to issues in the recovery compatibility path.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41020" }, { "cve": "CVE-2024-41022", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability involves a signedness problem in sdma_v4_0_process_trap_irq(), which can lead to incorrect handling of values and potential errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41022" }, { "cve": "CVE-2024-41034", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: kernel bug on rename operation of broken directory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41034" }, { "cve": "CVE-2024-41035", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "USB: core: duplicate endpoint bug.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41035" }, { "cve": "CVE-2024-41040", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/sched: UAF when resolving a clash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41040" }, { "cve": "CVE-2024-41041", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "udp: small race window.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41041" }, { "cve": "CVE-2024-41044", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ppp: claimed-as-LCP but actually malformed packets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41044" }, { "cve": "CVE-2024-41046", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix double free in detach The number of the currently released descriptor is never incremented which results in the same skb being released multiple times.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41046" }, { "cve": "CVE-2024-41049", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: filelock: fix potential use-after-free in posix_lock_inode Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode(). The request pointer had been changed earlier to point to a lock entry that was added to the inode\u0027s list. However, before the tracepoint could fire, another task raced in and freed that lock. Fix this by moving the tracepoint inside the spinlock, which should ensure that this doesn\u0027t happen.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41049" }, { "cve": "CVE-2024-41055", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid() Commit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing memory_section-\u003eusage\") changed pfn_section_valid() to add a READ_ONCE() call around \"ms-\u003eusage\" to fix a race with section_deactivate() where ms-\u003eusage can be cleared. The READ_ONCE() call, by itself, is not enough to prevent NULL pointer dereference. We need to check its value before dereferencing it.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41055" }, { "cve": "CVE-2024-41059", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hfsplus: uninit-value in copy_name.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41059" }, { "cve": "CVE-2024-41063", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Bluetooth: hci_core: deadlock at destroy_workqueue().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41063" }, { "cve": "CVE-2024-41064", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/eeh: possible crash when edev-\u003epdev changes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41064" }, { "cve": "CVE-2024-41065", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/pseries: Reading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-* results in a BUG().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41065" }, { "cve": "CVE-2024-41068", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "s390/sclp: sclp_init() failure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41068" }, { "cve": "CVE-2024-41070", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "KVM: PPC: Book3S HV: UAF in kvm_spapr_tce_attach_iommu_group().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41070" }, { "cve": "CVE-2024-41072", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check In \u0027cfg80211_wext_siwscan()\u0027, add extra check whether number of channels passed via \u0027ioctl(sock, SIOCSIWSCAN, ...)\u0027 doesn\u0027t exceed IW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41072" }, { "cve": "CVE-2024-41077", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "null_blk: validation error on block size.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41077" }, { "cve": "CVE-2024-41078", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: qgroup: quota root leak after quota disable failure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41078" }, { "cve": "CVE-2024-41081", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ila: block BH in ila_output().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41081" }, { "cve": "CVE-2024-41087", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ata: libata-core: double free on error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41087" }, { "cve": "CVE-2024-41089", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau/dispnv04: null pointer dereference in nv17_tv_get_hd_modes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41089" }, { "cve": "CVE-2024-41090", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tap: add missing verification for short frame. Missing to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()--\u003eskb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41090" }, { "cve": "CVE-2024-41091", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tun: add missing verification for short frame. Missing to check against the validity of the frame length in the tun_xdp_one() path could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one--\u003eeth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either causeout-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41091" }, { "cve": "CVE-2024-41092", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/i915/gt: potential UAF by revoke of fence registers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41092" }, { "cve": "CVE-2024-41095", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau/dispnv04: null pointer dereference in nv17_tv_get_ld_modes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41095" }, { "cve": "CVE-2024-41097", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: atm: cxacru: incomplete endpoint checking in cxacru_bind().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-41097" }, { "cve": "CVE-2024-42076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: can: j1939: unused data in j1939_send_one().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42076" }, { "cve": "CVE-2024-42077", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: DIO failure due to insufficient transaction credits.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42077" }, { "cve": "CVE-2024-42082", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "xdp: unused WARN() in __xdp_reg_mem_model().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42082" }, { "cve": "CVE-2024-42084", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ftruncate: passing a negative length accidentally succeeds in truncating to file size between 2GiB and 4GiB.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42084" }, { "cve": "CVE-2024-42086", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "iio: chemical: bme680: overflows in compensate() functions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42086" }, { "cve": "CVE-2024-42087", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/panel: ilitek-ili9881c: warning with GPIO controllers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42087" }, { "cve": "CVE-2024-42092", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "gpio: davinci: There can be out of chips-\u003eirqs array boundaries access in davinci_gpio_probe().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42092" }, { "cve": "CVE-2024-42093", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/dpaa2: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42093" }, { "cve": "CVE-2024-42094", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net/iucv: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42094" }, { "cve": "CVE-2024-42095", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "serial: 8250_omap: Erroneous timeout can be triggered, and it may lead to storm of interrupts.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42095" }, { "cve": "CVE-2024-42101", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau: null pointer dereference in nouveau_connector_get_modes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42101" }, { "cve": "CVE-2024-42105", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42105" }, { "cve": "CVE-2024-42143", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "orangefs: out-of-bounds fsid access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42143" }, { "cve": "CVE-2024-42145", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "IB/core: an unbounded UMAD receive list, poses a risk of uncontrolled growth.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42145" }, { "cve": "CVE-2024-42148", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bnx2x: multiple UBSAN array-index-out-of-bounds.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42148" }, { "cve": "CVE-2024-42152", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nvmet: possible leak when destroy a ctrl during qp establishment.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42152" }, { "cve": "CVE-2024-42153", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i2c: pnx: potential deadlock warning from del_timer_sync() call in isr.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42153" }, { "cve": "CVE-2024-42154", "cwe": { "id": "CWE-805", "name": "Buffer Access with Incorrect Length Value" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don\u0027t see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn\u0027t have an entry for this attribute at all (neither does it for IPv6 but v6 is manually validated).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42154" }, { "cve": "CVE-2024-42161", "cwe": { "id": "CWE-457", "name": "Use of Uninitialized Variable" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42161" }, { "cve": "CVE-2024-42223", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: dvb-frontends: tda10048: integer overflow state-\u003extal_hz can be up to 16M, so it can overflow a 32 bit integer when multiplied by pll_mfactor.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42223" }, { "cve": "CVE-2024-42224", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: dsa: mv88e6xxx: wrong check on empty list.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42224" }, { "cve": "CVE-2024-42229", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: aead,cipher - key buffer after use not zeroized.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42229" }, { "cve": "CVE-2024-42232", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "libceph: fix race between delayed_work() and ceph_monc_stop() The way the delayed work is handled in ceph_monc_stop() is prone to races with mon_fault() and possibly also finish_hunting(). Both of these can requeue the delayed work which wouldn\u0027t be canceled by any of the following code in case that happens after cancel_delayed_work_sync() runs -- __close_session() doesn\u0027t mess with the delayed work in order to avoid interfering with the hunting interval logic. This part was missed in(libceph: behave in mon_fault() if cur_mon \u003c \") and use-after-free can still ensue on monc and objects that hang off of it, with monc-\u003e auth and monc-\u003emonmap being particularly susceptible to quickly being reused.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42232" }, { "cve": "CVE-2024-42236", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: gadget: configfs: OOB read/write in usb_string_copy().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42236" }, { "cve": "CVE-2024-42244", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "USB: serial: mos7840: fix crash on resume Since(\"USB: serial: use generic method if no alternative is provided in usb serial layer\"), USB serial core calls the generic resume implementation when the driver has not provided one. This can trigger a crash on resume with mos7840 since support for multiple read URBs was added back in 2011. Specifically, both port read URBs are now submitted on resume for open ports, but the context pointer of the second URB is left set to the core rather than mos7840 port structure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42244" }, { "cve": "CVE-2024-42247", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wireguard: allowedips: unaligned 64-bit memory accesses.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-42247" }, { "cve": "CVE-2024-43098", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i3c: Use i3cdev-\u003edesc-\u003einfo instead of calling i3c_device_get_info() to avoid deadlock. A deadlock may happen since the i3c_master_register() acquires i3cbus-\u003elock twice.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43098" }, { "cve": "CVE-2024-43861", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: usb: qmi_wwan: memory leak for not ip packets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43861" }, { "cve": "CVE-2024-43867", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/nouveau: prime: refcount underflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43867" }, { "cve": "CVE-2024-43871", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu() It will cause memory leakage when use driver API devm_free_percpu() to free memory allocated by devm_alloc_percpu(), fixed by using devres_release() instead of devres_destroy() within devm_free_percpu().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43871" }, { "cve": "CVE-2024-43879", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: cfg80211: Currently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in cfg80211_calculate_bitrate_he(), leading to warning.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43879" }, { "cve": "CVE-2024-43880", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mlxsw: spectrum_acl_erp: object nesting warning.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43880" }, { "cve": "CVE-2024-43882", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "exec: the execution may gain unintended privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43882" }, { "cve": "CVE-2024-43883", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: vhci-hcd: vulnerability due to the vhci-hcd driver dropping references before new ones were gained, potentially leading to the use of stale pointers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43883" }, { "cve": "CVE-2024-43889", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "padata: vulnerability due to a possible divide-by-zero error in padata_mt_helper() during bootup, caused by an uninitialized chunk_size being zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43889" }, { "cve": "CVE-2024-43890", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tracing: vulnerability due to an overflow in get_free_elt(), which could lead to infinite loops and CPU hangs when the tracing map becomes full.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43890" }, { "cve": "CVE-2024-43893", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "serial: core: vulnerability due to a missing check for uartclk being zero, leading to a potential divide-by-zero error when calling ioctl TIOCSSERIAL with an invalid baud_base.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43893" }, { "cve": "CVE-2024-43894", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/client: vulnerability due to a potential null pointer dereference in drm_client_modeset_probe() when drm_mode_duplicate() fails, which was fixed by adding a check.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43894" }, { "cve": "CVE-2024-43907", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu/pm: null pointer dereference in apply_state_adjust_rules.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43907" }, { "cve": "CVE-2024-43908", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: null pointer dereference in ras_manager.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43908" }, { "cve": "CVE-2024-43914", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "md/raid5: BUG_ON() while continue reshape after reassembling.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-43914" }, { "cve": "CVE-2024-44935", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "sctp: Fix null-ptr-deref in reuseport_add_sock(). A Null Pointer Dereference in reuseport_add_sock() while accessing sk2-\u003esk_reuseport_cb . The repro first creates a listener with SO_REUSEPORT. Then, it creates another listener on the same port and concurrently closes the first listener. The second listen() calls reuseport_add_sock() with the first listener as sk2, where sk2-\u003esk_reuseport_cb is not expected to be cleared concurrently, but the close() does clear it by reuseport_detach_sock().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44935" }, { "cve": "CVE-2024-44944", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44944" }, { "cve": "CVE-2024-44949", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "parisc: fix a possible DMA corruption ARCH_DMA_MINALIGN was defined as 16 - this is too small - it may be possible that two unrelated 16-byte allocations share a cache line. If one of these allocations is written using DMA and the other is written using cached write, the value that was written with DMA may be corrupted.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44949" }, { "cve": "CVE-2024-44952", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "driver core: vulnerability due to a potential deadlock due to improper handling of device attributes and driver detachment, which has been fixed by using synchronize_rcu() to prevent race conditions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44952" }, { "cve": "CVE-2024-44954", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: line6: vulnerability involved racy access to the midibuf in the ALSA line6 driver, which has been fixed by using a spinlock to prevent concurrent access issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44954" }, { "cve": "CVE-2024-44960", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: gadget: core: Check for unset descriptor. It needs to be reassured that the descriptor has been set before looking at maxpacket. This fixes a null pointer panic in this case. This may happen if the gadget doesn\u0027t properly set up the endpoint for the current speed, or the gadget descriptors are malformed and the descriptor for the speed/endpoint are not found. No current gadget driver is known to have this problem, but this may cause a hard-to-find bug during development of new gadgets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44960" }, { "cve": "CVE-2024-44965", "cwe": { "id": "CWE-229", "name": "Improper Handling of Values" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix pti_clone_pgtable() alignment assumption Guenter reported dodgy crashes on an i386-nosmp build using GCC-11 that had the form of endless traps until entry stack exhaust and then #DF from the stack guard. It turned out that pti_clone_pgtable() had alignment assumptions on the start address, notably it hard assumes start is PMD aligned. This is true on x86_64, but very much not true on i386. These assumptions can cause the end condition to malfunction, leading to a \u0027short\u0027 clone. Guess what happens when the user mapping has a short copy of the entry text? Use the correct increment form for addr to avoid alignment assumptions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44965" }, { "cve": "CVE-2024-44969", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "s390/sclp: vulnerability could lead to data corruption if a Store Data operation is interrupted and the halt attempt fails, which was resolved by preventing the release of data buffers in such cases.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44969" }, { "cve": "CVE-2024-44971", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "net: dsa: bcm_sf2: vulnerability caused a memory leak by not decrementing the reference count after finding and removing PHY devices, which has been fixed by adding a call to phy_device_free() to balance the reference count.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44971" }, { "cve": "CVE-2024-44987", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent UAF in ip6_send_skb().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44987" }, { "cve": "CVE-2024-44988", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: dsa: mv88e6xxx: vulnerability caused an out-of-bound access in the mv88e6xxx driver due to an ATU violation causing the SPID to exceed DSA_MAX_PORTS, which was resolved by ensuring the SPID stays within the valid range.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44988" }, { "cve": "CVE-2024-44989", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44989" }, { "cve": "CVE-2024-44990", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix null pointer deref in bond_ipsec_offload_ok We must check if there is an active slave before dereferencing the pointer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44990" }, { "cve": "CVE-2024-44995", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: hns3: a deadlock problem when config TC during resetting.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44995" }, { "cve": "CVE-2024-44998", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "atm: idt77252: use after free in dequeue_rx().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44998" }, { "cve": "CVE-2024-44999", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "gtp: missing network headers in gtp_dev_xmit().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-44999" }, { "cve": "CVE-2024-45003", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vfs: Some filesystems(eg. ext4 with ea_inode feature, ubifs with xattr) may do inode lookup in the inode evicting callback function, if the inode lookup is operated under the inode lru traversing context, deadlock problems may happen.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-45003" }, { "cve": "CVE-2024-45006", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "xhci: Panther point NULL pointer deref at full-speed re-enumeration.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-45006" }, { "cve": "CVE-2024-45008", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Input: missing limit on max slots results in too large allocation at input_mt_init_slots().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-45008" }, { "cve": "CVE-2024-45021", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "memcg_write_event_control(): a user-triggerable oops.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-45021" }, { "cve": "CVE-2024-45025", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE copy_fd_bitmaps.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-45025" }, { "cve": "CVE-2024-46673", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "scsi: aacraid: Fix double-free on probe failure. aac_probe_one() calls hardware-specific init functions through the aac_driver_ident::init pointer, all of which eventually call down to aac_init_adapter(). If aac_init_adapter() fails after allocating memory for aac_dev::queues, it frees the memory but does not clear that member. After the hardware-specific init function returns an error, aac_probe_one() goes down an error path that frees the memory pointed to by aac_dev::queues, resulting in a double-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46673" }, { "cve": "CVE-2024-46674", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "usb: dwc3: st: fix probed platform device ref count on probe error path. The probe function never performs any paltform device allocation, thus error path \"undo_platform_dev_alloc\" is entirely bogus. It drops the reference count from the platform device being probed. If error path is triggered, this will lead to unbalanced device reference counts and premature release of device resources, thus possible use-after-free when releasing remaining devm-managed resources.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46674" }, { "cve": "CVE-2024-46675", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: dwc3: core: A vulnerability where the USB core could access an invalid event buffer address during runtime suspend, potentially causing SMMU faults and other memory issues in Exynos platforms.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46675" }, { "cve": "CVE-2024-46676", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfc: pn533: Add poll mod list filling check. In case of im_protocols value is 1 and tm_protocols value is 0 this combination successfully passes the check \u0027if (!im_protocols \u0026\u0026 !tm_protocols)\u0027 in the nfc_start_poll(). But then after pn533_poll_create_mod_list() call in pn533_start_poll() poll mod list will remain empty and dev-\u003epoll_mod_count will remain 0 which lead to division by zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46676" }, { "cve": "CVE-2024-46677", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "gtp: fix NULL pointer dereference. When sockfd_lookup() fails, gtp_encap_enable_socket() returns a NULL pointer, but its callers only check for error pointers thus miss the NULL pointer case.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46677" }, { "cve": "CVE-2024-46679", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ethtool: check device is present when getting link settings.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46679" }, { "cve": "CVE-2024-46685", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "pinctrl: single: fix NULL dereference in pcs_get_function(). pinmux_generic_get_function() can return NULL and the pointer \u0027function\u0027 was dereferenced without checking against NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46685" }, { "cve": "CVE-2024-46689", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "soc: qcom: cmd-db: Map shared memory as WC, not WB Linux does not write into cmd-db region. This region of memory is write protected by XPU. XPU may sometime falsely detect clean cache eviction as \"write\" into the write protected region leading to secure interrupt which causes an endless loop somewhere in Trust Zone.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46689" }, { "cve": "CVE-2024-46702", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "thunderbolt: Mark XDomain as unplugged when router is removed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46702" }, { "cve": "CVE-2024-46707", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn\u0027t been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46707" }, { "cve": "CVE-2024-46713", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "perf/aux: AUX buffer serialization.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46713" }, { "cve": "CVE-2024-46714", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Skip wbscl_set_scaler_filter if filter is null Callers can pass null in filter (i.e. from returned from the function wbscl_get_filter_coeffs_16p) and a null check is added to ensure that is not the case.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46714" }, { "cve": "CVE-2024-46719", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: typec: ucsi: Fix null pointer dereference in trace ucsi_register_altmode checks IS_ERR for the alt pointer and treats NULL as valid. When CONFIG_TYPEC_DP_ALTMODE is not enabled, ucsi_register_displayport returns NULL which causes a NULL pointer dereference in trace. Rather than return NULL, call typec_port_register_altmode to register DisplayPort alternate mode as a non-controllable mode when CONFIG_TYPEC_DP_ALTMODE is not enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46719" }, { "cve": "CVE-2024-46721", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "apparmor: fix possible NULL pointer dereference. profile-\u003eparent-\u003edents[AAFS_PROF_DIR] could be NULL only if its parent is made from __create_missing_ancestors(..) and \u0027ent-\u003eold\u0027 is NULL in aa_replace_profiles(..). In that case, it must return an error code and the code, -ENOENT represents its state that the path of its parent is not existed yet.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46721" }, { "cve": "CVE-2024-46722", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability due to an out-of-bounds read warning when accessing mc_data[i-1].", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46722" }, { "cve": "CVE-2024-46723", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability due to an out-of-bounds read warning when accessing ucode[].", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46723" }, { "cve": "CVE-2024-46724", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability in drm/amdgpu that involved an out-of-bounds read of df_v1_7_channel_number.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46724" }, { "cve": "CVE-2024-46725", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability caused by an out-of-bounds write warning due to an unchecked ring type value.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46725" }, { "cve": "CVE-2024-46731", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/pm: vulnerability caused by an out-of-bounds read warning where the index i - 1U can exceed the bounds of the mc_data[] array when i is zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46731" }, { "cve": "CVE-2024-46737", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nvmet-tcp: kernel crash if commands allocation fails.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46737" }, { "cve": "CVE-2024-46738", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "VMCI: use-after-free when removing resource in vmci_resource_remove().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46738" }, { "cve": "CVE-2024-46739", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "uio_hv_generic: kernel NULL pointer dereference in hv_uio_rescind.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46739" }, { "cve": "CVE-2024-46740", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "binder: UAF caused by offsets overwrite.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46740" }, { "cve": "CVE-2024-46743", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: of/irq: Prevent device address out-of-bounds read in interrupt map walk.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46743" }, { "cve": "CVE-2024-46744", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: Squashfs: sanity check symbolic link size.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46744" }, { "cve": "CVE-2024-46745", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: Input: uinput - reject requests with unreasonable number of slots When exercising uinput interface syzkaller may try setting up device with a really large number of slots, which causes memory allocation failure in input_mt_init_slots(). While this allocation failure is handled properly and request is rejected, it results in syzkaller reports. Additionally, such request may put undue burden on the system which will try to free a lot of memory for a bogus request. Fix it by limiting allowed number of slots to 100. This can easily be extended if we see devices that can track more than 100 contacts.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46745" }, { "cve": "CVE-2024-46747", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "HID: cougar: slab-out-of-bounds Read in cougar_report_fixup. Report_fixup for the Cougar 500k Gaming Keyboard was not verifying that the report descriptor size was correct before accessing it.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46747" }, { "cve": "CVE-2024-46750", "cwe": { "id": "CWE-413", "name": "Improper Resource Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: PCI: Add missing bridge lock to pci_bus_lock().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46750" }, { "cve": "CVE-2024-46755", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id(). mwifiex_get_priv_by_id() returns the priv pointer corresponding to the bss_num and bss_type, but without checking if the priv is actually currently in use. Unused priv pointers do not have a wiphy attached to them which can lead to NULL pointer dereferences further down the callstack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46755" }, { "cve": "CVE-2024-46756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hwmon: (w83627ehf) underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46756" }, { "cve": "CVE-2024-46757", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hwmon: (nct6775-core) underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46757" }, { "cve": "CVE-2024-46758", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hwmon: (lm95234) underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46758" }, { "cve": "CVE-2024-46759", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: hwmon: (adc128d818) Fix underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user. Fix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46759" }, { "cve": "CVE-2024-46761", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "pci/hotplug/pnv_php: hotplug driver crash on Powernv.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46761" }, { "cve": "CVE-2024-46763", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fou: null-ptr-deref in GRO.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46763" }, { "cve": "CVE-2024-46771", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "can: bcm: Remove proc entry when dev is unregistered.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46771" }, { "cve": "CVE-2024-46777", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "udf: Avoid excessive partition lengths Avoid mounting filesystems where the partition would overflow the 32-bits used for block number. Also refuse to mount filesystems where the partition length is so large we cannot safely index bits in a block bitmap.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46777" }, { "cve": "CVE-2024-46780", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: vulnerability caused by the need for mutual exclusion using nilfs-\u003ens_sem when accessing superblock buffers in sysfs attribute show methods to prevent issues with pointer dereferencing and memory access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46780" }, { "cve": "CVE-2024-46781", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: vulnerability involves a use-after-free bug during mount-time recovery, where inodes with recovered data are not freed if an error occurs before the log writer starts, leading to potential memory issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46781" }, { "cve": "CVE-2024-46782", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ila: call nf_unregister_net_hooks() use-after-free Read in ila_nf_input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46782" }, { "cve": "CVE-2024-46783", "cwe": { "id": "CWE-229", "name": "Improper Handling of Values" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: fix return value of tcp_bpf_sendmsg().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46783" }, { "cve": "CVE-2024-46791", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open The mcp251x_hw_wake() function is called with the mpc_lock mutex held and disables the interrupt handler so that no interrupts can be processed while waking the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46791" }, { "cve": "CVE-2024-46798", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ASoC: dapm: vulnerability is an use-after-free bug where snd_pcm_suspend_all() accessed a freed snd_soc_pcm_runtime object during system suspension, detected with KASAN configurations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46798" }, { "cve": "CVE-2024-46800", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sch/netem: use after free in netem_dequeue If netem_dequeue() enqueues packet to inner qdisc and that qdisc returns __NET_XMIT_STOLEN.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46800" }, { "cve": "CVE-2024-46804", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Add array index check for hdcp ddc access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46804" }, { "cve": "CVE-2024-46814", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Check msg_id before processing transcation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46814" }, { "cve": "CVE-2024-46815", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[].", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46815" }, { "cve": "CVE-2024-46817", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46817" }, { "cve": "CVE-2024-46818", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: Check gpio_id before used as array index.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46818" }, { "cve": "CVE-2024-46819", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: the warning dereferencing obj for nbio_v7_4 if ras_manager obj null, don\u0027t print NBIO err data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46819" }, { "cve": "CVE-2024-46822", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46822" }, { "cve": "CVE-2024-46828", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sched: sch_cake: fix bulk flow accounting logic for host fairness In sch_cake, we keep track of the count of active bulk flows per host, when running in dst/src host fairness mode, which is used as the round-robin weight when iterating through flows.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46828" }, { "cve": "CVE-2024-46829", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "rtmutex: Drop rt_mutex::wait_lock before scheduling. rt_mutex_handle_deadlock() is called with rt_mutex::wait_lock held. In the good case it returns with the lock held and in the deadlock case it emits a warning and goes into an endless scheduling loop with the lock held, which triggers the \u0027scheduling in atomic\u0027 warning. Unlock rt_mutex::wait_lock in the dead lock case before issuing the warning and dropping into the schedule for ever loop.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46829" }, { "cve": "CVE-2024-46832", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "MIPS: cevt-r4k: Don\u0027t call get_c0_compare_int if timer irq is installed This avoids warning: [ 0.118053] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:283 Caused by get_c0_compare_int on secondary CPU. We also skipped saving IRQ number to struct clock_event_device *cd as it\u0027s never used by clockevent core, as per comments it\u0027s only meant for \"non CPU local devices\".", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46832" }, { "cve": "CVE-2024-46840", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: clean up our handling of refs == 0 in snapshot delete. In reada we BUG_ON(refs == 0), which may be problematic because there is no lock on the extent leave, potentially leading to a transient incorrect answer. In walk_down_proc, BUG_ON(refs == 0) is also used, which could occur due to extent tree corruption. This has been changed to return -EUCLEAN. In do_walk_down() this case is caught and handled correctly, however -EIO is returned, whereas -EUCLEAN would a more appropriate error code. Finally in walk_up_proc, BUG_ON(refs == 0) is also used, it has also been converted to proper error handling.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46840" }, { "cve": "CVE-2024-46844", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: line: always fill *error_out in setup_one_line() The pointer isn\u0027t initialized by callers, but I have encountered cases where it\u0027s still printed; initialize it in all possible cases in setup_one_line().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-46844" }, { "cve": "CVE-2024-47143", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dma-debug: possible deadlock on radix_lock. radix_lock() shouldn\u0027t be held while holding dma_hash_entry[idx].lock otherwise, there\u0027s a possible deadlock scenario when dma debug API is called holding rq_lock().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47143" }, { "cve": "CVE-2024-47659", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "smack: tcp: vulnerability in Smack\u2019s TCP/IPv4 labeling allows packets to be incorrectly labeled, enabling unauthorized data writing from one label to another.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47659" }, { "cve": "CVE-2024-47660", "cwe": { "id": "CWE-413", "name": "Improper Resource Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: fsnotify: clear PARENT_WATCHED flags lazily In some setups directories can have many (usually negative) dentries. Hence __fsnotify_update_child_dentry_flags() function can take a significant amount of time. Since the bulk of this function happens under inode-\u003ei_lock this causes a significant contention on the lock when we remove the watch from the directory as the __fsnotify_update_child_dentry_flags() call from fsnotify_recalc_mask() races with __fsnotify_update_child_dentry_flags() calls from __fsnotify_parent() happening on children. This can lead upto softlockup reports reported by users. Fix the problem by calling fsnotify_update_children_dentry_flags() to set PARENT_WATCHED flags only when parent starts watching children. When parent stops watching children, clear false positive PARENT_WATCHED flags lazily in __fsnotify_parent() for each accessed child.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47660" }, { "cve": "CVE-2024-47663", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "staging: iio: frequency: ad9834: In ad9834_write_frequency() clk_get_rate() can return 0. In such case ad9834_calc_freqreg() call will lead to division by zero. Checking \u0027if (fout \u003e (clk_freq / 2))\u0027 doesn\u0027t protect in case of \u0027fout\u0027 is 0. ad9834_write_frequency() is called from ad9834_write(), where fout is taken from text buffer, which can contain any value.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47663" }, { "cve": "CVE-2024-47667", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "PCI: keystone: Missing workaround for Errata #i2037 (AM65x SR 1.0).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47667" }, { "cve": "CVE-2024-47668", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "lib/generic-radix-tree.c: race in __genradix_ptr_alloc().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47668" }, { "cve": "CVE-2024-47669", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: state management vulnerability in error path of log writing function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47669" }, { "cve": "CVE-2024-47679", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vfs: race between evice_inodes() and find_inode()\u0026iput().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47679" }, { "cve": "CVE-2024-47684", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: check skb is non-NULL in tcp_rto_delta_us()\r\n\r\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\r\nkernel that are running ceph and recently hit a null ptr dereference in\r\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\r\nsaw it getting hit from the RACK case as well. Here are examples of the oops\r\nmessages we saw in each of those cases:\r\n\r\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\r\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\r\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\r\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\r\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\r\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\r\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\r\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u003c48\u003e 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\r\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\r\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\r\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\r\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\r\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\r\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\r\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\r\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\r\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\r\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\r\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\r\nJul 26 15:05:02 rx [11061395.919488]\r\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\r\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\r\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\r\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\r\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\r\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\r\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\r\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\r\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\r\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\r\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\r\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\r\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\r\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\r\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\r\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\r\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\r\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\r\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\r\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\r\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\r\n---truncated---", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47684" }, { "cve": "CVE-2024-47685", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()\r\n\r\nsyzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th-\u003eres1)\r\n\r\nUse skb_put_zero() to clear the whole TCP header, as done in nf_reject_ip_tcphdr_put()\r\n\r\nBUG: KMSAN: uninit-value in nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\r\n nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\r\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\r\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\r\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\r\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\r\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\r\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\r\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\r\n nf_hook include/linux/netfilter.h:269 [inline]\r\n NF_HOOK include/linux/netfilter.h:312 [inline]\r\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\r\n __netif_receive_skb_one_core net/core/dev.c:5661 [inline]\r\n __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5775\r\n process_backlog+0x4ad/0xa50 net/core/dev.c:6108\r\n __napi_poll+0xe7/0x980 net/core/dev.c:6772\r\n napi_poll net/core/dev.c:6841 [inline]\r\n net_rx_action+0xa5a/0x19b0 net/core/dev.c:6963\r\n handle_softirqs+0x1ce/0x800 kernel/softirq.c:554\r\n __do_softirq+0x14/0x1a kernel/softirq.c:588\r\n do_softirq+0x9a/0x100 kernel/softirq.c:455\r\n __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:382\r\n local_bh_enable include/linux/bottom_half.h:33 [inline]\r\n rcu_read_unlock_bh include/linux/rcupdate.h:908 [inline]\r\n __dev_queue_xmit+0x2692/0x5610 net/core/dev.c:4450\r\n dev_queue_xmit include/linux/netdevice.h:3105 [inline]\r\n neigh_resolve_output+0x9ca/0xae0 net/core/neighbour.c:1565\r\n neigh_output include/net/neighbour.h:542 [inline]\r\n ip6_finish_output2+0x2347/0x2ba0 net/ipv6/ip6_output.c:141\r\n __ip6_finish_output net/ipv6/ip6_output.c:215 [inline]\r\n ip6_finish_output+0xbb8/0x14b0 net/ipv6/ip6_output.c:226\r\n NF_HOOK_COND include/linux/netfilter.h:303 [inline]\r\n ip6_output+0x356/0x620 net/ipv6/ip6_output.c:247\r\n dst_output include/net/dst.h:450 [inline]\r\n NF_HOOK include/linux/netfilter.h:314 [inline]\r\n ip6_xmit+0x1ba6/0x25d0 net/ipv6/ip6_output.c:366\r\n inet6_csk_xmit+0x442/0x530 net/ipv6/inet6_connection_sock.c:135\r\n __tcp_transmit_skb+0x3b07/0x4880 net/ipv4/tcp_output.c:1466\r\n tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]\r\n tcp_connect+0x35b6/0x7130 net/ipv4/tcp_output.c:4143\r\n tcp_v6_connect+0x1bcc/0x1e40 net/ipv6/tcp_ipv6.c:333\r\n __inet_stream_connect+0x2ef/0x1730 net/ipv4/af_inet.c:679\r\n inet_stream_connect+0x6a/0xd0 net/ipv4/af_inet.c:750\r\n __sys_connect_file net/socket.c:2061 [inline]\r\n __sys_connect+0x606/0x690 net/socket.c:2078\r\n __do_sys_connect net/socket.c:2088 [inline]\r\n __se_sys_connect net/socket.c:2085 [inline]\r\n __x64_sys_connect+0x91/0xe0 net/socket.c:2085\r\n x64_sys_call+0x27a5/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:43\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was stored to memory at:\r\n nf_reject_ip6_tcphdr_put+0x60c/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:249\r\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\r\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\r\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\r\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\r\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\r\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\r\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\r\n nf_hook include/linux/netfilter.h:269 [inline]\r\n NF_HOOK include/linux/netfilter.h:312 [inline]\r\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\r\n __netif_receive_skb_one_core\r\n---truncated---", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47685" }, { "cve": "CVE-2024-47692", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfsd: return -EINVAL when namelen is 0\r\nWhen we have a corrupted main.sqlite in /var/lib/nfs/nfsdcld/, it may result in namelen being 0, which will cause memdup_user() to return ZERO_SIZE_PTR.\r\nWhen we access the name.data that has been assigned the value of ZERO_SIZE_PTR in nfs4_client_to_reclaim(), null pointer dereference is triggered.\r\n\r\n[ T1205] ==================================================================\r\n[ T1205] BUG: KASAN: null-ptr-deref in nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] Read of size 1 at addr 0000000000000010 by task nfsdcld/1205\r\n[ T1205]\r\n[ T1205] CPU: 11 PID: 1205 Comm: nfsdcld Not tainted 5.10.0-00003-g2c1423731b8d #406\r\n[ T1205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014\r\n[ T1205] Call Trace:\r\n[ T1205] dump_stack+0x9a/0xd0\r\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] __kasan_report.cold+0x34/0x84\r\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] kasan_report+0x3a/0x50\r\n[ T1205] nfs4_client_to_reclaim+0xe9/0x260\r\n[ T1205] ? nfsd4_release_lockowner+0x410/0x410\r\n[ T1205] cld_pipe_downcall+0x5ca/0x760\r\n[ T1205] ? nfsd4_cld_tracking_exit+0x1d0/0x1d0\r\n[ T1205] ? down_write_killable_nested+0x170/0x170\r\n[ T1205] ? avc_policy_seqno+0x28/0x40\r\n[ T1205] ? selinux_file_permission+0x1b4/0x1e0\r\n[ T1205] rpc_pipe_write+0x84/0xb0\r\n[ T1205] vfs_write+0x143/0x520\r\n[ T1205] ksys_write+0xc9/0x170\r\n[ T1205] ? __ia32_sys_read+0x50/0x50\r\n[ T1205] ? ktime_get_coarse_real_ts64+0xfe/0x110\r\n[ T1205] ? ktime_get_coarse_real_ts64+0xa2/0x110\r\n[ T1205] do_syscall_64+0x33/0x40\r\n[ T1205] entry_SYSCALL_64_after_hwframe+0x67/0xd1\r\n[ T1205] RIP: 0033:0x7fdbdb761bc7\r\n[ T1205] Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 514\r\n[ T1205] RSP: 002b:00007fff8c4b7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\r\n[ T1205] RAX: ffffffffffffffda RBX: 000000000000042b RCX: 00007fdbdb761bc7\r\n[ T1205] RDX: 000000000000042b RSI: 00007fff8c4b75f0 RDI: 0000000000000008\r\n[ T1205] RBP: 00007fdbdb761bb0 R08: 0000000000000000 R09: 0000000000000001\r\n[ T1205] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000042b\r\n[ T1205] R13: 0000000000000008 R14: 00007fff8c4b75f0 R15: 0000000000000000\r\n[ T1205] ==================================================================", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47692" }, { "cve": "CVE-2024-47696", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nRDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency\r\n\r\nIn the commit aee2424246f9 (\"RDMA/iwcm: Fix a use-after-free related to destroying CM IDs\"), the function flush_workqueue is invoked to flush the work queue iwcm_wq.\r\n\r\nBut at that time, the work queue iwcm_wq was created via the function alloc_ordered_workqueue without the flag WQ_MEM_RECLAIM.\r\n\r\nBecause the current process is trying to flush the whole iwcm_wq, if iwcm_wq doesn\u0027t have the flag WQ_MEM_RECLAIM, verify that the current process is not reclaiming memory or running on a workqueue which doesn\u0027t have the flag WQ_MEM_RECLAIM as that can break forward-progress guarantee leading to a deadlock.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47696" }, { "cve": "CVE-2024-47697", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error\r\n\r\nEnsure index in rtl2830_pid_filter does not exceed 31 to prevent out-of-bounds access.\r\n\r\ndev-\u003efilters is a 32-bit value, so set_bit and clear_bit functions should only operate on indices from 0 to 31. If index is 32, it will attempt to access a non-existent 33rd bit, leading to out-of-bounds access.\r\nChange the boundary check from index \u003e 32 to index \u003e= 32 to resolve this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47697" }, { "cve": "CVE-2024-47698", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drivers: media: dvb-frontends/rtl2832: An out-of-bounds access occurs if rtl2832_pid_filter exceed 31, which was not verified.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47698" }, { "cve": "CVE-2024-47699", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix potential null-ptr-deref in nilfs_btree_insert()\r\n\r\nPatch series \"nilfs2: fix potential issues with empty b-tree nodes\".\r\n\r\nThis series addresses three potential issues with empty b-tree nodes that can occur with corrupted filesystem images, including one recently discovered by syzbot.\r\n\r\n\r\nThis patch (of 3):\r\n\r\nIf a b-tree is broken on the device, and the b-tree height is greater than 2 (the level of the root node is greater than 1) even if the number of child nodes of the b-tree root is 0, a NULL pointer dereference occurs in nilfs_btree_prepare_insert(), which is called from nilfs_btree_insert().\r\n\r\nThis is because, when the number of child nodes of the b-tree root is 0, nilfs_btree_do_lookup() does not set the block buffer head in any of path[x].bp_bh, leaving it as the initial value of NULL, but if the level of the b-tree root node is greater than 1, nilfs_btree_get_nonroot_node(), which accesses the buffer memory of path[x].bp_bh, is called.\r\n\r\nFix this issue by adding a check to nilfs_btree_root_broken(), which performs sanity checks when reading the root node from the device, to detect this inconsistency.\r\n\r\nThanks to Lizhi Xu for trying to solve the bug and clarifying the cause early on.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47699" }, { "cve": "CVE-2024-47701", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid OOB when system.data xattr changes underneath the filesystem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47701" }, { "cve": "CVE-2024-47705", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock: fix potential invalid pointer dereference in blk_add_partition\r\n\r\nThe blk_add_partition() function initially used a single if-condition (IS_ERR(part)) to check for errors when adding a partition. This was modified to handle the specific case of -ENXIO separately, allowing the function to proceed without logging the error in this case. However, this change unintentionally left a path where md_autodetect_dev() could be called without confirming that part is a valid pointer.\r\n\r\nThis commit separates the error handling logic by splitting the initial if-condition, improving code readability and handling specific error scenarios explicitly. The function now distinguishes the general error case from -ENXIO without altering the existing behavior of md_autodetect_dev() calls.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47705" }, { "cve": "CVE-2024-47706", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblock, bfq: fix possible UAF for bfqq-\u003ebic with merge chain\r\n\r\nIn this case, IO from Process 1 will get bfqq2 from BIC1 first, and then\r\nget bfqq3 through merge chain, and finially handle IO by bfqq3.\r\nHowerver, current code will think bfqq2 is owned by BIC1, like initial\r\nstate, and set bfqq2-\u003ebic to BIC1.\r\n\r\nAllocated by task 20776:\r\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\r\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\r\n __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328\r\n kasan_slab_alloc include/linux/kasan.h:188 [inline]\r\n slab_post_alloc_hook mm/slab.h:763 [inline]\r\n slab_alloc_node mm/slub.c:3458 [inline]\r\n kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503\r\n ioc_create_icq block/blk-ioc.c:370 [inline]\r\n---truncated---", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47706" }, { "cve": "CVE-2024-47709", "cwe": { "id": "CWE-825", "name": "Expired Pointer Dereference" }, "notes": [ { "category": "summary", "text": "can: bcm: A warning is triggered when connect() is issued again for a socket whose connect()ed device has been unregistered. However, if the socket is just close()d without the 2nd connect(), the remaining bo-\u003ebcm_proc_read triggers unnecessary remove_proc_entry() in bcm_release().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47709" }, { "cve": "CVE-2024-47710", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "sock_map: vulnerability result of adding a cond_resched() in sock_hash_free() to prevent CPU soft lockups when destroying maps with a large number of buckets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47710" }, { "cve": "CVE-2024-47712", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "wifi: wilc1000: vulnerability caused by a potential RCU dereference issue in wilc_parse_join_bss_param by storing the TSF value in a local variable before releasing the RCU lock to prevent use-after-free errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47712" }, { "cve": "CVE-2024-47713", "cwe": { "id": "CWE-664", "name": "Improper Control of a Resource Through its Lifetime" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: vulnerability caused by implementing a two-phase skb reclamation in ieee80211_do_stop() to avoid warnings and potential issues caused by calling __dev_queue_xmit() with interrupts disabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47713" }, { "cve": "CVE-2024-47718", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "wifi: rtw88: vulnerability may lead to a use-after-free (UAF) error if firmware loading is not properly synchronized during USB initialization and disconnection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47718" }, { "cve": "CVE-2024-47723", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix out-of-bounds in dbNextAG() and diAlloc()\r\n\r\nIn dbNextAG() , there is no check for the case where bmp-\u003edb_numag is greater or same than MAXAG due to a polluted image, which causes an out-of-bounds. Therefore, a bounds check should be added in dbMount().\r\n\r\nAnd in dbNextAG(), a check for the case where agpref is greater than bmp-\u003edb_numag should be added, so an out-of-bounds exception should be prevented.\r\n\r\nAdditionally, a check for the case where agno is greater or same than MAXAG should be added in diAlloc() to prevent out-of-bounds.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47723" }, { "cve": "CVE-2024-47735", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "RDMA/hns: missuse of spin_lock_irq()/spin_unlock_irq() when spin_lock_irqsave()/spin_lock_irqrestore() was hold.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47735" }, { "cve": "CVE-2024-47737", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47737" }, { "cve": "CVE-2024-47739", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "padata: missing integer wrap around can cause deadlock on seq_nr overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47739" }, { "cve": "CVE-2024-47740", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Inf2fs: Require FMODE_WRITE for atomic write ioctls. The F2FS ioctls for starting and committing atomic writes check for inode_owner_or_capable(), but this does not give LSMs like SELinux or Landlock an opportunity to deny the write access - if the caller\u0027s FSUID matches the inode\u0027s UID, inode_owner_or_capable() immediately returns true.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47740" }, { "cve": "CVE-2024-47742", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "firmware_loader: Block path traversal Most firmware names are hardcoded strings, or are constructed from fairly constrained format strings where the dynamic parts are just some hex numbers or such. However, there are a couple codepaths in the kernel where firmware file names contain string components that are passed through from a device or semi-privileged userspace.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47742" }, { "cve": "CVE-2024-47747", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition. In the ether3_probe function, a timer is initialized with a callback function ether3_ledoff, bound to \u0026prev(dev)-\u003etimer. Once the timer is started, there is a risk of a race condition if the module or device is removed, triggering the ether3_remove function to perform cleanup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47747" }, { "cve": "CVE-2024-47748", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "vhost_vdpa: assign irq bypass producer token correctly.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47748" }, { "cve": "CVE-2024-47749", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "RDMA/cxgb4: Added NULL check for lookup_atid. The lookup_atid() function can return NULL if the ATID is invalid or does not exist in the identifier table, which could lead to dereferencing a null pointer without a check in the `act_establish()` and `act_open_rpl()` functions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47749" }, { "cve": "CVE-2024-47756", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "PCI: keystone: Fix if-statement expression in ks_pcie_quirk(). This code accidentally uses \u0026\u0026 where || was intended. It potentially results in a NULL dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47756" }, { "cve": "CVE-2024-47757", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "nilfs2: potential oob read in nilfs_btree_check_delete(). The function nilfs_btree_check_delete(), which checks whether degeneration to direct mapping occurs before deleting a b-tree entry, causes memory access outside the block buffer when retrieving the maximum key if the root node has no entries.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-47757" }, { "cve": "CVE-2024-48881", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-48881" }, { "cve": "CVE-2024-49851", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "summary", "text": "tpm: Clean up TPM space after command failure tpm_dev_transmit prepares the TPM space before attempting command transmission. However if the command fails no rollback of this preparation is done. This can result in transient handles being leaked if the device is subsequently closed with no further commands performed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49851" }, { "cve": "CVE-2024-49858", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption The TPM event log table is a Linux specific construct, where the data produced by the GetEventLog() boot service is cached in memory, and passed on to the OS using an EFI configuration table. The use of EFI_LOADER_DATA here results in the region being left unreserved in the E820 memory map constructed by the EFI stub, and this is the memory description that is passed on to the incoming kernel by kexec, which is therefore unaware that the region should be reserved. Even though the utility of the TPM2 event log after a kexec is questionable, any corruption might send the parsing code off into the weeds and crash the kernel.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49858" }, { "cve": "CVE-2024-49860", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "CPI: sysfs: validate return type of _STR method Only buffer objects are valid return values of _STR. If something else is returned description_show() will access invalid memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49860" }, { "cve": "CVE-2024-49863", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vhost/scsi: null-ptr-dereference in vhost_scsi_get_req().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49863" }, { "cve": "CVE-2024-49867", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: wait for fixup workers before stopping cleaner kthread during umount During unmount, at close_ctree().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49867" }, { "cve": "CVE-2024-49868", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "btrfs: a NULL pointer dereference when failed to start a new trasacntion.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49868" }, { "cve": "CVE-2024-49875", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfsd: map the EBADMSG to nfserr_io to avoid warning Ext4 will throw -EBADMSG through ext4_readdir when a checksum error occurs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49875" }, { "cve": "CVE-2024-49877", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: When doing cleanup, if flags do not have OCFS2_BH_READAHEAD set, it may trigger NULL pointer dereference in the following ocfs2_set_buffer_uptodate() if bh is NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49877" }, { "cve": "CVE-2024-49878", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "resource: Because drivers/dax/kmem.c calls add_memory_driver_managed() during onlining CXL memory, which makes \"System RAM (kmem)\" a descendant of \"CXL Window X\". This confuses region_intersects(), which expects all \"System RAM\" resources to be at the top level of iomem_resource.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49878" }, { "cve": "CVE-2024-49879", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm: omapdrm: alloc_ordered_workqueue may return NULL pointer and cause NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49879" }, { "cve": "CVE-2024-49881", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: update orig_path in ext4_find_extent().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49881" }, { "cve": "CVE-2024-49882", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: In ext4_ext_try_to_merge_up(), path[1].p_bh should be set to NULL after it has been released, otherwise it may be released twice.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49882" }, { "cve": "CVE-2024-49883", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: In ext4_ext_insert_extent(), if the path is reallocated in ext4_ext_create_new_leaf(), the stale path will be used and cause use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49883" }, { "cve": "CVE-2024-49884", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix slab-use-after-free in ext4_split_extent_at().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49884" }, { "cve": "CVE-2024-49889", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: avoid use-after-free in ext4_ext_show_leaf()\r\n\r\nIn ext4_find_extent(), path may be freed by error or be reallocated, so\r\nusing a previously saved *ppath may have been freed and thus may trigger\r\nuse-after-free, as follows:\r\n\r\next4_split_extent\r\n path = *ppath;\r\n ext4_split_extent_at(ppath)\r\n path = ext4_find_extent(ppath)\r\n ext4_split_extent_at(ppath)\r\n // ext4_find_extent fails to free path\r\n // but zeroout succeeds\r\n ext4_ext_show_leaf(inode, path)\r\n eh = path[depth].p_hdr\r\n // path use-after-free !!!\r\n\r\nSimilar to ext4_split_extent_at(), we use *ppath directly as an input to\r\next4_ext_show_leaf(). Fix a spelling error by the way.\r\n\r\nSame problem in ext4_ext_handle_unwritten_extents(). Since \u0027path\u0027 is only\r\nused in ext4_ext_show_leaf(), remove \u0027path\u0027 and use *ppath directly.\r\n\r\nThis issue is triggered only when EXT_DEBUG is defined and therefore does\r\nnot affect functionality.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49889" }, { "cve": "CVE-2024-49890", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/pm: ensure the fw_info is not null before using it\r\n\r\nThis resolves the dereference null return value warning reported by Coverity.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49890" }, { "cve": "CVE-2024-49892", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Initialize get_bytes_per_element\u0027s default to 1\r\n\r\nVariables, used as denominators and maybe not assigned to other values, should not be 0. bytes_per_element_y \u0026 bytes_per_element_c are initialized by get_bytes_per_element() which should never return 0.\r\n\r\nThis fixes 10 DIVIDE_BY_ZERO issues reported by Coverity.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49892" }, { "cve": "CVE-2024-49894", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Fix index out of bounds in degamma hardware format translation\r\n\r\nFixes index out of bounds issue in\r\n`cm_helper_translate_curve_to_degamma_hw_format` function. The issue\r\ncould occur when the index \u0027i\u0027 exceeds the number of transfer function\r\npoints (TRANSFER_FUNC_POINTS).\r\n\r\nThe fix adds a check to ensure \u0027i\u0027 is within bounds before accessing the\r\ntransfer function points. If \u0027i\u0027 is out of bounds the function returns\r\nfalse to indicate an error.\r\n\r\nReported by smatch:\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.red\u0027 1025 \u003c= s32max\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.green\u0027 1025 \u003c= s32max\r\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.blue\u0027 1025 \u003c= s32max", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49894" }, { "cve": "CVE-2024-49895", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: vulnerability caused by adding a check to ensure the index \u0027i\u0027 is within bounds before accessing transfer function points in cm_helper_translate_curve_to_degamma_hw_format, preventing buffer overflow errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49895" }, { "cve": "CVE-2024-49896", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: vulnerability caused by adding a null check for the stream before dereferencing it in dc_is_stream_unchanged to prevent null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49896" }, { "cve": "CVE-2024-49900", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: Fix uninit-value access of new_ea in ea_buffer\r\n\r\nsyzbot reports that lzo1x_1_do_compress is using uninit-value:\r\n\r\n=====================================================\r\nBUG: KMSAN: uninit-value in lzo1x_1_do_compress+0x19f9/0x2510 lib/lzo/lzo1x_compress.c:178\r\n\r\n...\r\n\r\nUninit was stored to memory at:\r\n ea_put fs/jfs/xattr.c:639 [inline]\r\n\r\n...\r\n\r\nLocal variable ea_buf created at:\r\n __jfs_setxattr+0x5d/0x1ae0 fs/jfs/xattr.c:662\r\n __jfs_xattr_set+0xe6/0x1f0 fs/jfs/xattr.c:934\r\n\r\n=====================================================\r\n\r\nThe reason is ea_buf-\u003enew_ea is not initialized properly.\r\n\r\nFix this by using memset to empty its content at the beginning\r\nin ea_get().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49900" }, { "cve": "CVE-2024-49901", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/msm/adreno: vulnerability caused by assigning msm_gpu-\u003epdev earlier in the initialization process to prevent null pointer dereferences in msm_gpu_cleanup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49901" }, { "cve": "CVE-2024-49902", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "jfs: vulnerability caused by assigning msm_gpu-\u003epdev earlier in the initialization process to prevent null pointer dereferences in msm_gpu_cleanup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49902" }, { "cve": "CVE-2024-49903", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: Fix uaf in dbFreeBits\r\n\r\n[syzbot reported]\r\n==================================================================\r\nBUG: KASAN: slab-use-after-free in __mutex_lock_common kernel/locking/mutex.c:587 [inline]\r\nBUG: KASAN: slab-use-after-free in __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752\r\nRead of size 8 at addr ffff8880229254b0 by task syz-executor357/5216\r\n\r\nCPU: 0 UID: 0 PID: 5216 Comm: syz-executor357 Not tainted 6.11.0-rc3-syzkaller-00156-gd7a5aa4b3c00 #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024\r\nCall Trace:\r\n \u003cTASK\u003e\r\n __dump_stack lib/dump_stack.c:93 [inline]\r\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119\r\n print_address_description mm/kasan/report.c:377 [inline]\r\n print_report+0x169/0x550 mm/kasan/report.c:488\r\n kasan_report+0x143/0x180 mm/kasan/report.c:601\r\n __mutex_lock_common kernel/locking/mutex.c:587 [inline]\r\n __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752\r\n dbFreeBits+0x7ea/0xd90 fs/jfs/jfs_dmap.c:2390\r\n dbFreeDmap fs/jfs/jfs_dmap.c:2089 [inline]\r\n dbFree+0x35b/0x680 fs/jfs/jfs_dmap.c:409\r\n dbDiscardAG+0x8a9/0xa20 fs/jfs/jfs_dmap.c:1650\r\n jfs_ioc_trim+0x433/0x670 fs/jfs/jfs_discard.c:100\r\n jfs_ioctl+0x2d0/0x3e0 fs/jfs/ioctl.c:131\r\n vfs_ioctl fs/ioctl.c:51 [inline]\r\n __do_sys_ioctl fs/ioctl.c:907 [inline]\r\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\r\n\r\nFreed by task 5218:\r\n kasan_save_stack mm/kasan/common.c:47 [inline]\r\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\r\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579\r\n poison_slab_object+0xe0/0x150 mm/kasan/common.c:240\r\n __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256\r\n kasan_slab_free include/linux/kasan.h:184 [inline]\r\n slab_free_hook mm/slub.c:2252 [inline]\r\n slab_free mm/slub.c:4473 [inline]\r\n kfree+0x149/0x360 mm/slub.c:4594\r\n dbUnmount+0x11d/0x190 fs/jfs/jfs_dmap.c:278\r\n jfs_mount_rw+0x4ac/0x6a0 fs/jfs/jfs_mount.c:247\r\n jfs_remount+0x3d1/0x6b0 fs/jfs/super.c:454\r\n reconfigure_super+0x445/0x880 fs/super.c:1083\r\n vfs_cmd_reconfigure fs/fsopen.c:263 [inline]\r\n vfs_fsconfig_locked fs/fsopen.c:292 [inline]\r\n __do_sys_fsconfig fs/fsopen.c:473 [inline]\r\n __se_sys_fsconfig+0xb6e/0xf80 fs/fsopen.c:345\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\n[Analysis]\r\nThere are two paths (dbUnmount and jfs_ioc_trim) that generate race condition when accessing bmap, which leads to the occurrence of uaf.\r\n\r\nUse the lock s_umount to synchronize them, in order to avoid uaf caused by race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49903" }, { "cve": "CVE-2024-49907", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "drm/amd/display: missing null pointer check before using dc-\u003eclk_mgr.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49907" }, { "cve": "CVE-2024-49913", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "drm/amd/display: missing null check for top_pipe_to_program in commit_planes_for_stream.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49913" }, { "cve": "CVE-2024-49924", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fbdev: pxafb:use after free in pxafb_task(). In the pxafb_probe function, it calls the pxafb_init_fbinfo function, after which \u0026fbi-\u003etask is associated with pxafb_task. Moreover, within this pxafb_init_fbinfo function, the pxafb_blank function within the \u0026pxafb_ops struct is capable of scheduling work. If we remove the module which will call pxafb_remove to make cleanup, it will call unregister_framebuffer function which can call do_unregister_framebuffer to free fbi-\u003efb through put_fb_info(fb_info), while the work mentioned above will be used.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49924" }, { "cve": "CVE-2024-49930", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "wifi: ath11k: fix array out-of-bound access in SoC stats. Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx() function access ath11k_soc_dp_stats::hal_reo_error using the REO destination SRNG ring ID, which is incorrect. SRNG ring ID differ from normal ring ID, and this usage leads to out-of-bounds array access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49930" }, { "cve": "CVE-2024-49933", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "blk_iocost: fix more out of bound shifts.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49933" }, { "cve": "CVE-2024-49936", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net/xen-netback: prevent UAF in xenvif_flush_hash(). During the list_for_each_entry_rcu iteration call of xenvif_flush_hash, kfree_rcu does not exist inside the rcu read critical section, so if kfree_rcu is called when the rcu grace period ends during the iteration, UAF occurs when accessing head-\u003enext after the entry becomes free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49936" }, { "cve": "CVE-2024-49938", "cwe": { "id": "CWE-824", "name": "Access of Uninitialized Pointer" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit\r\n\r\nSyzbot points out that skb_trim() has a sanity check on the existing length of the skb, which can be uninitialised in some error paths. The intent here is clearly just to reset the length to zero before resubmitting, so switch to calling __skb_set_length(skb, 0) directly. In addition, __skb_set_length() already contains a call to skb_reset_tail_pointer(), so remove the redundant call.\r\n\r\nThe syzbot report came from ath9k_hif_usb_reg_in_cb(), but there\u0027s a similar usage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we\u0027re at it.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49938" }, { "cve": "CVE-2024-49944", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start. In sctp_listen_start() invoked by sctp_inet_listen(), it should set the sk_state back to CLOSED if sctp_autobind() fails due to whatever reason. Otherwise, next time when calling sctp_inet_listen(), if sctp_sk(sk)-\u003ereuse is already set via setsockopt(SCTP_REUSE_PORT), sctp_sk(sk)-\u003ebind_hash will be dereferenced as sk_state is LISTENING, which causes a crash as bind_hash is NULL", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49944" }, { "cve": "CVE-2024-49948", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49948" }, { "cve": "CVE-2024-49949", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: avoid potential underflow in qdisc_pkt_len_init() with UFO.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49949" }, { "cve": "CVE-2024-49952", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prevent nf_skb_duplicated corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49952" }, { "cve": "CVE-2024-49955", "cwe": { "id": "CWE-672", "name": "Operation on a Resource after Expiration or Release" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nACPI: battery: Fix possible crash when unregistering a battery hook\r\n\r\nWhen a battery hook returns an error when adding a new battery, then the battery hook is automatically unregistered.\r\nHowever the battery hook provider cannot know that, so it will later call battery_hook_unregister() on the already unregistered battery hook, resulting in a crash.\r\n\r\nFix this by using the list head to mark already unregistered battery hooks as already being unregistered so that they can be ignored by battery_hook_unregister().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49955" }, { "cve": "CVE-2024-49957", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: null-ptr-deref when journal load failed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49957" }, { "cve": "CVE-2024-49958", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: reserve space for inline xattr before attaching reflink tree.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49958" }, { "cve": "CVE-2024-49959", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error In __jbd2_log_wait_for_space(), we might call jbd2_cleanup_journal_tail() to recover some journal space.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49959" }, { "cve": "CVE-2024-49962", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49962" }, { "cve": "CVE-2024-49963", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mailbox: bcm2835: timeout during suspend mode.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49963" }, { "cve": "CVE-2024-49965", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: remove unreasonable unlock in ocfs2_read_blocks Patch series \"Misc fixes for ocfs2_read_blocks\", v5.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49965" }, { "cve": "CVE-2024-49966", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: cancel dqi_sync_work before freeing oinfo ocfs2_global_read_info() will initialize and schedule dqi_sync_work at the end.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49966" }, { "cve": "CVE-2024-49967", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: no need to continue when the number of entries is 1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49967" }, { "cve": "CVE-2024-49969", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: index out of bounds in DCN30 color transformation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49969" }, { "cve": "CVE-2024-49971", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: dml2_core_shared_mode_support and dml_core_mode_support access the third element of dummy_boolean, for example: hw_debug5 = \u0026s-\u003edummy_boolean. Any assignment to hw_debug5 would cause an OVERRUN.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49971" }, { "cve": "CVE-2024-49973", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "r8169: RTL8125 added fields to the tally counter, this change could cause the chip to perform Direct Memory Access on these new fields, potentially writing to unallocated memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49973" }, { "cve": "CVE-2024-49975", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "uprobes: vma xol_add_vma() maps the uninitialized page allocated by __create_xol_area() into userspace. On some architectures (x86) this memory is readable even without VM_READ permission. Additionally setting VM_EXEC produces the same page protection attributes (pgprot_t) as setting both VM_EXEC and VM_READ. Nevertheless, the debugger can read this memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49975" }, { "cve": "CVE-2024-49977", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: stmmac: port_transmit_rate_kbps could be set to a value of 0, which is then passed to the \"div_s64\" function when tc-cbs is disabled. This leads to a zero-division error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49977" }, { "cve": "CVE-2024-49981", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: venus: A race condition may trigger a use after free vulnerability in venus_remove.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49981" }, { "cve": "CVE-2024-49982", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in more places For fixing CVE-2023-6270, f98364e92662 (\"aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\") makes tx() calling dev_put() instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs into use-after-free. Then Nicolai Stange found more places in aoe have potential use-after-free problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe() and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push packet to tx queue. So they should also use dev_hold() to increase the refcnt of skb-\u003edev. On the other hand, moving dev_put() to tx() causes that the refcnt of skb-\u003edev be reduced to a negative value, because corresponding dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(), probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49982" }, { "cve": "CVE-2024-49983", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ext4: When calling ext4_force_split_extent_at() in ext4_ext_replay_update_ex(), the \u0027ppath\u0027 is updated but it is the \u0027path\u0027 that is freed, thus potentially triggering a double-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49983" }, { "cve": "CVE-2024-49985", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i2c: stm32f7: In case there is any sort of clock controller attached to the I2C bus controller, for example Versaclock or even an AIC32x4 I2C codec, then an I2C transfer triggered from the clock controller clk_ops .prepare callback may trigger a deadlock on drivers/clk/clk.c prepare_lock mutex.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49985" }, { "cve": "CVE-2024-49993", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "iommu/vt-d: vulnerability may cause a soft lockup if qi_submit_sync() is called with zero invalidation descriptors, as the completion of invalidation_wait may not be detected, leading to an indefinite wait.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49993" }, { "cve": "CVE-2024-49995", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: vulnerability due to a potential buffer overrun when copying media_name and if_name to name_parts, which may be prevented by using strscpy() to avoid overwriting the destination buffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49995" }, { "cve": "CVE-2024-49997", "cwe": { "id": "CWE-226", "name": "Sensitive Information in Resource Not Removed Before Reuse" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix memory disclosure When applying padding, the buffer is not zeroed, which results in memory disclosure. The mentioned data is observed on the wire. This patch uses skb_put_padto() to pad Ethernet frames properly. The mentioned function zeroes the expanded buffer. In case the packet cannot be padded it is silently dropped. Statistics are also not incremented. This driver does not support statistics in the old 32-bit format or the new 64-bit format. These will be added in the future. In its current form, the patch should be easily backported to stable versions. Ethernet MACs on Amazon-SE and Danube cannot do padding of the packets in hardware, so software padding must be applied.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-49997" }, { "cve": "CVE-2024-50001", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/mlx5: Fix error path in multi-packet WQE transmit\r\n\r\nRemove the erroneous unmap in case no DMA mapping was established\r\n\r\nThe multi-packet WQE transmit code attempts to obtain a DMA mapping for the skb. This could fail, e.g. under memory pressure, when the IOMMU driver just can\u0027t allocate more memory for page tables. While the code tries to handle this in the path below the err_unmap label it erroneously unmaps one entry from the sq\u0027s FIFO list of active mappings. Since the current map attempt failed this unmap is removing some random DMA mapping that might still be required. If the PCI function now presents that IOVA, the IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI function in error state.\r\n\r\nThe erroneous behavior was seen in a stress-test environment that created memory pressure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50001" }, { "cve": "CVE-2024-50006", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix i_data_sem unlock order in ext4_ind_migrate().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50006" }, { "cve": "CVE-2024-50007", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: asihpi: potential OOB array access ASIHPI driver stores some values in the static array upon a response from the driver, and its index depends on the firmware.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50007" }, { "cve": "CVE-2024-50008", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "wifi: mwifiex: memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() Replace one-element array with a flexible-array member in `struct host_cmd_ds_802_11_scan_ext`.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50008" }, { "cve": "CVE-2024-50013", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "exfat: memory leak in exfat_load_bitmap() If the first directory entry in the root directory is not a bitmap directory entry, \u0027bh\u0027 will not be released and reassigned, which will cause a memory leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50013" }, { "cve": "CVE-2024-50015", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "ext4: dax: Overflowing extents beyond inode size when partially writing.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50015" }, { "cve": "CVE-2024-50024", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: unsafe loop on the list.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50024" }, { "cve": "CVE-2024-50033", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nslip: make slhc_remember() more robust against malicious packets\r\n\r\nsyzbot found that slhc_remember() was missing checks against\r\nmalicious packets [1].\r\n\r\nslhc_remember() only checked the size of the packet was at least 20,\r\nwhich is not good enough.\r\n\r\nWe need to make sure the packet includes the IPv4 and TCP header\r\nthat are supposed to be carried.\r\n\r\nAdd iph and th pointers to make the code more readable.\r\n\r\n[1]\r\n\r\nBUG: KMSAN: uninit-value in slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666\r\n slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666\r\n ppp_receive_nonmp_frame+0xe45/0x35e0 drivers/net/ppp/ppp_generic.c:2455\r\n ppp_receive_frame drivers/net/ppp/ppp_generic.c:2372 [inline]\r\n ppp_do_recv+0x65f/0x40d0 drivers/net/ppp/ppp_generic.c:2212\r\n ppp_input+0x7dc/0xe60 drivers/net/ppp/ppp_generic.c:2327\r\n pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379\r\n sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113\r\n __release_sock+0x1da/0x330 net/core/sock.c:3072\r\n release_sock+0x6b/0x250 net/core/sock.c:3626\r\n pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was created at:\r\n slab_post_alloc_hook mm/slub.c:4091 [inline]\r\n slab_alloc_node mm/slub.c:4134 [inline]\r\n kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4186\r\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587\r\n __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678\r\n alloc_skb include/linux/skbuff.h:1322 [inline]\r\n sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732\r\n pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nCPU: 0 UID: 0 PID: 5460 Comm: syz.2.33 Not tainted 6.12.0-rc2-syzkaller-00006-g87d6aab2389e #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50033" }, { "cve": "CVE-2024-50035", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nppp: fix ppp_async_encode() illegal access\r\n\r\nsyzbot reported an issue in ppp_async_encode() [1]\r\n\r\nIn this case, pppoe_sendmsg() is called with a zero size.\r\nThen ppp_async_encode() is called with an empty skb.\r\n\r\nBUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]\r\n BUG: KMSAN: uninit-value in ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675\r\n ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]\r\n ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675\r\n ppp_async_send+0x130/0x1b0 drivers/net/ppp/ppp_async.c:634\r\n ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2280 [inline]\r\n ppp_input+0x1f1/0xe60 drivers/net/ppp/ppp_generic.c:2304\r\n pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379\r\n sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113\r\n __release_sock+0x1da/0x330 net/core/sock.c:3072\r\n release_sock+0x6b/0x250 net/core/sock.c:3626\r\n pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nUninit was created at:\r\n slab_post_alloc_hook mm/slub.c:4092 [inline]\r\n slab_alloc_node mm/slub.c:4135 [inline]\r\n kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4187\r\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587\r\n __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678\r\n alloc_skb include/linux/skbuff.h:1322 [inline]\r\n sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732\r\n pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867\r\n sock_sendmsg_nosec net/socket.c:729 [inline]\r\n __sock_sendmsg+0x30f/0x380 net/socket.c:744\r\n ____sys_sendmsg+0x903/0xb60 net/socket.c:2602\r\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656\r\n __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742\r\n __do_sys_sendmmsg net/socket.c:2771 [inline]\r\n __se_sys_sendmmsg net/socket.c:2768 [inline]\r\n __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768\r\n x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nCPU: 1 UID: 0 PID: 5411 Comm: syz.1.14 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50035" }, { "cve": "CVE-2024-50039", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/sched: accept TCA_STAB only for root qdisc\r\n\r\nMost qdiscs maintain their backlog using qdisc_pkt_len(skb) on the assumption it is invariant between the enqueue() and dequeue() handlers.\r\n\r\nUnfortunately syzbot can crash a host rather easily using a TBF + SFQ combination, with an STAB on SFQ [1]\r\n\r\nWe can\u0027t support TCA_STAB on arbitrary level, this would require to maintain per-qdisc storage.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50039" }, { "cve": "CVE-2024-50040", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: igb: Do not bring the device up after non-fatal error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50040" }, { "cve": "CVE-2024-50044", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change\r\n\r\nrfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50044" }, { "cve": "CVE-2024-50045", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: fix panic with metadata_dst skb.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50045" }, { "cve": "CVE-2024-50046", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nNFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()\r\n\r\nOn the node of an NFS client, some files saved in the mountpoint of the NFS server were copied to another location of the same NFS server.\r\nAccidentally, the nfs42_complete_copies() got a NULL-pointer dereference crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50046" }, { "cve": "CVE-2024-50049", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amd/display: null pointer before dereferencing se.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50049" }, { "cve": "CVE-2024-50051", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "spi: mpc52xx: Add cancel_work_sync before module remove. If the module which will call mpc52xx_spi_remove is removed, it will free \u0027ms\u0027 through spi_unregister_controller. while the work ms-\u003ework will be used. The sequence of operations that may lead to a UAF bug.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50051" }, { "cve": "CVE-2024-50059", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ntb: ntb_hw_switchtec: use after free vulnerability in switchtec_ntb_remove due to race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50059" }, { "cve": "CVE-2024-50074", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "parport: The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). However, since snprintf() returns the would-be-printed size, not the actually output size, the length calculation can still go over the given limit.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50074" }, { "cve": "CVE-2024-50082", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "blk-rq-qos: vulnerability in blk-rq-qos can cause a crash due to a race condition between rq_qos_wait and rq_qos_wake_function, which is fixed by ensuring the waitqueue entry is accessed in the correct order.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50082" }, { "cve": "CVE-2024-50083", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tcp: vulnerability in may cause DSS corruption due to large PMTU transmissions, which is fixed by addressing the issue in the __mptcp_move_skbs_from_subflow function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50083" }, { "cve": "CVE-2024-50089", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "unicode: problematic ignorable code points.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50089" }, { "cve": "CVE-2024-50095", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nRDMA/mad: Improve handling of timed out WRs of mad agent\r\n\r\nCurrent timeout handler of mad agent acquires/releases mad_agent_priv lock for every timed out WRs. This causes heavy locking contention when higher no. of WRs are to be handled inside timeout handler.\r\n\r\nThis leads to softlockup with below trace in some use cases where rdma-cm path is used to establish connection between peer nodes\r\n\r\n\r\nSimplified timeout handler by creating local list of timed out WRs and invoke send handler post creating the list. The new method acquires/releases lock once to fetch the list and hence helps to reduce locking contetiong when processing higher no. of WRs", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50095" }, { "cve": "CVE-2024-50096", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nouveau/dmem: vulnerability in migrate_to_ram upon copy error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50096" }, { "cve": "CVE-2024-50099", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "arm64: probes: Broken LDR (literal) uprobe support.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50099" }, { "cve": "CVE-2024-50179", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ceph: incorrect Fw reference check when dirtying pages.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50179" }, { "cve": "CVE-2024-50180", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fbdev: sisfb: Fix strbuf array overflow. The values of the variables xres and yres are placed in strbuf. These variables are obtained from strbuf1. The strbuf1 array contains digit characters and a space if the array contains non-digit characters. Then, when executing sprintf(strbuf, \"%ux%ux8\", xres, yres); more than 16 bytes will be written to strbuf.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50180" }, { "cve": "CVE-2024-50181", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D. For i.MX7D DRAM related mux clock, the clock source change should ONLY be done done in low level asm code without accessing DRAM, and then calling clk API to sync the HW clock status with clk tree, it should never touch real clock source switch via clk API, so CLK_SET_PARENT_GATE flag should NOT be added, otherwise, DRAM\u0027s clock parent will be disabled when DRAM is active, and system will hang.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50181" }, { "cve": "CVE-2024-50184", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "virtio_pmem: Check device status before requesting flush. If a pmem device is in a bad status, the driver side could wait for host ack forever in virtio_pmem_flush(), causing the system to hang.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50184" }, { "cve": "CVE-2024-50185", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "linux: mptcp: handle consistently DSS corruption. Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50185" }, { "cve": "CVE-2024-50188", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "net: phy: dp83869: fix memory corruption when enabling fiber. When configuring the fiber port, the DP83869 PHY driver incorrectly calls linkmode_set_bit() with a bit mask (1 \u0026lt;\u0026lt; 10) rather than a bit number (10). This corrupts some other memory location -- in case of arm64 the priv pointer in the same structure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50188" }, { "cve": "CVE-2024-50193", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "x86/entry_32: Clear CPU buffers after register restore in NMI return CPU buffers are currently cleared after call to exc_nmi, but before register state is restored. This may be okay for MDS mitigation but not for RDFS. Because RDFS mitigation requires CPU buffers to be cleared when registers don\u0027t have any sensitive data. Move CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50193" }, { "cve": "CVE-2024-50194", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "arm64: probes: Fix uprobes for big-endian kernels The arm64 uprobes code is broken for big-endian kernels as it doesn\u0027t convert the in-memory instruction encoding (which is always little-endian) into the kernel\u0027s native endianness before analyzing and simulating instructions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50194" }, { "cve": "CVE-2024-50195", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "posix-clock: Fix missing timespec64 check in pc_clock_settime().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50195" }, { "cve": "CVE-2024-50198", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "iio: light: veml6030: fix IIO device retrieval from embedded device. The dev pointer that is received as an argument in the in_illuminance_period_available_show function references the device embedded in the IIO device, not in the i2c client. dev_to_iio_dev() must be used to accessthe right data. The current implementation leads to a segmentation fault on every attempt to read the attribute because indio_dev gets a NULL assignment.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50198" }, { "cve": "CVE-2024-50199", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mm/swapfile: skip HugeTLB pages for unuse_vma I got a bad pud error and lost a 1GB HugeTLB when calling swapoff.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50199" }, { "cve": "CVE-2024-50201", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "linux: drm/radeon: encoder-\u003epossible_clones. In the past nothing validated that drivers were populating possible_clones correctly, which resulted in some warnings during driver initialization.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50201" }, { "cve": "CVE-2024-50202", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: propagate directory read errors from nilfs_find_entry(). A task hang occurs in vcs_open() during a fuzzing test for nilfs2. The root cause of this problem is that in nilfs_find_entry(), which searches for directory entries, ignores errors when loading a directory page/folio via nilfs_get_folio() fails. If the filesystem images is corrupted, and the i_size of the directory inode is large, and the directory page/folio is successfully read but fails the sanity check.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50202" }, { "cve": "CVE-2024-50218", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50218" }, { "cve": "CVE-2024-50234", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "summary", "text": "wifi: iwlegacy: vulnerability due to stale interrupts not being cleared before resuming the iwl4965 device from hibernation, causing a race condition between the resume process and restart work.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50234" }, { "cve": "CVE-2024-50236", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: ath10k: Fix memory leak in management tx In the current logic, memory is allocated for storing the MSDU context during management packet TX but this memory is not being freed during management TX completion. Similar leaks are seen in the management TX cleanup logic.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50236" }, { "cve": "CVE-2024-50237", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower Avoid potentially crashing in the driver because of uninitialized private data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50237" }, { "cve": "CVE-2024-50251", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() If access to offset + length is larger than the skbuff length, then skb_checksum() triggers BUG_ON(). skb_checksum() internally subtracts the length parameter while iterating over skbuff, BUG_ON(len) at the end of it checks that the expected length to be included in the checksum calculation is fully consumed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50251" }, { "cve": "CVE-2024-50262", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50262" }, { "cve": "CVE-2024-50264", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "vsock/virtio: Initialization of the dangling pointer occurring in vsk-\u003etrans. During loopback communication, a dangling pointer can be created in vsk-\u003etrans, potentially leading to a Use-After-Free condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50264" }, { "cve": "CVE-2024-50265", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() Syzkaller is able to provoke null-ptr-dereference in ocfs2_xa_remove().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50265" }, { "cve": "CVE-2024-50267", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "USB: serial: io_edgeport: fix use after free in debug printk The \"dev_dbg(\u0026urb-\u003edev-\u003edev, ...\" which happens after usb_free_urb(urb) is a use after free of the \"urb\" pointer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50267" }, { "cve": "CVE-2024-50268", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd(). The \"*cmd\" variable can be controlled by the user via debugfs. That means \"new_cam\" can be as high as 255 while the size of the uc-\u003eupdated[] array is UCSI_MAX_ALTMODES (30). The call tree is: ucsi_cmd() // val comes from simple_attr_write_xsigned() -\u003e ucsi_send_command() -\u003e ucsi_send_command_common() -\u003e ucsi_run_command() // calls ucsi-\u003eops-\u003esync_control() -\u003e ucsi_ccg_sync_control().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50268" }, { "cve": "CVE-2024-50269", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "usb: musb: sunxi: accessing an released usb phy will cause that usb phy @glue-\u003exceiv is accessed after released.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50269" }, { "cve": "CVE-2024-50273", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "btrfs: reinitialize delayed ref list after deleting it from the list. At insert_delayed_ref() if there is a need to update the action of an existing ref to BTRFS_DROP_DELAYED_REF, the ref from its ref head\u0027s ref_add_list is deleted using list_del(), which leaves the ref\u0027s add_list member not reinitialized, as list_del() sets the next and prev members of the list to LIST_POISON1 and LIST_POISON2, respectively.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50273" }, { "cve": "CVE-2024-50278", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dm cache: potential out-of-bounds access on the first resume Out-of-bounds access occurs if the fast device is expanded unexpectedly before the first-time resume of the cache table.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50278" }, { "cve": "CVE-2024-50279", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dm cache: out-of-bounds access to the dirty bitset when resizing dm-cache checks the dirty bits of the cache blocks to be dropped when shrinking the fast device, but an index bug in bitset iteration causes out-of-bounds access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50279" }, { "cve": "CVE-2024-50282", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a possible buffer overflow if size is larger than 4K.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50282" }, { "cve": "CVE-2024-50287", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: v4l2-tpg: prevent the risk of a division by zero As reported by Coverity, the logic at tpg_precalculate_line() blindly rescales the buffer even when scaled_witdh is equal to zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50287" }, { "cve": "CVE-2024-50290", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: cx24116: prevent overflows on SNR calculus as reported by Coverity, if reading SNR registers fail, a negative number will be returned, causing an underflow when reading SNR registers. Prevent that.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50290" }, { "cve": "CVE-2024-50292", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ASoC: stm32: spdifrx: dma channel release in stm32_spdifrx_remove In case of error when requesting ctrl_chan DMA channel, ctrl_chan is not null.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50292" }, { "cve": "CVE-2024-50295", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: arc: A warning is shown because ndev-\u003edev and pdev-\u003edev are not the same device.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50295" }, { "cve": "CVE-2024-50296", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hns3: A kernel crash may occur when the driver is uninstalled and the VF is disabled concurrently.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50296" }, { "cve": "CVE-2024-50299", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50299" }, { "cve": "CVE-2024-50301", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50301" }, { "cve": "CVE-2024-50302", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let\u0027s zero-initialize it during allocation to make sure that it can\u0027t be ever used to leak kernel memory via specially-crafted report.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50302" }, { "cve": "CVE-2024-50304", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipv4: ip_tunnel: Suspicious RCU usage warning in ip_tunnel_find().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50304" }, { "cve": "CVE-2024-50602", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-50602" }, { "cve": "CVE-2024-52332", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "igb: Fix potential invalid memory access in igb_init_module() The pci_register_driver() can fail and when this happened, the dca_notifier needs to be unregistered, otherwise the dca_notifier can be called when igb fails to install, resulting to invalid memory access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-52332" }, { "cve": "CVE-2024-53052", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "io_uring/rw: vulnerability due to io_uring not checking for IOCB_NOWAIT when starting an O_DIRECT write, leading to potential deadlocks if the mount point is being frozen.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53052" }, { "cve": "CVE-2024-53057", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53057" }, { "cve": "CVE-2024-53059", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()\r\n\r\n1. The size of the response packet is not validated.\r\n2. The response buffer is not freed.\r\n\r\nResolve these issues by switching to iwl_mvm_send_cmd_status(), which handles both size validation and frees the buffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53059" }, { "cve": "CVE-2024-53060", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: vulnerability due to a potential NULL pointer dereference in drm/amdgpu if acpi_evaluate_object() returns AE_NOT_FOUND, which is mitigated by bailing out when this status is encountered.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53060" }, { "cve": "CVE-2024-53061", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "media: s5p-jpeg: vulnerability due to the possibility of buffer overflows when the variable word is less than 2, which is prevented by adding extra checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53061" }, { "cve": "CVE-2024-53063", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: dvbdev: risk of out of memory access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53063" }, { "cve": "CVE-2024-53066", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfs: KMSAN warning in decode_getfattr_attrs().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53066" }, { "cve": "CVE-2024-53097", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mm: krealloc: MTE false alarm in __do_krealloc.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53097" }, { "cve": "CVE-2024-53101", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: fs: Fix uninitialized value issue in from_kuid and from_kgid ocfs2_setattr() uses attr-\u003eia_mode, attr-\u003eia_uid and attr-\u003eia_gid in a trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren\u0027t set. Initialize all fields of newattrs to avoid uninitialized variables, by checking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53101" }, { "cve": "CVE-2024-53103", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hv_sock: Initializing vsk-\u003etrans to NULL to prevent a dangling pointer When hvs is released, there is a possibility that vsk-\u003etrans may not be initialized to NULL, which could lead to a dangling pointer.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53103" }, { "cve": "CVE-2024-53104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53104" }, { "cve": "CVE-2024-53145", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "um: potential integer overflow during physmem setup. This vulnerability happens when the real map size is greater than LONG_MAX, which can be easily triggered on UML/i386.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53145" }, { "cve": "CVE-2024-53146", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NFSD: Prevent a potential integer overflow If the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition can result in an integer overflow. Address this by splitting the decoding into several steps so that decode_cb_compound4res() does not have to perform arithmetic on the unsafe length value.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53146" }, { "cve": "CVE-2024-53148", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "comedi: Flush partial mappings in error case If some remap_pfn_range() calls succeeded before one failed, we still have buffer pages mapped into the userspace page tables when we drop the buffer reference with comedi_buf_map_put(bm). The userspace mappings are only cleaned up later in the mmap error path.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53148" }, { "cve": "CVE-2024-53150", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "ALSA: usb-audio: out of bounds reads when finding clock sources The current USB-audio driver code doesn\u0027t check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it\u0027s skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:H/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53150" }, { "cve": "CVE-2024-53155", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: uninitialized value in ocfs2_file_read_iter().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53155" }, { "cve": "CVE-2024-53156", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53156" }, { "cve": "CVE-2024-53157", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "firmware: arm_scpi: Check the DVFS OPP count returned by the firmware Fix a kernel crash with the below call trace when the SCPI firmware returns OPP count of zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53157" }, { "cve": "CVE-2024-53158", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "soc: qcom: geni-se: array underflow in geni_se_clk_tbl_get() This loop is supposed to break if the frequency returned from clk_round_rate() is the same as on the previous iteration. However, that check doesn\u0027t make sense on the first iteration through the loop. It leads to reading before the start of these-\u003eclk_perf_tbl[] array.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53158" }, { "cve": "CVE-2024-53161", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "EDAC/bluefield: potential integer overflow The 64-bit argument for the \"get DIMM info\" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as 32-bits wide the left-shift operation truncates the upper 16 bits of information during the calculation of the SMC argument. The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any potential integer overflow, i.e. loss of data from upper 16 bits.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53161" }, { "cve": "CVE-2024-53165", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let\u0027s only add it to the list after everything has succeeded.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53165" }, { "cve": "CVE-2024-53171", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ubifs: authentication: After an insertion in TNC, the tree might split and cause a node to change its `znode-\u003eparent`. A further deletion of other nodes in the tree (which also could free the nodes), the aforementioned node\u0027s `znode-\u003ecparent` could still point to a freed node. This `znode-\u003ecparent` may not be updated when getting nodes to commit in `ubifs_tnc_start_commit()`. This could then trigger a use-after-free when accessing the `znode-\u003ecparent` in `write_index()` in `ubifs_tnc_end_commit()`.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53171" }, { "cve": "CVE-2024-53172", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ubi: fastmap: The duplicate slab cache names can be detected and a kernel WARNING is thrown out.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53172" }, { "cve": "CVE-2024-53173", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NFSv4.0: When two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53173" }, { "cve": "CVE-2024-53174", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SUNRPC: The function `c_show` was called with protection from RCU. This only ensures that `cp` will not be freed. Therefore, the reference count for `cp` can drop to zero, which will trigger a refcount use-after-free warning when `cache_get` is called.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53174" }, { "cve": "CVE-2024-53181", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: vector: The drvdata is not available in release", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53181" }, { "cve": "CVE-2024-53183", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: net: The drvdata is not available in release.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53183" }, { "cve": "CVE-2024-53184", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "um: ubd: The drvdata is not available in release.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53184" }, { "cve": "CVE-2024-53194", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "PCI: vulnerability causes a use-after-free error during hot removal of a USB4 dock due to improper handling of pci_slot and pci_bus references, which is fixed by ensuring pci_slot acquires a reference to pci_bus.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53194" }, { "cve": "CVE-2024-53197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: usb-audio: vulnerability leading to out-of-bound accesses due to a bogus device providing an excessive bNumConfigurations value, which is fixed by ensuring proper allocation in usb_get_configuration.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53197" }, { "cve": "CVE-2024-53198", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "xen: issue of resource not being properly released in xenbus_dev_probe().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53198" }, { "cve": "CVE-2024-53214", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "vfio/pci: out-of-bounds access to ecap_perms array.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53214" }, { "cve": "CVE-2024-53217", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent NULL dereference in nfsd4_process_cb_update().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53217" }, { "cve": "CVE-2024-53226", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "RDMA/hns: vulnerability due to a potential NULL pointer dereference in hns_roce_map_mr_sg() because ib_map_mr_sg() allows upper layer protocols (ULPs) to specify NULL as the sg_offset argument, requiring the driver to check for NULL before dereferencing.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53226" }, { "cve": "CVE-2024-53227", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: bfa: use-after-free in bfad_im_module_exit().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53227" }, { "cve": "CVE-2024-53237", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Bluetooth: vulnerability due to an use-after-free error in the device_for_each_child function, where a device may be accessed after it has been freed, potentially leading to a dangling pointer and system instability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53237" }, { "cve": "CVE-2024-53239", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: 6fire: The current 6fire code tries to release the resources right after the call of usb6fire_chip_abort(). But at this moment, the card object might be still in use (as we\u0027re calling snd_card_free_when_closed()) and cause potential UAFs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53239" }, { "cve": "CVE-2024-53240", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "xen/netfront: vulnerability causes a crash when removing a device after a suspend/resume cycle due to uninitialized queues, which is fixed by checking for the existence of queues before attempting to stop them.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53240" }, { "cve": "CVE-2024-53241", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "x86/xen: vulnerability due to issues with the PV iret hypercall through the hypercall page, which is fixed by directly coding the sequence in xen-asm.S to avoid problems with speculation mitigations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53241" }, { "cve": "CVE-2024-53680", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ipvs: vulnerability causes undefined behavior due to uninitialized stack access in ip_vs_protocol_init(), which is fixed by zeroing the on-stack buffer to prevent out-of-bound accesses.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-53680" }, { "cve": "CVE-2024-56531", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: caiaq: OTOH, the current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56531" }, { "cve": "CVE-2024-56532", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: us122l: OTOH, the current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56532" }, { "cve": "CVE-2024-56533", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ALSA: usx2y: The USB disconnect callback takes longer than it should. The current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56533" }, { "cve": "CVE-2024-56539", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56539" }, { "cve": "CVE-2024-56548", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "hfsplus: Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and potentially write out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the latter function reads a different io_size.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56548" }, { "cve": "CVE-2024-56558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfsd: make sure exp active before svc_export_show The function `e_show` was called with protection from RCU. This only ensures that `exp` will not be freed. Therefore, the reference count for `exp` can drop to zero, which will trigger a refcount use-after-free warning when `exp_get` is called.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56558" }, { "cve": "CVE-2024-56562", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "i3c: master: miss free init_dyn_addr at i3c_master_put_i3c_addrs().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56562" }, { "cve": "CVE-2024-56567", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "ad7780: division by zero in ad7780_write_raw() In the ad7780_write_raw() , val2 can be zero, which might lead to a division by zero error in DIV_ROUND_CLOSEST(). The ad7780_write_raw() is based on iio_info\u0027s write_raw. While val is explicitly declared that can be zero (in read mode), val2 is not specified to be non-zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56567" }, { "cve": "CVE-2024-56568", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "iommu/arm-smmu: Defer probe of clients after smmu device bound Null pointer dereference occurs due to a race between smmu driver probe and client driver probe, when of_dma_configure() for client is called after the iommu_device_register() for smmu driver probe has executed but before the driver_bound() for smmu driver has been called.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56568" }, { "cve": "CVE-2024-56569", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ftrace: Fix regression with module command in stack_trace_filter When executing the following command: # echo \"write*:mod:ext3\" \u003e /sys/kernel/tracing/stack_trace_filter The current mod command causes a null pointer dereference. While commit 0f17976568b3f (\"ftrace: Fix regression with module command in stack_trace_filter\") has addressed part of the issue, it left a corner case unhandled, which still results in a kernel crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56569" }, { "cve": "CVE-2024-56570", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ovl: Filter invalid inodes with missing lookup function Add a check to the ovl_dentry_weird() function to prevent the processing of directory inodes that lack the lookup function.This is important because such inodes can cause errors in overlayfs when passed to the lowerstack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56570" }, { "cve": "CVE-2024-56571", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: uvcvideo: Require entities to have a non-zero unique ID.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56571" }, { "cve": "CVE-2024-56572", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "media: platform: allegro-dvt: possible memory leak in allocate_buffers_internal(). If The buffer in the loop is not released under the exception path, it may lead to a memory leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56572" }, { "cve": "CVE-2024-56574", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: ts2020: null-ptr-deref in ts2020_probe().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56574" }, { "cve": "CVE-2024-56576", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: i2c: tc358743: crash in the probe error path when using polling. If an error occurs in the probe() function, the polling timer that was alarmed earlier should be removed, otherwise the timer is called with arguments that are already freed, which results in a crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56576" }, { "cve": "CVE-2024-56581", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "btrfs: ref-verify: use-after-free after invalid ref action.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56581" }, { "cve": "CVE-2024-56586", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "f2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode. creating a large files during checkpoint disable until it runs out of space and then delete it, then remount to enable checkpoint again, and then unmount the filesystem triggers the f2fs_bug_on.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56586" }, { "cve": "CVE-2024-56587", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "leds: class: Protect brightness_show() with led_cdev-\u003eled_access mutex. There is NULL pointer vulnerability observed if from Process A where hid device being added which results in adding a led_cdev addition and later a another call to access of led_cdev attribute from Process B can result in NULL pointer vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56587" }, { "cve": "CVE-2024-56589", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: hisi_sas: Add cond_resched() for no forced preemption model. For no forced preemption model kernel, in the scenario where the expander is connected to 12 high performance SAS SSDs, a call trace may occur.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56589" }, { "cve": "CVE-2024-56593", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw(). This patch fixes a NULL pointer dereference bug in brcmfmac that occurs when a high \u0027sd_sgentry_align\u0027 value applies (e.g. 512) and a lot of queued SKBs are sent from the pkt queue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56593" }, { "cve": "CVE-2024-56594", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "drm/amdgpu: set the right AMDGPU sg segment limitation. The driver needs to set the correct max_segment_size; otherwise debug_dma_map_sg() will complain about the over-mapping of the AMDGPU sg length.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56594" }, { "cve": "CVE-2024-56595", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree. When the value of lp is 0 at the beginning of the for loop, it will become negative in the next assignment and we should bail out.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56595" }, { "cve": "CVE-2024-56596", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: array-index-out-of-bounds in jfs_readdir. The stbl might contain some invalid values. Added a check to return error code in that case.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56596" }, { "cve": "CVE-2024-56597", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: fix shift-out-of-bounds in dbSplit. When dmt_budmin is less than zero, it causes errors in the later stages. Added a check to return an error beforehand in dbAllocCtl itself.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56597" }, { "cve": "CVE-2024-56598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "jfs: array-index-out-of-bounds fix in dtReadFirst. The value of stbl can be sometimes out of bounds due to a bad filesystem. Added a check with appopriate return of error code in that case.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56598" }, { "cve": "CVE-2024-56600", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56600" }, { "cve": "CVE-2024-56601", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object. If inet_create() fails later, the sk object is freed, but the sock object retains the dangling pointer, which may create use-after-free later. Clear the sk pointer in the sock object on error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56601" }, { "cve": "CVE-2024-56602", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net: ieee802154: do not leave a dangling sk pointer in ieee802154_create(). sock_init_data() attaches the allocated sk object to the provided sock object. If ieee802154_create() fails later, the allocated sk object is freed, but the dangling pointer remains in the provided sock object, which may allow use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56602" }, { "cve": "CVE-2024-56603", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: af_can: do not leave a dangling sk pointer in can_create(). On error can_create() frees the allocated sk object, but sock_init_data() has already attached it to the provided sock object. This will leave a dangling sk pointer in the sock object and may cause use-after-free later.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56603" }, { "cve": "CVE-2024-56605", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() bt_sock_alloc() allocates the sk object and attaches it to the provided sock object. On error l2cap_sock_alloc() frees the sk object, but the dangling pointer is still attached to the sock object, which may create use-after-free in other code.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56605" }, { "cve": "CVE-2024-56606", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56606" }, { "cve": "CVE-2024-56610", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "kcsan: Turn report_filterlist_lock into a raw_spinlock, with a KCSAN-enabled PREEMPT_RT kernel, we can see splats like sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56610" }, { "cve": "CVE-2024-56615", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bpf: OOB devmap writes when deleting elements against XSKMAP which also applies to DEVMAP - the index used for accessing map entry, due to being a signed integer, causes the OOB writes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56615" }, { "cve": "CVE-2024-56619", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nilfs2: When searching for records in a directory where the inode\u0027s i_size is corrupted and has a large value, memory access outside the folio/page range may occur, or a use-after-free bug may be detected if KASAN is enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56619" }, { "cve": "CVE-2024-56623", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qla2xxx: System crash is observed with stack trace warning of use after free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56623" }, { "cve": "CVE-2024-56629", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "HID: wacom: Due to incorrect dev-\u003eproduct reporting by certain devices, null pointer dereferences occur when dev-\u003eproduct is empty, leading to potential system crashes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56629" }, { "cve": "CVE-2024-56630", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ocfs2: iput() is not called when new_inode() succeeded and dquot_initialize() failed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56630" }, { "cve": "CVE-2024-56633", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tcp_bpf: The current sk memory accounting logic in __SK_REDIRECT is pre-uncharging tosend bytes, which is either msg-\u003esg.size or a smaller value apply_bytes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56633" }, { "cve": "CVE-2024-56634", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "gpio: grgpio: vulnerability due to a missing NULL check in grgpio_probe for the return value of devm_kasprintf(), leading to a kernel NULL pointer dereference error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56634" }, { "cve": "CVE-2024-56636", "cwe": { "id": "CWE-241", "name": "Improper Handling of Unexpected Data Type" }, "notes": [ { "category": "summary", "text": "geneve: vulnerability in geneve_xmit_skb() arises from incorrectly assuming the MAC header is set in the output path, which can lead to errors. The fix involves using skb_eth_hdr() instead of eth_hdr() to ensure the MAC header is correctly referenced, preventing potential issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56636" }, { "cve": "CVE-2024-56637", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "netfilter: ipset: vulnerability involves a race condition where the ip_set.ko module can be unloaded by user space while it is requesting a set type backend module, potentially causing a kernel crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56637" }, { "cve": "CVE-2024-56642", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: vulnerability in TIPC (Transparent Inter-Process Communication) involves a use-after-free issue with the UDP kernel socket in cleanup_bearer(), caused by premature reference count decrements, which is resolved by moving the decrement after releasing the socket.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56642" }, { "cve": "CVE-2024-56643", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "dccp: vulnerability in DCCP (Datagram Congestion Control Protocol) involves a memory leak in dccp_feat_change_recv where memory allocated for a new SP feature value is not freed if dccp_feat_push_confirm() fails, leading to potential resource exhaustion.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56643" }, { "cve": "CVE-2024-56644", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56644" }, { "cve": "CVE-2024-56645", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "can: j1939: vulnerability involves a reference count underflow issue in j1939_session_new(), which is fixed by adding an extra skb_get() to match the behavior of j1939_session_skb_queue().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56645" }, { "cve": "CVE-2024-56648", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: hsr: avoid potential out-of-bound access in fill_frame_info(). By extending the check to cover packets with only 14 bytes, it prevents uninitialized values from causing undefined behavior or security issues.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56648" }, { "cve": "CVE-2024-56650", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the following BUG detected by KASAN", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56650" }, { "cve": "CVE-2024-56659", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "net: lapb: It is unclear if net/lapb code is supposed to be ready for 8021q, this may lead to crashes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56659" }, { "cve": "CVE-2024-56661", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "tipc: NULL deref in cleanup_bearer().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56661" }, { "cve": "CVE-2024-56662", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56662" }, { "cve": "CVE-2024-56670", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: gadget: u_serial: gs_start_io crashed due to accessing null pointer. Considering that in some extreme cases, when u_serial driver is accessed by multiple threads, Thread A is executing the open operation and calling the gs_open, Thread B is executing the disconnect operation and calling the gserial_disconnect function, the port-\u003eport_usb pointer will be set to NULL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56670" }, { "cve": "CVE-2024-56681", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: bcm - add error check in the ahash_hmac_init function The ahash_init functions may return fails. The ahash_hmac_init should not return ok when ahash_init returns error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56681" }, { "cve": "CVE-2024-56688", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport Since transport-\u003esock has been set to NULL during reset transport, XPRT_SOCK_UPD_TIMEOUT also needs to be cleared.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56688" }, { "cve": "CVE-2024-56690", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56690" }, { "cve": "CVE-2024-56691", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) flaws.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56691" }, { "cve": "CVE-2024-56698", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "usb: dwc3: gadget: looping of queued SG entries The dwc3_request-\u003enum_queued_sgs is decremented on completion. If a partially completed request is handled, then the dwc3_request-\u003enum_queued_sgs no longer reflects the total number of num_queued_sgs (it would be cleared).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56698" }, { "cve": "CVE-2024-56700", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: wl128x: Atomicity violation occurs when the fmc_send_cmd() function is executed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56700" }, { "cve": "CVE-2024-56701", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/pseries: The dtl_access_lock needs to be a rw_sempahore, a sleeping lock, because the code calls kmalloc() while holding it, which can sleep.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56701" }, { "cve": "CVE-2024-56704", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "9p/xen: A fix release of IRQ Kernel logs indicate an IRQ was double-freed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56704" }, { "cve": "CVE-2024-56705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "media: atomisp: In ia_css_3a_statistics_allocate(), there is no check on the allocation result of the rgby_data memory. If rgby_data is not successfully allocated, it may trigger the assert(host_stats-\u003ergby_data) assertion in ia_css_s3a_hmem_decode().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56705" }, { "cve": "CVE-2024-56720", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "bpf, sockmap: Several fixes to bpf_msg_pop_data, 1. In sk_msg_shift_left, it should put_page 2. if (len == 0), returning early is better 3. pop the entire sk_msg (last == msg-\u003esg.size) should be supported 4. Fix for the value of variable \"a\" 5. In sk_msg_shift_left, after shifting, it has already pointed to the next element. Addtional sk_msg_iter_var_next may result in BUG.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56720" }, { "cve": "CVE-2024-56723", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices. While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) vulnerabilities. This was unveiled when platform_get_irq() had started WARN() on IRQ 0 that is supposed to be a Linux IRQ number (also known as vIRQ).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56723" }, { "cve": "CVE-2024-56724", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device. While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) vulnerability. This was unveiled when platform_get_irq() had started WARN() on IRQ 0 that is supposed to be a Linux IRQ number (also known as vIRQ).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56724" }, { "cve": "CVE-2024-56728", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c. Add error pointer check after calling otx2_mbox_get_rsp().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56728" }, { "cve": "CVE-2024-56739", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "rtc: check if __rtc_read_time was successful in rtc_timer_do_work() If the __rtc_read_time call fails, the struct rtc_time tm; may contain uninitialized data, or an illegal date/time read from the RTC hardware. When calling rtc_tm_to_ktime later, the result may be a very large value (possibly KTIME_MAX). If there are periodic timers in rtc-\u003etimerqueue, they will continually expire, may causing kernel softlockup.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56739" }, { "cve": "CVE-2024-56741", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "apparmor: test: Fix memory leak for aa_unpack_strdup() The string allocated by kmemdup() in aa_unpack_strdup() is not freed and cause following memory leaks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56741" }, { "cve": "CVE-2024-56746", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "fbdev: sh7760fb: vulnerability involves a potential memory leak in sh7760fb_alloc_mem() where sh7760fb_free_mem() does not release memory correctly if info-\u003escreen_base is not ready, which is fixed by calling dma_free_coherent() instead.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56746" }, { "cve": "CVE-2024-56747", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qedi: vulnerability involves a potential memory leak in qedi_alloc_and_init_sb() where the DMA memory sb_virt is not released upon failure, which is fixed by adding dma_free_coherent() to free the memory, similar to other functions like qedr_alloc_mem_sb() and qede_alloc_mem_sb().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56747" }, { "cve": "CVE-2024-56748", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "scsi: qedf: vulnerability involves a potential memory leak in qedf_alloc_and_init_sb() where the DMA memory sb_virt is not released upon failure, which is fixed by adding dma_free_coherent() to free the memory, similar to other functions like qedr_alloc_mem_sb() and qede_alloc_mem_sb().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56748" }, { "cve": "CVE-2024-56754", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "crypto: vulnerability due to passing an incorrect parameter type to devm_add_action_or_reset() in the CAAM driver, which is fixed by ensuring the correct parameter type is used to properly release resources.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56754" }, { "cve": "CVE-2024-56756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nvme-pci: vulnerability involves an incorrect size being passed to dma_free_coherent in nvme-pci due to __nvme_alloc_host_mem potentially using fewer descriptors than planned, which is fixed by ensuring the correct size is used for freeing the HMB descriptor table.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56756" }, { "cve": "CVE-2024-56770", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "notes": [ { "category": "summary", "text": "net/sched: netem: The interface fully stops transferring packets and \"locks\". In this case, the child qdisc and tfifo are empty, but \u0027qlen\u0027 indicates the tfifo is at its limit and no more packets are accepted.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56770" }, { "cve": "CVE-2024-56779", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur\r\n\r\nThe action force umount(umount -f) will attempt to kill all rpc_task even\r\numount operation may ultimately fail if some files remain open.\r\nConsequently, if an action attempts to open a file, it can potentially\r\nsend two rpc_task to nfs server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56779" }, { "cve": "CVE-2024-56780", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "summary", "text": "quota: flush quota_release_work upon quota writeback One of the paths quota writeback is called from is: freeze_super() sync_filesystem() ext4_sync_fs() dquot_writeback_dquots().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56780" }, { "cve": "CVE-2024-56781", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "powerpc/prom_init: missing powermac #size-cells.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56781" }, { "cve": "CVE-2024-56785", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "summary", "text": "MIPS: Loongson64: DTS: issues with PCIe port nodes for ls7a.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-56785" }, { "cve": "CVE-2024-57874", "cwe": { "id": "CWE-824", "name": "Access of Uninitialized Pointer" }, "notes": [ { "category": "summary", "text": "arm64: ptrace: vulnerability due to an uninitialized variable in the tagged_addr_ctrl_set() function, leading to potential memory leakage from the kernel stack when a zero-length SETREGSET call is made, exposing up to 64 bits of memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.2 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-57874" } ] }
wid-sec-w-2024-3762
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und um nicht n\u00e4her beschriebene Effekte zu erzielen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3762 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3762.json" }, { "category": "self", "summary": "WID-SEC-2024-3762 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3762" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53180", "url": "https://lore.kernel.org/linux-cve-announce/2024122719-CVE-2024-53180-78ed@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53182", "url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-53182-8a61@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53183", "url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-53183-9efa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53184", "url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-53184-1a1c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53185", "url": "https://lore.kernel.org/linux-cve-announce/2024122721-CVE-2024-53185-16d6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53186", "url": "https://lore.kernel.org/linux-cve-announce/2024122721-CVE-2024-53186-7c05@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53187", "url": "https://lore.kernel.org/linux-cve-announce/2024122722-CVE-2024-53187-909e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53188", "url": "https://lore.kernel.org/linux-cve-announce/2024122722-CVE-2024-53188-be4e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53189", "url": "https://lore.kernel.org/linux-cve-announce/2024122722-CVE-2024-53189-1b90@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53194", "url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-53194-9edf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53195", "url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-53195-772a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53196", "url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53196-758a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53197", "url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53197-6aef@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53198", "url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53198-ce0e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53199", "url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-53199-3a00@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53200", "url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-53200-1320@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53201", "url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-53201-2534@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53202", "url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-53202-f699@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53203", "url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-53203-80fc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53204", "url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-53204-0f6e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53205", "url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-53205-1be1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53206", "url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-53206-d85d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53207", "url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-53207-72f7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53208", "url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-53208-dff3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53209", "url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-53209-b6b2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53210", "url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-53210-c51c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53211", "url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-53211-9837@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53212", "url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-53212-495a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53213", "url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-53213-baa6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53214", "url": "https://lore.kernel.org/linux-cve-announce/2024122731-CVE-2024-53214-5fbf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53215", "url": "https://lore.kernel.org/linux-cve-announce/2024122731-CVE-2024-53215-7de4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53216", "url": "https://lore.kernel.org/linux-cve-announce/2024122732-CVE-2024-53216-ba8b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53217", "url": "https://lore.kernel.org/linux-cve-announce/2024122732-CVE-2024-53217-4f05@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53218", "url": "https://lore.kernel.org/linux-cve-announce/2024122732-CVE-2024-53218-4330@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53219", "url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-53219-1a04@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53220", "url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-53220-3664@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53221", "url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-53221-d8b2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53222", "url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53222-6c79@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53223", "url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53223-7669@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53224", "url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53224-2509@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53225", "url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-53225-8deb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53226", "url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-53226-5c23@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53227", "url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-53227-d872@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53228", "url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-53228-0c5f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53229", "url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-53229-f5cc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53230", "url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-53230-5851@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53231", "url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-53231-fe0f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53232", "url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-53232-6919@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53233", "url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-53233-ab02@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53234", "url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-53234-4ee6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53235", "url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-53235-80a9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53236", "url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-53236-0ab4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53237", "url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-53237-2fa6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53238", "url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-53238-ea1c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53239", "url": "https://lore.kernel.org/linux-cve-announce/2024122740-CVE-2024-53239-b661@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56531", "url": "https://lore.kernel.org/linux-cve-announce/2024122721-CVE-2024-56531-6a91@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56532", "url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-56532-6931@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56533", "url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-56533-5de6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56534", "url": "https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-56534-6e4d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56535", "url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-56535-4683@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56536", "url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-56536-a7c4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56537", "url": "https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-56537-59f7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56538", "url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-56538-379d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56539", "url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-56539-4d60@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56540", "url": "https://lore.kernel.org/linux-cve-announce/2024122726-CVE-2024-56540-d2f7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56541", "url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-56541-1c83@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56542", "url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-56542-d3dc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56543", "url": "https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-56543-a959@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56544", "url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-56544-42cf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56545", "url": "https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-56545-0bfa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56546", "url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-56546-3138@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56547", "url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-56547-c340@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56548", "url": "https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-56548-8bfd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56549", "url": "https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-56549-ebcd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56550", "url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56550-68f3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56551", "url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56551-4ad2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56552", "url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56552-aca0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56553", "url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56553-e097@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56554", "url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56554-9ee7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56555", "url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56555-6abc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56556", "url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56556-96b8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56557", "url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56557-7440@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56558", "url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56558-9fd9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56559", "url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56559-b560@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56560", "url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56560-e044@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56561", "url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56561-a041@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56562", "url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56562-9fd5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56563", "url": "https://lore.kernel.org/linux-cve-announce/2024122714-CVE-2024-56563-148f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56564", "url": "https://lore.kernel.org/linux-cve-announce/2024122714-CVE-2024-56564-7587@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56565", "url": "https://lore.kernel.org/linux-cve-announce/2024122714-CVE-2024-56565-1a08@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56566", "url": "https://lore.kernel.org/linux-cve-announce/2024122715-CVE-2024-56566-0a7e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56567", "url": "https://lore.kernel.org/linux-cve-announce/2024122715-CVE-2024-56567-a306@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56568", "url": "https://lore.kernel.org/linux-cve-announce/2024122715-CVE-2024-56568-76a5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56569", "url": "https://lore.kernel.org/linux-cve-announce/2024122716-CVE-2024-56569-cc71@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56570", "url": "https://lore.kernel.org/linux-cve-announce/2024122716-CVE-2024-56570-7580@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56571", "url": "https://lore.kernel.org/linux-cve-announce/2024122716-CVE-2024-56571-2bbc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56572", "url": "https://lore.kernel.org/linux-cve-announce/2024122717-CVE-2024-56572-b0fd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56573", "url": "https://lore.kernel.org/linux-cve-announce/2024122717-CVE-2024-56573-f5d2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56574", "url": "https://lore.kernel.org/linux-cve-announce/2024122717-CVE-2024-56574-68a1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56575", "url": "https://lore.kernel.org/linux-cve-announce/2024122718-CVE-2024-56575-5f0b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56576", "url": "https://lore.kernel.org/linux-cve-announce/2024122718-CVE-2024-56576-9756@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56577", "url": "https://lore.kernel.org/linux-cve-announce/2024122718-CVE-2024-56577-42c4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56578", "url": "https://lore.kernel.org/linux-cve-announce/2024122719-CVE-2024-56578-48e7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56579", "url": "https://lore.kernel.org/linux-cve-announce/2024122719-CVE-2024-56579-6134@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56580", "url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-56580-40b9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56581", "url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-56581-501d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56582", "url": "https://lore.kernel.org/linux-cve-announce/2024122720-CVE-2024-56582-17af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56583", "url": "https://lore.kernel.org/linux-cve-announce/2024122754-CVE-2024-56583-b1dc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56584", "url": "https://lore.kernel.org/linux-cve-announce/2024122757-CVE-2024-56584-dad9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56585", "url": "https://lore.kernel.org/linux-cve-announce/2024122757-CVE-2024-56585-ad56@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56586", "url": "https://lore.kernel.org/linux-cve-announce/2024122757-CVE-2024-56586-bece@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56587", "url": "https://lore.kernel.org/linux-cve-announce/2024122758-CVE-2024-56587-1786@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56588", "url": "https://lore.kernel.org/linux-cve-announce/2024122758-CVE-2024-56588-87ae@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56589", "url": "https://lore.kernel.org/linux-cve-announce/2024122758-CVE-2024-56589-5cce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56590", "url": "https://lore.kernel.org/linux-cve-announce/2024122759-CVE-2024-56590-d4ba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56591", "url": "https://lore.kernel.org/linux-cve-announce/2024122759-CVE-2024-56591-eaf9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56592", "url": "https://lore.kernel.org/linux-cve-announce/2024122700-CVE-2024-56592-d4b2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56593", "url": "https://lore.kernel.org/linux-cve-announce/2024122700-CVE-2024-56593-3974@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56594", "url": "https://lore.kernel.org/linux-cve-announce/2024122700-CVE-2024-56594-3c24@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56595", "url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56595-0584@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56596", "url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56596-2add@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56597", "url": "https://lore.kernel.org/linux-cve-announce/2024122701-CVE-2024-56597-d77b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56598", "url": "https://lore.kernel.org/linux-cve-announce/2024122702-CVE-2024-56598-3955@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56599", "url": "https://lore.kernel.org/linux-cve-announce/2024122702-CVE-2024-56599-54af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56600", "url": "https://lore.kernel.org/linux-cve-announce/2024122702-CVE-2024-56600-7867@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56601", "url": "https://lore.kernel.org/linux-cve-announce/2024122703-CVE-2024-56601-2150@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56602", "url": "https://lore.kernel.org/linux-cve-announce/2024122703-CVE-2024-56602-d030@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56603", "url": "https://lore.kernel.org/linux-cve-announce/2024122703-CVE-2024-56603-3db8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56604", "url": "https://lore.kernel.org/linux-cve-announce/2024122704-CVE-2024-56604-8494@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56605", "url": "https://lore.kernel.org/linux-cve-announce/2024122704-CVE-2024-56605-d424@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56606", "url": "https://lore.kernel.org/linux-cve-announce/2024122704-CVE-2024-56606-bf3b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56607", "url": "https://lore.kernel.org/linux-cve-announce/2024122705-CVE-2024-56607-031e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56608", "url": "https://lore.kernel.org/linux-cve-announce/2024122705-CVE-2024-56608-30fb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56609", "url": "https://lore.kernel.org/linux-cve-announce/2024122706-CVE-2024-56609-7fe3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56610", "url": "https://lore.kernel.org/linux-cve-announce/2024122706-CVE-2024-56610-905f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56611", "url": "https://lore.kernel.org/linux-cve-announce/2024122706-CVE-2024-56611-262a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56612", "url": "https://lore.kernel.org/linux-cve-announce/2024122707-CVE-2024-56612-a24e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56613", "url": "https://lore.kernel.org/linux-cve-announce/2024122707-CVE-2024-56613-0897@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56614", "url": "https://lore.kernel.org/linux-cve-announce/2024122707-CVE-2024-56614-17c4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56615", "url": "https://lore.kernel.org/linux-cve-announce/2024122708-CVE-2024-56615-5148@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56616", "url": "https://lore.kernel.org/linux-cve-announce/2024122708-CVE-2024-56616-ae89@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56617", "url": "https://lore.kernel.org/linux-cve-announce/2024122708-CVE-2024-56617-7f21@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56618", "url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56618-44a1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56619", "url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56619-501d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56620", "url": "https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56620-d1a8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56621", "url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56621-98bf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56622", "url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56622-cee7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56623", "url": "https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56623-e4c7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56624", "url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56624-35f7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56625", "url": "https://lore.kernel.org/linux-cve-announce/2024122711-CVE-2024-56625-82a7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56626", "url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56626-f2f9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56627", "url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56627-f398@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56628", "url": "https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56628-c347@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56629", "url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56629-83fb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56630", "url": "https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56630-c856@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56631", "url": "https://lore.kernel.org/linux-cve-announce/2024122731-CVE-2024-56631-548f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56632", "url": "https://lore.kernel.org/linux-cve-announce/2024122733-CVE-2024-56632-ea20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56633", "url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-56633-ac1d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56634", "url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-56634-f6d5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56635", "url": "https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-56635-3014@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56636", "url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-56636-cdeb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56637", "url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-56637-23bb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56638", "url": "https://lore.kernel.org/linux-cve-announce/2024122735-CVE-2024-56638-3a3d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56639", "url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-56639-809a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56640", "url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-56640-ef22@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56641", "url": "https://lore.kernel.org/linux-cve-announce/2024122736-CVE-2024-56641-5492@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56642", "url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56642-71ee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56643", "url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56643-8470@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56644", "url": "https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56644-83c2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56645", "url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-56645-bc11@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56646", "url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-56646-e78e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56647", "url": "https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-56647-d71f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56648", "url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-56648-5623@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56649", "url": "https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-56649-33a6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56650", "url": "https://lore.kernel.org/linux-cve-announce/2024122740-CVE-2024-56650-4d51@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56651", "url": "https://lore.kernel.org/linux-cve-announce/2024122740-CVE-2024-56651-2d22@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56652", "url": "https://lore.kernel.org/linux-cve-announce/2024122748-CVE-2024-56652-31db@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56653", "url": "https://lore.kernel.org/linux-cve-announce/2024122749-CVE-2024-56653-bb35@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56654", "url": "https://lore.kernel.org/linux-cve-announce/2024122749-CVE-2024-56654-66a1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56655", "url": "https://lore.kernel.org/linux-cve-announce/2024122749-CVE-2024-56655-e94f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56656", "url": "https://lore.kernel.org/linux-cve-announce/2024122750-CVE-2024-56656-84a9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56657", "url": "https://lore.kernel.org/linux-cve-announce/2024122750-CVE-2024-56657-4f33@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56658", "url": "https://lore.kernel.org/linux-cve-announce/2024122750-CVE-2024-56658-01fc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56659", "url": "https://lore.kernel.org/linux-cve-announce/2024122751-CVE-2024-56659-6675@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56660", "url": "https://lore.kernel.org/linux-cve-announce/2024122751-CVE-2024-56660-fb9d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56661", "url": "https://lore.kernel.org/linux-cve-announce/2024122751-CVE-2024-56661-a403@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56662", "url": "https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56662-b7e7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56663", "url": "https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56663-66d7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56664", "url": "https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56664-9dc6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56665", "url": "https://lore.kernel.org/linux-cve-announce/2024122753-CVE-2024-56665-5df3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56666", "url": "https://lore.kernel.org/linux-cve-announce/2024122753-CVE-2024-56666-93aa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56667", "url": "https://lore.kernel.org/linux-cve-announce/2024122753-CVE-2024-56667-3c3f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56668", "url": "https://lore.kernel.org/linux-cve-announce/2024122754-CVE-2024-56668-0d8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56669", "url": "https://lore.kernel.org/linux-cve-announce/2024122754-CVE-2024-56669-2ea9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56670", "url": "https://lore.kernel.org/linux-cve-announce/2024122755-CVE-2024-56670-929d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56671", "url": "https://lore.kernel.org/linux-cve-announce/2024122755-CVE-2024-56671-89d8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56672", "url": "https://lore.kernel.org/linux-cve-announce/2024122755-CVE-2024-56672-8d29@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56673", "url": "https://lore.kernel.org/linux-cve-announce/2024122756-CVE-2024-56673-1ce5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56674", "url": "https://lore.kernel.org/linux-cve-announce/2024122756-CVE-2024-56674-8005@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56675", "url": "https://lore.kernel.org/linux-cve-announce/2024122756-CVE-2024-56675-e996@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56676", "url": "https://lore.kernel.org/linux-cve-announce/2024122829-CVE-2024-56676-0d17@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56677", "url": "https://lore.kernel.org/linux-cve-announce/2024122831-CVE-2024-56677-f922@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56678", "url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56678-977d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56679", "url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56679-02b5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56680", "url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56680-fac9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56681", "url": "https://lore.kernel.org/linux-cve-announce/2024122832-CVE-2024-56681-d0c0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56682", "url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56682-3219@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56683", "url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56683-14c3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56684", "url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56684-55a3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56685", "url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56685-f49e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56686", "url": "https://lore.kernel.org/linux-cve-announce/2024122833-CVE-2024-56686-b432@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56687", "url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56687-99e2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56688", "url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56688-4e02@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56689", "url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56689-69ca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56690", "url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56690-b77f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56691", "url": "https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56691-c981@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56692", "url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56692-e6ad@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56693", "url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56693-b3c6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56694", "url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56694-c701@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56695", "url": "https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56695-110a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56696", "url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56696-2b90@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56697", "url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56697-062c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56698", "url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56698-6b0b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56699", "url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56699-a3d3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56700", "url": "https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56700-d3d1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56701", "url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56701-d424@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56702", "url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56702-172d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56703", "url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56703-683a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56704", "url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56704-881e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56705", "url": "https://lore.kernel.org/linux-cve-announce/2024122837-CVE-2024-56705-049b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56706", "url": "https://lore.kernel.org/linux-cve-announce/2024122838-CVE-2024-56706-d292@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56707", "url": "https://lore.kernel.org/linux-cve-announce/2024122838-CVE-2024-56707-783f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56708", "url": "https://lore.kernel.org/linux-cve-announce/2024122838-CVE-2024-56708-2702@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56709", "url": "https://lore.kernel.org/linux-cve-announce/2024122918-CVE-2024-56709-655c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56710", "url": "https://lore.kernel.org/linux-cve-announce/2024122913-CVE-2024-56710-78af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56711", "url": "https://lore.kernel.org/linux-cve-announce/2024122913-CVE-2024-56711-d4f9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56712", "url": "https://lore.kernel.org/linux-cve-announce/2024122914-CVE-2024-56712-d62a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56713", "url": "https://lore.kernel.org/linux-cve-announce/2024122914-CVE-2024-56713-f78a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56714", "url": "https://lore.kernel.org/linux-cve-announce/2024122914-CVE-2024-56714-0de2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56715", "url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56715-7db1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56716", "url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56716-7a52@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56717", "url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56717-546c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56718", "url": "https://lore.kernel.org/linux-cve-announce/2024122915-CVE-2024-56718-be98@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56719", "url": "https://lore.kernel.org/linux-cve-announce/2024122916-CVE-2024-56719-609b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56720", "url": "https://lore.kernel.org/linux-cve-announce/2024122920-CVE-2024-56720-614a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56721", "url": "https://lore.kernel.org/linux-cve-announce/2024122922-CVE-2024-56721-aaac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56722", "url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56722-5594@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56723", "url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56723-f74b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56724", "url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56724-a800@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56725", "url": "https://lore.kernel.org/linux-cve-announce/2024122923-CVE-2024-56725-af15@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56726", "url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56726-3a9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56727", "url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56727-41d8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56728", "url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56728-68d7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56729", "url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56729-8f1c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56730", "url": "https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56730-3e54@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56739", "url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56739-0a67@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56740", "url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56740-6b7b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56741", "url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56741-3dbc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56742", "url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56742-b3d2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56743", "url": "https://lore.kernel.org/linux-cve-announce/2024122925-CVE-2024-56743-39a5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56744", "url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56744-fc8b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56745", "url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56745-b06b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56746", "url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56746-d329@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56747", "url": "https://lore.kernel.org/linux-cve-announce/2024122926-CVE-2024-56747-7c03@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56748", "url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56748-eb85@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56749", "url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56749-14d1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56750", "url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56750-db4d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56751", "url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56751-bcf3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56752", "url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56752-09d2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56753", "url": "https://lore.kernel.org/linux-cve-announce/2024122927-CVE-2024-56753-32df@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56754", "url": "https://lore.kernel.org/linux-cve-announce/2024122928-CVE-2024-56754-9c9d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56755", "url": "https://lore.kernel.org/linux-cve-announce/2024122928-CVE-2024-56755-b189@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-56756", "url": "https://lore.kernel.org/linux-cve-announce/2024122928-CVE-2024-56756-32fb@gregkh/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20018 vom 2025-01-13", "url": "https://linux.oracle.com/errata/ELSA-2025-20018.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20019 vom 2025-01-14", "url": "http://linux.oracle.com/errata/ELSA-2025-20019.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0152-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0203-1 vom 2025-01-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOWH4UGAPWTJ6YHNMWYKOS2OKUX53GLI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7221-1 vom 2025-01-22", "url": "https://ubuntu.com/security/notices/USN-7221-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0202-1 vom 2025-01-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BJBRXAP3YP5FGCBO64GJZN6ZQOUKD53F/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0230-1 vom 2025-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-061 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-061.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-079 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-079.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0231-1 vom 2025-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-195 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-195.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-062 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-062.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-197 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-197.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-196 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-196.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5860 vom 2025-02-08", "url": "https://lists.debian.org/debian-security-announce/2025/msg00023.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0428-1 vom 2025-02-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20100 vom 2025-02-13", "url": "https://linux.oracle.com/errata/ELSA-2025-20100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0517-1 vom 2025-02-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0499-1 vom 2025-02-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0556-1 vom 2025-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0557-1 vom 2025-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0555-1 vom 2025-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0564-1 vom 2025-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0577-1 vom 2025-02-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0576-1 vom 2025-02-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7277-1 vom 2025-02-19", "url": "https://ubuntu.com/security/notices/USN-7277-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7276-1 vom 2025-02-19", "url": "https://ubuntu.com/security/notices/USN-7276-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0603-1 vom 2025-02-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0517-2 vom 2025-02-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-094 vom 2025-02-25", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-094.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-063 vom 2025-02-25", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-063.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7310-1 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7310-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4076 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4075 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0771-1 vom 2025-03-03", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6X627UISONPV7CQLLHUDVJCDEIODQO4O/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7323-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7323-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7329-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7329-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7327-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7327-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0784-1 vom 2025-03-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7331-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7331-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7328-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7328-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-201 vom 2025-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-201.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-199 vom 2025-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-199.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7323-2 vom 2025-03-06", "url": "https://ubuntu.com/security/notices/USN-7323-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-200 vom 2025-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-200.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1961 vom 2025-03-06", "url": "https://alas.aws.amazon.com/ALAS-2025-1961.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2474 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2474" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2475 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2475" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2476 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2476" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2473 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2473" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2775 vom 2025-03-07", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2775.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2490 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2490" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2489 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2489" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2488 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2488" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2514 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2514" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2501 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2501" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2510 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2510" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2512 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2512" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2517 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2517" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2528 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2528" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2524 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2524" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2525 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2525" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20152 vom 2025-03-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20152.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-2473 vom 2025-03-11", "url": "https://linux.oracle.com/errata/ELSA-2025-2473.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2627 vom 2025-03-11", "url": "https://access.redhat.com/errata/RHSA-2025:2627" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2646 vom 2025-03-11", "url": "https://access.redhat.com/errata/RHSA-2025:2646" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0833-2 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020502.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0577-2 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0833-1 vom 2025-03-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVOTJPDFQQWPNLUFPKTQVNNMK5RQPZGP/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0835-1 vom 2025-03-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LBO7AHILADM6B4UZWMWGQKE6YTZU2AGF/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-2627 vom 2025-03-12", "url": "https://linux.oracle.com/errata/ELSA-2025-2627.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7328-2 vom 2025-03-13", "url": "https://ubuntu.com/security/notices/USN-7328-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020509.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-067 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-067.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OVTPVRIMWEEQPMDTJ24J7EW5NO7I4MQK/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0853-1 vom 2025-03-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020506.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-096 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-096.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-082 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-082.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0855-1 vom 2025-03-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OVTPVRIMWEEQPMDTJ24J7EW5NO7I4MQK/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7328-3 vom 2025-03-14", "url": "https://ubuntu.com/security/notices/USN-7328-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0867-1 vom 2025-03-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0886-1 vom 2025-03-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020529.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1966 vom 2025-03-17", "url": "https://alas.aws.amazon.com/ALAS-2025-1966.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2705 vom 2025-03-18", "url": "https://access.redhat.com/errata/RHSA-2025:2705" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0885-1 vom 2025-03-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020530.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0889-1 vom 2025-03-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020527.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0888-1 vom 2025-03-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020528.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0903-1 vom 2025-03-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020537.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0910-1 vom 2025-03-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PMKGYKPVAMPW4FP63FSEQWWVHEMWJQ4W/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0911-1 vom 2025-03-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OYWTACUZODLJ4QTEQCBEVWO6HSYPFPDZ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0919-1 vom 2025-03-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5CDUDOQ553DU7Q7RIVM54ETDEW7FBDXH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0917-1 vom 2025-03-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4QSDDY3MMRA6J6OVKONDM3ZBWSDU7FXC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0906-1 vom 2025-03-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020539.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2710 vom 2025-03-20", "url": "https://access.redhat.com/errata/RHSA-2025:2710" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0949-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020555.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0946-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020557.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0945-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0937-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020547.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0929-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020549.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0962-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020561.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0920-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020553.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0950-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020556.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0952-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020554.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0922-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020552.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2696 vom 2025-03-19", "url": "https://access.redhat.com/errata/RHSA-2025:2696" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2701 vom 2025-03-20", "url": "https://access.redhat.com/errata/RHSA-2025:2701" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20190 vom 2025-03-21", "url": "https://linux.oracle.com/errata/ELSA-2025-20190.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0983-1 vom 2025-03-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020579.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2800 vom 2025-03-26", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2800.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3055 vom 2025-03-26", "url": "https://access.redhat.com/errata/RHSA-2025:3055" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0110-1 vom 2025-03-26", "url": "https://ubuntu.com/security/notices/LSN-0110-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7385-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7385-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7383-2 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7383-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7383-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7383-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7382-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7382-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7387-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7381-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7381-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7386-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7386-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7380-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7380-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7384-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7384-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7379-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7379-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7391-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7392-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7393-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7392-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-2501 vom 2025-03-31", "url": "https://linux.oracle.com/errata/ELSA-2025-2501.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4102 vom 2025-04-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7384-2 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7384-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7379-2 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7379-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7392-4" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-087 vom 2025-04-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-087.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7401-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7402-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7392-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-2 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7402-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7403-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7403-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3301 vom 2025-04-03", "url": "https://access.redhat.com/errata/RHSA-2025:3301" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7408-2 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7408-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7408-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-3 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7406-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7407-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7406-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-2 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7406-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-4 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7406-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7413-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7415-1 vom 2025-04-04", "url": "https://ubuntu.com/security/notices/USN-7415-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-3 vom 2025-04-04", "url": "https://ubuntu.com/security/notices/USN-7402-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7420-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7420-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-5 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7406-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7421-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7408-3 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7408-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7406-6 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7406-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-4 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7402-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7408-4 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7408-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7428-2 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7428-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7428-1 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7428-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7429-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7429-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1194-1 vom 2025-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1195-1 vom 2025-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020680.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3573 vom 2025-04-10", "url": "https://access.redhat.com/errata/RHSA-2025:3573" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1213-1 vom 2025-04-14", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/64D5YFJLDESGQOR3OGPOEV5S4M3DYYAU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1207-1 vom 2025-04-14", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DECHNUXZTJLZSS6KYZ73PAZINXEFVAXW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1225-1 vom 2025-04-14", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMQIDOZZ3LRBGKAI3UWUKDCXNJWRXYGY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1214-1 vom 2025-04-14", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/E5GKFXZBQHJUTREIB4A5EOCW6NL3FDET/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20270 vom 2025-04-14", "url": "https://linux.oracle.com/errata/ELSA-2025-20270.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1236-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020691.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1232-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020692.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1231-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020693.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1257-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020699.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1259-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020698.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1248-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020697.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1238-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020690.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1252-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020696.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1254-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020695.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1260-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5C772I5KLAAUMXFCSPXGHE5ETFPZGIIY/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20271 vom 2025-04-14", "url": "https://linux.oracle.com/errata/ELSA-2025-20271.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1276-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HNHWRAKE373CKVYIQLYK32RFAKCWRO3X/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1275-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RNXRVNMFX7NWUIAIFLJ6AM3Z2KVVN44B/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1278-1 vom 2025-04-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020701.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1262-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YQ5OGGLUK4JYNQDMHQJCE7NAM5KWAUQ6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1263-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q4U3LRNKLFTX56NC6NKHFDU35E5WDD75/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0111-1 vom 2025-04-16", "url": "https://ubuntu.com/security/notices/LSN-0111-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2826 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2826.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1970 vom 2025-04-17", "url": "https://alas.aws.amazon.com/ALAS-2025-1970.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7402-5 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7402-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7450-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7453-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7452-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7451-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7449-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7455-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7455-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7462-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7462-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7449-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7460-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7460-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7459-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7455-3 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7455-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7461-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7461-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7462-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7462-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7455-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7455-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7461-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7461-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7463-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7458-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7455-4 vom 2025-04-25", "url": "https://ubuntu.com/security/notices/USN-7455-4" }, { "category": "external", "summary": "IBM Security Bulletin 7231915 vom 2025-04-26", "url": "https://www.ibm.com/support/pages/node/7231915" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7468-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1392-1 vom 2025-04-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020747.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1385-1 vom 2025-04-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020749.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1387-1 vom 2025-04-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020748.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7455-5 vom 2025-04-29", "url": "https://ubuntu.com/security/notices/USN-7455-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7459-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1402-1 vom 2025-04-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020751.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-228 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-228.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-226 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-226.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-227 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-227.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1408-1 vom 2025-04-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020752.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1403-1 vom 2025-04-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020753.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1416-1 vom 2025-04-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020756.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1423-1 vom 2025-05-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020762.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1425-1 vom 2025-05-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020761.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1418-1 vom 2025-04-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020757.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1422-1 vom 2025-04-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020760.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7461-3 vom 2025-05-02", "url": "https://ubuntu.com/security/notices/USN-7461-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7475-1 vom 2025-05-02", "url": "https://ubuntu.com/security/notices/USN-7475-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1444-1 vom 2025-05-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VYATS2QSLTZMNBKYQXKCWJV5AF5Z5P22/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1445-1 vom 2025-05-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GPMTFUDWFWZSMC6NLZLZHEWKB34AHTSR/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1444-1 vom 2025-05-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYATS2QSLTZMNBKYQXKCWJV5AF5Z5P22/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1448-1 vom 2025-05-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/K6HQ3R43TDF2TCZD7MI4L7EGIC7Q62S4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1449-1 vom 2025-05-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7FXV2VJ2RQ3IILO3YRZFLSX7MF3HEXSP/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7492-2 vom 2025-05-06", "url": "https://ubuntu.com/security/notices/USN-7492-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7492-1 vom 2025-05-06", "url": "https://ubuntu.com/security/notices/USN-7492-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7498-1 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7498-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7500-1 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7500-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7500-2 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7500-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1467-1 vom 2025-05-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020788.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1468-1 vom 2025-05-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020787.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1463-1 vom 2025-05-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020789.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1454-1 vom 2025-05-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020790.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20320 vom 2025-05-12", "url": "https://linux.oracle.com/errata/ELSA-2025-20320.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13", "url": "https://ubuntu.com/security/notices/USN-7506-4" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-091 vom 2025-05-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-091.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7515-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7514-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7513-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1574-1 vom 2025-05-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7516-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7510-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7510-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7513-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7512-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7511-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7511-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7517-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7518-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7523-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7511-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7516-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7513-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7522-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7515-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21", "url": "https://ubuntu.com/security/notices/USN-7517-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21", "url": "https://ubuntu.com/security/notices/USN-7516-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01633-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020864.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23", "url": "https://ubuntu.com/security/notices/USN-7516-5" }, { "category": "external", "summary": "Debian Security Advisory DSA-5925 vom 2025-05-24", "url": "https://lists.debian.org/debian-security-announce/2025/msg00088.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7517-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7524-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7516-6" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27", "url": "https://ubuntu.com/security/notices/USN-7510-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-4 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7513-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7510-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20341-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020967.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7510-8" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-5 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7513-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-8" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-9" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0112-1 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/LSN-0112-1" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30", "url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20369-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021005.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7550-3 vom 2025-06-03", "url": "https://ubuntu.com/security/notices/USN-7550-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7550-1 vom 2025-06-03", "url": "https://ubuntu.com/security/notices/USN-7550-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7550-2 vom 2025-06-03", "url": "https://ubuntu.com/security/notices/USN-7550-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20285-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20284-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021042.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20314-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021026.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20315-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20191-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20215-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021115.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7550-4 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7550-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20212-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021119.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20211-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021121.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20213-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021118.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20214-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021116.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7550-5 vom 2025-06-05", "url": "https://ubuntu.com/security/notices/USN-7550-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06", "url": "https://ubuntu.com/security/notices/USN-7553-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7550-6 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7550-6" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-6" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01918-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7550-7 vom 2025-06-13", "url": "https://ubuntu.com/security/notices/USN-7550-7" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01966-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01982-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021539.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-2 vom 2025-06-19", "url": "https://ubuntu.com/security/notices/USN-7585-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-1 vom 2025-06-19", "url": "https://ubuntu.com/security/notices/USN-7585-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01995-1 vom 2025-06-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021572.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7592-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7592-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7593-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-3 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-2 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02069-1 vom 2025-06-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021622.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02073-1 vom 2025-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021623.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02072-1 vom 2025-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021624.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02071-1 vom 2025-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021625.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02070-1 vom 2025-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021626.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02096-1 vom 2025-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021636.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02095-1 vom 2025-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021637.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7598-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7598-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02077-1 vom 2025-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021629.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-4 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7597-2 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7597-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02087-1 vom 2025-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021628.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02075-1 vom 2025-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021631.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02076-1 vom 2025-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021630.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7597-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7597-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02108-1 vom 2025-06-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021649.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02111-1 vom 2025-06-25", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTV4XGEFYU2GZJS4ZQIBBOKJWQIXDQJJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02108-1 vom 2025-06-25", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCVY72CXQLVJY2VD2EIDSTAZLUFI6CIO/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-3 vom 2025-06-25", "url": "https://ubuntu.com/security/notices/USN-7585-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02110-1 vom 2025-06-25", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XSASUFU5IZ24MONOJWS4YJZUGRBEES3R/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02101-1 vom 2025-06-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021646.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02110-1 vom 2025-06-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021648.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02107-1 vom 2025-06-25", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DMJTJUWG5IUM6EPLUAS2XU22IPHTBLMK/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-4 vom 2025-06-25", "url": "https://ubuntu.com/security/notices/USN-7585-4" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9584 vom 2025-06-25", "url": "https://access.redhat.com/errata/RHSA-2025:9584" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02106-1 vom 2025-06-25", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKDDBGC6VTCRFMP6WM6AA5JMRG6RDG4B/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02116-1 vom 2025-06-25", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AAQLUV5OW5RLJANJU3SMJEALS56RYAZ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02117-1 vom 2025-06-25", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KCGW37UJYNLW5YSZKM6WHKZJ32OWUQZE/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02112-1 vom 2025-06-25", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5C3JTUDN7WKVOE6UEUI2ASU6GVQEQIR6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02113-1 vom 2025-06-25", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OAB33RMXHG7GA2UKQ5SZBHUE3BNA54QZ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02125-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021662.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02127-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021660.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02142-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021685.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02139-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021687.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02126-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021661.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02145-1 vom 2025-06-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021689.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02124-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021663.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02138-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021669.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20438-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021671.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02132-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021657.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26", "url": "https://ubuntu.com/security/notices/USN-7602-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02144-1 vom 2025-06-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021690.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02136-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021682.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20436-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021673.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20437-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021672.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02145-1 vom 2025-06-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/44Y2SH5QFQ55KDYSCFH7PBEZTUZ6DGOC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02134-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021684.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20434-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021675.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20431-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021676.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02144-1 vom 2025-06-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVSWMKBSSS2LFR3HYHQ3ZFKEJE76ALSX/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02140-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021686.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02131-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021658.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02128-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021659.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20435-1 vom 2025-06-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021674.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02157-1 vom 2025-06-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021696.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02156-1 vom 2025-06-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021697.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02162-1 vom 2025-06-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021702.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02154-1 vom 2025-06-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021695.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02155-1 vom 2025-06-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021694.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02161-1 vom 2025-06-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021703.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7606-1 vom 2025-06-30", "url": "https://ubuntu.com/security/notices/USN-7606-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02173-1 vom 2025-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021714.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7605-1 vom 2025-06-30", "url": "https://ubuntu.com/security/notices/USN-7605-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20451-1 vom 2025-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021716.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20450-1 vom 2025-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021717.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02171-1 vom 2025-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021711.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20449-1 vom 2025-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021718.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20448-1 vom 2025-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021719.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-5 vom 2025-06-30", "url": "https://ubuntu.com/security/notices/USN-7585-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7607-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01", "url": "https://ubuntu.com/security/notices/USN-7607-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-6 vom 2025-07-03", "url": "https://ubuntu.com/security/notices/USN-7585-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7605-2 vom 2025-07-04", "url": "https://ubuntu.com/security/notices/USN-7605-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-5 vom 2025-07-04", "url": "https://ubuntu.com/security/notices/USN-7591-5" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10536 vom 2025-07-08", "url": "https://access.redhat.com/errata/RHSA-2025:10536" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10547 vom 2025-07-08", "url": "https://access.redhat.com/errata/RHSA-2025:10547" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08", "url": "https://linux.oracle.com/errata/ELSA-2025-20406.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7628-1 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7628-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7627-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08", "url": "https://ubuntu.com/security/notices/USN-7627-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7607-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10701 vom 2025-07-09", "url": "https://access.redhat.com/errata/RHSA-2025:10701" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02262-1 vom 2025-07-10", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B53IHD74IRNJDAOHBW4L7JGWNOM26XE7/" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0113-1 vom 2025-07-10", "url": "https://ubuntu.com/security/notices/LSN-0113-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-7 vom 2025-07-16", "url": "https://ubuntu.com/security/notices/USN-7585-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16", "url": "https://ubuntu.com/security/notices/USN-7640-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-6 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7591-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20480 vom 2025-07-18", "url": "https://linux.oracle.com/errata/ELSA-2025-20480.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02388-1 vom 2025-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021860.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02387-1 vom 2025-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021861.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02389-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021882.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02400-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFZK6V3WCARPDN2N3X7GFGJTK7UFSP6T/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02399-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76DMKQMABVDV4KDJA6FQ7PDOF7RSG4ZQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02412-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021866.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02411-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DEKG43SVEEUNQXJBCRXWGSWJ6NQ36NUC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02401-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2CTS27REDRGOT26DT2AKNCWHEMLXFPV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02396-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021876.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02391-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021880.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02390-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021881.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02403-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXLF63OLKSA5LWF3BYMVRASA55GHVYJY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02398-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZIQSMDCERQHP4JSQ3YSIO5TMBD637EV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02410-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7JYI4RKW2E7EB4ZJ6UB45TTF2H6PEYR/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02419-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02444-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAPR5ITSSKHG4EAWNWSLSEMDSVTCH3CA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02434-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HM6XIBRQQ4DT55UN4XNTKFRWGXRY73A5/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02449-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOIECZ42HAJGKZ7TVGI4LLLNAG27ZF7L/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02440-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON72ZMOEO6E3K3KZFRVFHX5LUYA6RAXJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02455-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2GXZ2EL5OVKMNFWDPFV7NT367YYOFZO/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02445-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYJ3O67PBJST6GKMJJXDEBLGGDV5KJKJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02433-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021883.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02446-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYAKCPI3CQKIWHWVXLDBJMK5CDOB5VRS/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20483-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021917.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02454-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NNLH3GVII5RPJKDTSNRRAF2IHEZBWAO/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02451-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22P3K2RHZ424E6JGDSKSXUABXRESY6GY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20475-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021919.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02422-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021884.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02420-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021886.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02436-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOC4XFCSYMATM6FYIQWRDFK5AQF4P2LT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02428-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021889.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02418-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021888.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02416-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021890.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02415-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021891.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02459-1 vom 2025-07-22", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNBGONL5CBCKJ2ZQN6XVJFDFNJMHMLDW/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02456-1 vom 2025-07-22", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCEGUU6PQXBO5WEH74GQ5P4FSONEMFGS/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02467-1 vom 2025-07-22", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZCR5NTS22PVXMTMTOFQXV2RRHUGOQ4D/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02467-1 vom 2025-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021927.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02469-1 vom 2025-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021928.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02468-1 vom 2025-07-22", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7LXLV4ZFW2U2LQ7EL4MR5BCEPMCAILY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02469-1 vom 2025-07-22", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DKYAAHCQKONWNPOMLWYIWZDCCWMTQKBP/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02470-1 vom 2025-07-23", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y3SXNMZSQJRSJC7GHMSO7X66MBDIIFEC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02507-1 vom 2025-07-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021949.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20498-1 vom 2025-07-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021965.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25", "url": "https://ubuntu.com/security/notices/USN-7671-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20493-1 vom 2025-07-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021967.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7671-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7684-1 vom 2025-07-31", "url": "https://ubuntu.com/security/notices/USN-7684-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7684-2 vom 2025-07-31", "url": "https://ubuntu.com/security/notices/USN-7684-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7684-3 vom 2025-07-31", "url": "https://ubuntu.com/security/notices/USN-7684-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02601-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022048.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02604-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022046.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02607-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOXFW6IMLHSFMN655UONMR2V76DWL7LG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02610-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRIUGMNHYH2DWCCLRZ5NFTLFBXQCRTE6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02618-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022014.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20527-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20526-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022026.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20525-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022027.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20517-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022034.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20519-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022032.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20518-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022033.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02632-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6QW6TXS545RIQWDHD4QUITTGGA4K6MY/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02638-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT3EVLQ3E46O7RVXSFVUBEM6JEJUWQI4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02627-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HNZG2UKJBSDT23RIH4WSPIP5XJJH7AQ/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02648-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKXBRO2HUJQNRZTJLJHZC32ZUUQLD7RS/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02673-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPKQ4BU54XGSANMAROPDJAEFKO2OEKKP/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04", "url": "https://ubuntu.com/security/notices/USN-7671-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02636-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CZW4BWHO76REHV7LNO6WHLF4JRL7WMEJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02652-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPV72PULRBVAYNVLOGDPAXEYAOLJPHYQ/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02688-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NCR2KWOE2L5E5ZMBPLRQ3ZRAPKHOJX5/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02691-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HQYM2FGJQXM5CJJ3L6LDY723WGAYBFPL/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20545-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022099.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20540-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022104.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20541-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022103.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20544-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02697-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4DC3XA5ITEIHVOJ5XXILV3NMSJPM3PS2/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02698-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TM2FOPKL26WFLLS5YFPKON7STKP3HL4I/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13598 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13598" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20521 vom 2025-08-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20521.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-13589 vom 2025-08-12", "url": "https://linux.oracle.com/errata/ELSA-2025-13589.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4271 vom 2025-08-13", "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-08-12T22:00:00.000+00:00", "generator": { "date": "2025-08-13T06:32:41.494+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-3762", "initial_release_date": "2024-12-29T23:00:00.000+00:00", "revision_history": [ { "date": "2024-12-29T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-01-15T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-19T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-21T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-01-26T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-03T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-09T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-02-11T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-12T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-16T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-17T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-19T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-20T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-04T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-05T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-03-06T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2025-03-09T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat und Amazon aufgenommen" }, { "date": "2025-03-10T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-12T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-13T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2025-03-16T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-17T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von SUSE, Amazon und Red Hat aufgenommen" }, { "date": "2025-03-18T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-19T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2025-03-20T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-03-23T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-25T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-26T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-31T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu und Amazon aufgenommen" }, { "date": "2025-04-02T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-06T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-07T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-04-10T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2025-04-13T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-14T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-04-15T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-16T22:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Ubuntu und Amazon aufgenommen" }, { "date": "2025-04-21T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-04-22T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-23T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-27T22:00:00.000+00:00", "number": "58", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "60", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2025-05-01T22:00:00.000+00:00", "number": "61", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-04T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-06T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-07T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-12T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Red Hat und Amazon aufgenommen" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-05-19T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-05-22T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-25T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "73", "summary": "Neue Updates von SUSE, Ubuntu und Debian aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "74", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "75", "summary": "Neue Updates von Amazon, Debian, SUSE und Ubuntu aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "76", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-05T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von Ubuntu und Amazon aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-12T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-19T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-06-24T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-06-25T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von SUSE, Ubuntu und Red Hat aufgenommen" }, { "date": "2025-06-26T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-06-29T22:00:00.000+00:00", "number": "91", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "92", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-07-01T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-03T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-06T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-07T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "97", "summary": "Neue Updates von Oracle Linux, SUSE und Ubuntu aufgenommen" }, { "date": "2025-07-09T22:00:00.000+00:00", "number": "98", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "99", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "100", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "101", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "102", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "103", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "104", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "105", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-22T22:00:00.000+00:00", "number": "106", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-23T22:00:00.000+00:00", "number": "107", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-27T22:00:00.000+00:00", "number": "108", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "109", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "110", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "111", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "112", "summary": "Referenz(en) aufgenommen:" }, { "date": "2025-08-03T22:00:00.000+00:00", "number": "113", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "114", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "115", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-08-10T22:00:00.000+00:00", "number": "116", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-11T22:00:00.000+00:00", "number": "117", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "118", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "118" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Avamar", "product": { "name": "Dell Avamar", "product_id": "T039664", "product_identification_helper": { "cpe": "cpe:/a:dell:avamar:-" } } }, { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP11 IF04", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04", "product_id": "T043169" } }, { "category": "product_version", "name": "7.5.0 UP11 IF04", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11 IF04", "product_id": "T043169-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T008144", "product_identification_helper": { "cpe": "cpe:/a:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T042774", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "Container Platform \u003c4.13.56", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.13.56", "product_id": "T042009" } }, { "category": "product_version", "name": "Container Platform 4.13.56", "product": { "name": "Red Hat OpenShift Container Platform 4.13.56", "product_id": "T042009-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.56" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.49", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.49", "product_id": "T042010" } }, { "category": "product_version", "name": "Container Platform 4.14.49", "product": { "name": "Red Hat OpenShift Container Platform 4.14.49", "product_id": "T042010-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.49" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.16.38", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.16.38", "product_id": "T042315" } }, { "category": "product_version", "name": "Container Platform 4.16.38", "product": { "name": "Red Hat OpenShift Container Platform 4.16.38", "product_id": "T042315-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.16.38" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.12.75", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.75", "product_id": "T042745" } }, { "category": "product_version", "name": "Container Platform 4.12.75", "product": { "name": "Red Hat OpenShift Container Platform 4.12.75", "product_id": "T042745-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.75" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T042775", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-53172", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53172" }, { "cve": "CVE-2024-53176", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53176" }, { "cve": "CVE-2024-53178", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53178" }, { "cve": "CVE-2024-53179", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53179" }, { "cve": "CVE-2024-53180", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53180" }, { "cve": "CVE-2024-53181", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53181" }, { "cve": "CVE-2024-53182", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53182" }, { "cve": "CVE-2024-53183", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53183" }, { "cve": "CVE-2024-53184", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53184" }, { "cve": "CVE-2024-53185", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53185" }, { "cve": "CVE-2024-53186", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53186" }, { "cve": "CVE-2024-53187", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53187" }, { "cve": "CVE-2024-53188", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53188" }, { "cve": "CVE-2024-53189", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53189" }, { "cve": "CVE-2024-53191", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53191" }, { "cve": "CVE-2024-53194", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53194" }, { "cve": "CVE-2024-53195", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53195" }, { "cve": "CVE-2024-53196", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53196" }, { "cve": "CVE-2024-53197", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53197" }, { "cve": "CVE-2024-53198", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53198" }, { "cve": "CVE-2024-53199", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53199" }, { "cve": "CVE-2024-53200", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53200" }, { "cve": "CVE-2024-53201", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53201" }, { "cve": "CVE-2024-53202", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53202" }, { "cve": "CVE-2024-53203", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53203" }, { "cve": "CVE-2024-53204", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53204" }, { "cve": "CVE-2024-53205", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53205" }, { "cve": "CVE-2024-53206", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53206" }, { "cve": "CVE-2024-53207", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53207" }, { "cve": "CVE-2024-53208", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53208" }, { "cve": "CVE-2024-53209", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53209" }, { "cve": "CVE-2024-53210", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53210" }, { "cve": "CVE-2024-53211", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53211" }, { "cve": "CVE-2024-53212", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53212" }, { "cve": "CVE-2024-53213", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53213" }, { "cve": "CVE-2024-53214", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53214" }, { "cve": "CVE-2024-53215", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53215" }, { "cve": "CVE-2024-53216", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53216" }, { "cve": "CVE-2024-53217", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53217" }, { "cve": "CVE-2024-53218", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53218" }, { "cve": "CVE-2024-53219", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53219" }, { "cve": "CVE-2024-53220", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53220" }, { "cve": "CVE-2024-53221", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53221" }, { "cve": "CVE-2024-53222", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53222" }, { "cve": "CVE-2024-53223", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53223" }, { "cve": "CVE-2024-53224", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53224" }, { "cve": "CVE-2024-53225", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53225" }, { "cve": "CVE-2024-53226", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53226" }, { "cve": "CVE-2024-53227", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53227" }, { "cve": "CVE-2024-53228", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53228" }, { "cve": "CVE-2024-53229", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53229" }, { "cve": "CVE-2024-53230", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53230" }, { "cve": "CVE-2024-53231", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53231" }, { "cve": "CVE-2024-53232", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53232" }, { "cve": "CVE-2024-53233", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53233" }, { "cve": "CVE-2024-53234", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53234" }, { "cve": "CVE-2024-53235", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53235" }, { "cve": "CVE-2024-53236", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53236" }, { "cve": "CVE-2024-53237", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53237" }, { "cve": "CVE-2024-53238", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53238" }, { "cve": "CVE-2024-53239", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-53239" }, { "cve": "CVE-2024-56531", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56531" }, { "cve": "CVE-2024-56532", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56532" }, { "cve": "CVE-2024-56533", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56533" }, { "cve": "CVE-2024-56534", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56534" }, { "cve": "CVE-2024-56535", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56535" }, { "cve": "CVE-2024-56536", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56536" }, { "cve": "CVE-2024-56537", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56537" }, { "cve": "CVE-2024-56538", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56538" }, { "cve": "CVE-2024-56539", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56539" }, { "cve": "CVE-2024-56540", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56540" }, { "cve": "CVE-2024-56541", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56541" }, { "cve": "CVE-2024-56542", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56542" }, { "cve": "CVE-2024-56543", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56543" }, { "cve": "CVE-2024-56544", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56544" }, { "cve": "CVE-2024-56545", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56545" }, { "cve": "CVE-2024-56546", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56546" }, { "cve": "CVE-2024-56547", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56547" }, { "cve": "CVE-2024-56548", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56548" }, { "cve": "CVE-2024-56549", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56549" }, { "cve": "CVE-2024-56550", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56550" }, { "cve": "CVE-2024-56551", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56551" }, { "cve": "CVE-2024-56552", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56552" }, { "cve": "CVE-2024-56553", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56553" }, { "cve": "CVE-2024-56554", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56554" }, { "cve": "CVE-2024-56555", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56555" }, { "cve": "CVE-2024-56556", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56556" }, { "cve": "CVE-2024-56557", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56557" }, { "cve": "CVE-2024-56558", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56558" }, { "cve": "CVE-2024-56559", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56559" }, { "cve": "CVE-2024-56560", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56560" }, { "cve": "CVE-2024-56561", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56561" }, { "cve": "CVE-2024-56562", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56562" }, { "cve": "CVE-2024-56563", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56563" }, { "cve": "CVE-2024-56564", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56564" }, { "cve": "CVE-2024-56565", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56565" }, { "cve": "CVE-2024-56566", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56566" }, { "cve": "CVE-2024-56567", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56567" }, { "cve": "CVE-2024-56568", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56568" }, { "cve": "CVE-2024-56569", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56569" }, { "cve": "CVE-2024-56570", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56570" }, { "cve": "CVE-2024-56571", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56571" }, { "cve": "CVE-2024-56572", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56572" }, { "cve": "CVE-2024-56573", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56573" }, { "cve": "CVE-2024-56574", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56574" }, { "cve": "CVE-2024-56575", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56575" }, { "cve": "CVE-2024-56576", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56576" }, { "cve": "CVE-2024-56577", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56577" }, { "cve": "CVE-2024-56578", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56578" }, { "cve": "CVE-2024-56579", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56579" }, { "cve": "CVE-2024-56580", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56580" }, { "cve": "CVE-2024-56581", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56581" }, { "cve": "CVE-2024-56582", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56582" }, { "cve": "CVE-2024-56583", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56583" }, { "cve": "CVE-2024-56584", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56584" }, { "cve": "CVE-2024-56585", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56585" }, { "cve": "CVE-2024-56586", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56586" }, { "cve": "CVE-2024-56587", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56587" }, { "cve": "CVE-2024-56588", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56588" }, { "cve": "CVE-2024-56589", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56589" }, { "cve": "CVE-2024-56590", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56590" }, { "cve": "CVE-2024-56591", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56591" }, { "cve": "CVE-2024-56592", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56592" }, { "cve": "CVE-2024-56593", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56593" }, { "cve": "CVE-2024-56594", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56594" }, { "cve": "CVE-2024-56595", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56595" }, { "cve": "CVE-2024-56596", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56596" }, { "cve": "CVE-2024-56597", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56597" }, { "cve": "CVE-2024-56598", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56598" }, { "cve": "CVE-2024-56599", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56599" }, { "cve": "CVE-2024-56600", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56600" }, { "cve": "CVE-2024-56601", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56601" }, { "cve": "CVE-2024-56602", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56602" }, { "cve": "CVE-2024-56603", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56603" }, { "cve": "CVE-2024-56604", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56604" }, { "cve": "CVE-2024-56605", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56605" }, { "cve": "CVE-2024-56606", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56606" }, { "cve": "CVE-2024-56607", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56607" }, { "cve": "CVE-2024-56608", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56608" }, { "cve": "CVE-2024-56609", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56609" }, { "cve": "CVE-2024-56610", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56610" }, { "cve": "CVE-2024-56611", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56611" }, { "cve": "CVE-2024-56612", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56612" }, { "cve": "CVE-2024-56613", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56613" }, { "cve": "CVE-2024-56614", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56614" }, { "cve": "CVE-2024-56615", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56615" }, { "cve": "CVE-2024-56616", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56616" }, { "cve": "CVE-2024-56617", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56617" }, { "cve": "CVE-2024-56618", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56618" }, { "cve": "CVE-2024-56619", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56619" }, { "cve": "CVE-2024-56620", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56620" }, { "cve": "CVE-2024-56621", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56621" }, { "cve": "CVE-2024-56622", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56622" }, { "cve": "CVE-2024-56623", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56623" }, { "cve": "CVE-2024-56624", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56624" }, { "cve": "CVE-2024-56625", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56625" }, { "cve": "CVE-2024-56626", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56626" }, { "cve": "CVE-2024-56627", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56627" }, { "cve": "CVE-2024-56628", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56628" }, { "cve": "CVE-2024-56629", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56629" }, { "cve": "CVE-2024-56630", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56630" }, { "cve": "CVE-2024-56631", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56631" }, { "cve": "CVE-2024-56632", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56632" }, { "cve": "CVE-2024-56633", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56633" }, { "cve": "CVE-2024-56634", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56634" }, { "cve": "CVE-2024-56635", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56635" }, { "cve": "CVE-2024-56636", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56636" }, { "cve": "CVE-2024-56637", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56637" }, { "cve": "CVE-2024-56638", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56638" }, { "cve": "CVE-2024-56639", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56639" }, { "cve": "CVE-2024-56640", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56640" }, { "cve": "CVE-2024-56641", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56641" }, { "cve": "CVE-2024-56642", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56642" }, { "cve": "CVE-2024-56643", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56643" }, { "cve": "CVE-2024-56644", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56644" }, { "cve": "CVE-2024-56645", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56645" }, { "cve": "CVE-2024-56646", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56646" }, { "cve": "CVE-2024-56647", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56647" }, { "cve": "CVE-2024-56648", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56648" }, { "cve": "CVE-2024-56649", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56649" }, { "cve": "CVE-2024-56650", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56650" }, { "cve": "CVE-2024-56651", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56651" }, { "cve": "CVE-2024-56652", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56652" }, { "cve": "CVE-2024-56653", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56653" }, { "cve": "CVE-2024-56654", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56654" }, { "cve": "CVE-2024-56655", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56655" }, { "cve": "CVE-2024-56656", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56656" }, { "cve": "CVE-2024-56657", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56657" }, { "cve": "CVE-2024-56658", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56658" }, { "cve": "CVE-2024-56659", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56659" }, { "cve": "CVE-2024-56660", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56660" }, { "cve": "CVE-2024-56661", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56661" }, { "cve": "CVE-2024-56662", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56662" }, { "cve": "CVE-2024-56663", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56663" }, { "cve": "CVE-2024-56664", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56664" }, { "cve": "CVE-2024-56665", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56665" }, { "cve": "CVE-2024-56666", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56666" }, { "cve": "CVE-2024-56667", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56667" }, { "cve": "CVE-2024-56668", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56668" }, { "cve": "CVE-2024-56669", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56669" }, { "cve": "CVE-2024-56670", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56670" }, { "cve": "CVE-2024-56671", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56671" }, { "cve": "CVE-2024-56672", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56672" }, { "cve": "CVE-2024-56673", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56673" }, { "cve": "CVE-2024-56674", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56674" }, { "cve": "CVE-2024-56675", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56675" }, { "cve": "CVE-2024-56676", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56676" }, { "cve": "CVE-2024-56677", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56677" }, { "cve": "CVE-2024-56678", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56678" }, { "cve": "CVE-2024-56679", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56679" }, { "cve": "CVE-2024-56680", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56680" }, { "cve": "CVE-2024-56681", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56681" }, { "cve": "CVE-2024-56682", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56682" }, { "cve": "CVE-2024-56683", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56683" }, { "cve": "CVE-2024-56684", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56684" }, { "cve": "CVE-2024-56685", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56685" }, { "cve": "CVE-2024-56686", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56686" }, { "cve": "CVE-2024-56687", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56687" }, { "cve": "CVE-2024-56688", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56688" }, { "cve": "CVE-2024-56689", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56689" }, { "cve": "CVE-2024-56690", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56690" }, { "cve": "CVE-2024-56691", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56691" }, { "cve": "CVE-2024-56692", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56692" }, { "cve": "CVE-2024-56693", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56693" }, { "cve": "CVE-2024-56694", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56694" }, { "cve": "CVE-2024-56695", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56695" }, { "cve": "CVE-2024-56696", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56696" }, { "cve": "CVE-2024-56697", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56697" }, { "cve": "CVE-2024-56698", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56698" }, { "cve": "CVE-2024-56699", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56699" }, { "cve": "CVE-2024-56700", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56700" }, { "cve": "CVE-2024-56701", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56701" }, { "cve": "CVE-2024-56702", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56702" }, { "cve": "CVE-2024-56703", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56703" }, { "cve": "CVE-2024-56704", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56704" }, { "cve": "CVE-2024-56705", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56705" }, { "cve": "CVE-2024-56706", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56706" }, { "cve": "CVE-2024-56707", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56707" }, { "cve": "CVE-2024-56708", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56708" }, { "cve": "CVE-2024-56709", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56709" }, { "cve": "CVE-2024-56710", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56710" }, { "cve": "CVE-2024-56711", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56711" }, { "cve": "CVE-2024-56712", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56712" }, { "cve": "CVE-2024-56713", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56713" }, { "cve": "CVE-2024-56714", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56714" }, { "cve": "CVE-2024-56715", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56715" }, { "cve": "CVE-2024-56716", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56716" }, { "cve": "CVE-2024-56717", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56717" }, { "cve": "CVE-2024-56718", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56718" }, { "cve": "CVE-2024-56719", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56719" }, { "cve": "CVE-2024-56720", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56720" }, { "cve": "CVE-2024-56721", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56721" }, { "cve": "CVE-2024-56722", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56722" }, { "cve": "CVE-2024-56723", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56723" }, { "cve": "CVE-2024-56724", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56724" }, { "cve": "CVE-2024-56725", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56725" }, { "cve": "CVE-2024-56726", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56726" }, { "cve": "CVE-2024-56727", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56727" }, { "cve": "CVE-2024-56728", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56728" }, { "cve": "CVE-2024-56729", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56729" }, { "cve": "CVE-2024-56730", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56730" }, { "cve": "CVE-2024-56739", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56739" }, { "cve": "CVE-2024-56740", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56740" }, { "cve": "CVE-2024-56741", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56741" }, { "cve": "CVE-2024-56742", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56742" }, { "cve": "CVE-2024-56743", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56743" }, { "cve": "CVE-2024-56744", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56744" }, { "cve": "CVE-2024-56745", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56745" }, { "cve": "CVE-2024-56746", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56746" }, { "cve": "CVE-2024-56747", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56747" }, { "cve": "CVE-2024-56748", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56748" }, { "cve": "CVE-2024-56749", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56749" }, { "cve": "CVE-2024-56750", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56750" }, { "cve": "CVE-2024-56751", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56751" }, { "cve": "CVE-2024-56752", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56752" }, { "cve": "CVE-2024-56753", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56753" }, { "cve": "CVE-2024-56754", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56754" }, { "cve": "CVE-2024-56755", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56755" }, { "cve": "CVE-2024-56756", "product_status": { "known_affected": [ "67646", "T034583", "T004914", "T039664", "T043169", "T042774", "T042775", "2951", "T002207", "T042315", "T000126", "T042745", "T042009", "398363", "T042010", "T008144" ] }, "release_date": "2024-12-29T23:00:00.000+00:00", "title": "CVE-2024-56756" } ] }
ghsa-9xj5-r9g9-xvp9
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
btrfs: ref-verify: fix use-after-free after invalid ref action
At btrfs_ref_tree_mod() after we successfully inserted the new ref entry (local variable 'ref') into the respective block entry's rbtree (local variable 'be'), if we find an unexpected action of BTRFS_DROP_DELAYED_REF, we error out and free the ref entry without removing it from the block entry's rbtree. Then in the error path of btrfs_ref_tree_mod() we call btrfs_free_ref_cache(), which iterates over all block entries and then calls free_block_entry() for each one, and there we will trigger a use-after-free when we are called against the block entry to which we added the freed ref entry to its rbtree, since the rbtree still points to the block entry, as we didn't remove it from the rbtree before freeing it in the error path at btrfs_ref_tree_mod(). Fix this by removing the new ref entry from the rbtree before freeing it.
Syzbot report this with the following stack traces:
BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615 __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523 update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512 btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594 btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754 btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116 btrfs_insert_empty_items+0x9c/0x1a0 fs/btrfs/ctree.c:4314 btrfs_insert_empty_item fs/btrfs/ctree.h:669 [inline] btrfs_insert_orphan_item+0x1f1/0x320 fs/btrfs/orphan.c:23 btrfs_orphan_add+0x6d/0x1a0 fs/btrfs/inode.c:3482 btrfs_unlink+0x267/0x350 fs/btrfs/inode.c:4293 vfs_unlink+0x365/0x650 fs/namei.c:4469 do_unlinkat+0x4ae/0x830 fs/namei.c:4533 __do_sys_unlinkat fs/namei.c:4576 [inline] __se_sys_unlinkat fs/namei.c:4569 [inline] __x64_sys_unlinkat+0xcc/0xf0 fs/namei.c:4569 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f BTRFS error (device loop0 state EA): Ref action 1, root 5, ref_root 5, parent 0, owner 260, offset 0, num_refs 1 __btrfs_mod_ref+0x76b/0xac0 fs/btrfs/extent-tree.c:2521 update_ref_for_cow+0x96a/0x11f0 btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594 btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754 btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116 btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411 __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030 btrfs_update_delayed_inode fs/btrfs/delayed-inode.c:1114 [inline] __btrfs_commit_inode_delayed_items+0x2318/0x24a0 fs/btrfs/delayed-inode.c:1137 __btrfs_run_delayed_items+0x213/0x490 fs/btrfs/delayed-inode.c:1171 btrfs_commit_transaction+0x8a8/0x3740 fs/btrfs/transaction.c:2313 prepare_to_relocate+0x3c4/0x4c0 fs/btrfs/relocation.c:3586 relocate_block_group+0x16c/0xd40 fs/btrfs/relocation.c:3611 btrfs_relocate_block_group+0x77d/0xd90 fs/btrfs/relocation.c:4081 btrfs_relocate_chunk+0x12c/0x3b0 fs/btrfs/volumes.c:3377 __btrfs_balance+0x1b0f/0x26b0 fs/btrfs/volumes.c:4161 btrfs_balance+0xbdc/0x10c0 fs/btrfs/volumes.c:4538 BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615 __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523 update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512 btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594 btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754 btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116 btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411 __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030 btrfs_update_delayed_i ---truncated---
{ "affected": [], "aliases": [ "CVE-2024-56581" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-12-27T15:15:17Z", "severity": "HIGH" }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: ref-verify: fix use-after-free after invalid ref action\n\nAt btrfs_ref_tree_mod() after we successfully inserted the new ref entry\n(local variable \u0027ref\u0027) into the respective block entry\u0027s rbtree (local\nvariable \u0027be\u0027), if we find an unexpected action of BTRFS_DROP_DELAYED_REF,\nwe error out and free the ref entry without removing it from the block\nentry\u0027s rbtree. Then in the error path of btrfs_ref_tree_mod() we call\nbtrfs_free_ref_cache(), which iterates over all block entries and then\ncalls free_block_entry() for each one, and there we will trigger a\nuse-after-free when we are called against the block entry to which we\nadded the freed ref entry to its rbtree, since the rbtree still points\nto the block entry, as we didn\u0027t remove it from the rbtree before freeing\nit in the error path at btrfs_ref_tree_mod(). Fix this by removing the\nnew ref entry from the rbtree before freeing it.\n\nSyzbot report this with the following stack traces:\n\n BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615\n __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523\n update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\n btrfs_insert_empty_items+0x9c/0x1a0 fs/btrfs/ctree.c:4314\n btrfs_insert_empty_item fs/btrfs/ctree.h:669 [inline]\n btrfs_insert_orphan_item+0x1f1/0x320 fs/btrfs/orphan.c:23\n btrfs_orphan_add+0x6d/0x1a0 fs/btrfs/inode.c:3482\n btrfs_unlink+0x267/0x350 fs/btrfs/inode.c:4293\n vfs_unlink+0x365/0x650 fs/namei.c:4469\n do_unlinkat+0x4ae/0x830 fs/namei.c:4533\n __do_sys_unlinkat fs/namei.c:4576 [inline]\n __se_sys_unlinkat fs/namei.c:4569 [inline]\n __x64_sys_unlinkat+0xcc/0xf0 fs/namei.c:4569\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n BTRFS error (device loop0 state EA): Ref action 1, root 5, ref_root 5, parent 0, owner 260, offset 0, num_refs 1\n __btrfs_mod_ref+0x76b/0xac0 fs/btrfs/extent-tree.c:2521\n update_ref_for_cow+0x96a/0x11f0\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\n btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411\n __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030\n btrfs_update_delayed_inode fs/btrfs/delayed-inode.c:1114 [inline]\n __btrfs_commit_inode_delayed_items+0x2318/0x24a0 fs/btrfs/delayed-inode.c:1137\n __btrfs_run_delayed_items+0x213/0x490 fs/btrfs/delayed-inode.c:1171\n btrfs_commit_transaction+0x8a8/0x3740 fs/btrfs/transaction.c:2313\n prepare_to_relocate+0x3c4/0x4c0 fs/btrfs/relocation.c:3586\n relocate_block_group+0x16c/0xd40 fs/btrfs/relocation.c:3611\n btrfs_relocate_block_group+0x77d/0xd90 fs/btrfs/relocation.c:4081\n btrfs_relocate_chunk+0x12c/0x3b0 fs/btrfs/volumes.c:3377\n __btrfs_balance+0x1b0f/0x26b0 fs/btrfs/volumes.c:4161\n btrfs_balance+0xbdc/0x10c0 fs/btrfs/volumes.c:4538\n BTRFS error (device loop0 state EA): Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615\n __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523\n update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512\n btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594\n btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754\n btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116\n btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411\n __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030\n btrfs_update_delayed_i\n---truncated---", "id": "GHSA-9xj5-r9g9-xvp9", "modified": "2025-01-14T15:30:50Z", "published": "2024-12-27T15:31:54Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56581" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/4275ac2741941c9c7c2293619fdbacb9f70ba85b" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/6370db28af9a8ae3bbdfe97f8a48f8f995e144cf" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/6fd018aa168e472ce35be32296d109db6adb87ea" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/7c4e39f9d2af4abaf82ca0e315d1fd340456620f" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/a6f9e7a0bf1185c9070c0de03bb85eafb9abd650" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/d2b85ce0561fde894e28fa01bd5d32820d585006" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/dfb9fe7de61f34cc241ab3900bdde93341096e0e" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.