wid-sec-w-2024-1756
Vulnerability from csaf_certbund
Published
2024-08-04 22:00
Modified
2025-07-07 22:00
Summary
Red Hat Enterprise Linux (python-setuptools): Schwachstelle ermöglicht Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um beliebigen Programmcode auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1756 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1756.json" }, { "category": "self", "summary": "WID-SEC-2024-1756 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1756" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-08-04", "url": "https://access.redhat.com/errata/RHSA-2024:5000" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-08-04", "url": "https://access.redhat.com/errata/RHSA-2024:5002" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5040 vom 2024-08-07", "url": "https://access.redhat.com/errata/RHSA-2024:5040" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5084 vom 2024-08-07", "url": "https://access.redhat.com/errata/RHSA-2024:5084" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5078 vom 2024-08-07", "url": "https://access.redhat.com/errata/RHSA-2024:5078" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5137 vom 2024-08-08", "url": "https://access.redhat.com/errata/RHSA-2024:5137" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2024-0801 vom 2024-08-12", "url": "https://advisory.splunk.com//advisories/SVD-2024-0801" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5279 vom 2024-08-13", "url": "https://access.redhat.com/errata/RHSA-2024:5279" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5279 vom 2024-08-14", "url": "https://linux.oracle.com/errata/ELSA-2024-5279.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5389 vom 2024-08-15", "url": "https://access.redhat.com/errata/RHSA-2024:5389" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5532 vom 2024-08-19", "url": "https://access.redhat.com/errata/RHSA-2024:5532" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5534 vom 2024-08-19", "url": "https://access.redhat.com/errata/RHSA-2024:5534" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5530 vom 2024-08-19", "url": "https://access.redhat.com/errata/RHSA-2024:5530" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5533 vom 2024-08-19", "url": "https://access.redhat.com/errata/RHSA-2024:5533" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5531 vom 2024-08-19", "url": "https://access.redhat.com/errata/RHSA-2024:5531" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5533 vom 2024-08-20", "url": "https://linux.oracle.com/errata/ELSA-2024-5533.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5534 vom 2024-08-19", "url": "http://linux.oracle.com/errata/ELSA-2024-5534.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5530 vom 2024-08-20", "url": "http://linux.oracle.com/errata/ELSA-2024-5530.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5532 vom 2024-08-20", "url": "http://linux.oracle.com/errata/ELSA-2024-5532.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5533 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5533" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5279 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5279" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5530 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5530" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5531 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5531" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5532 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5532" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5531 vom 2024-08-22", "url": "https://linux.oracle.com/errata/ELSA-2024-5531.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5962 vom 2024-08-29", "url": "https://access.redhat.com/errata/RHSA-2024:5962" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5962 vom 2024-08-30", "url": "https://linux.oracle.com/errata/ELSA-2024-5962.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3054-1 vom 2024-09-03", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/AADR2HOYCFXGAUGCV3MMZRWPDXTHZGGF/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3055-1 vom 2024-09-03", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/X37B6V3KECA4435SMKM7USGZCQOE7BVW/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6220 vom 2024-09-03", "url": "https://access.redhat.com/errata/RHSA-2024:6220" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6309 vom 2024-09-04", "url": "https://linux.oracle.com/errata/ELSA-2024-6309.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6312 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6312" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6311 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6311" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6309 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6309" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6311 vom 2024-09-06", "url": "https://linux.oracle.com/errata/ELSA-2024-6311.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6488 vom 2024-09-09", "url": "https://access.redhat.com/errata/RHSA-2024:6488" }, { "category": "external", "summary": "IBM Security Bulletin 7167755 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7167755" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6611 vom 2024-09-12", "url": "https://access.redhat.com/errata/RHSA-2024:6611" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6612 vom 2024-09-12", "url": "https://access.redhat.com/errata/RHSA-2024:6612" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6662 vom 2024-09-13", "url": "https://access.redhat.com/errata/RHSA-2024:6662" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6661 vom 2024-09-13", "url": "https://access.redhat.com/errata/RHSA-2024:6661" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6726 vom 2024-09-17", "url": "https://access.redhat.com/errata/RHSA-2024:6726" }, { "category": "external", "summary": "IBM Security Bulletin 7168815 vom 2024-09-18", "url": "https://www.ibm.com/support/pages/node/7168815" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6726 vom 2024-09-18", "url": "https://linux.oracle.com/errata/ELSA-2024-6726.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2632 vom 2024-09-18", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2632.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6907 vom 2024-09-23", "url": "https://access.redhat.com/errata/RHSA-2024:6907" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7213 vom 2024-09-26", "url": "https://access.redhat.com/errata/RHSA-2024:7213" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7374 vom 2024-09-30", "url": "https://access.redhat.com/errata/RHSA-2024:7374" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:6726 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:6726" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASPYTHON3.8-2024-012 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASPYTHON3.8-2024-012.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2641 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2641.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7724 vom 2024-10-07", "url": "https://access.redhat.com/errata/RHSA-2024:7724" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6661 vom 2024-10-07", "url": "https://linux.oracle.com/errata/ELSA-2024-6661.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7922 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:7922" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8173 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8173" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8168 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8168" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8171 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8171" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8172 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8172" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8170 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8170" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8179 vom 2024-10-16", "url": "https://access.redhat.com/errata/RHSA-2024:8179" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6662 vom 2024-10-17", "url": "https://linux.oracle.com/errata/ELSA-2024-6662.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "IBM Security Bulletin 7174016 vom 2024-10-24", "url": "https://www.ibm.com/support/pages/node/7174016" }, { "category": "external", "summary": "IBM Security Bulletin 7179156 vom 2024-12-17", "url": "https://www.ibm.com/support/pages/node/7179156" }, { "category": "external", "summary": "IBM Security Bulletin 7185962 vom 2025-03-14", "url": "https://www.ibm.com/support/pages/node/7185962" }, { "category": "external", "summary": "IBM Security Bulletin 7186423 vom 2025-03-17", "url": "https://www.ibm.com/support/pages/node/7186423" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-012 vom 2025-06-02", "url": "https://security.business.xerox.com/wp-content/uploads/2025/06/Xerox-Security-Bulletin-XRX25-012-for-Xerox-FreeFlow-Print-Server-v9.pdf" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20294-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021036.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20053-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021273.html" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2025-0710 vom 2025-07-07", "url": "https://advisory.splunk.com//advisories/SVD-2025-0710" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux (python-setuptools): Schwachstelle erm\u00f6glicht Codeausf\u00fchrung", "tracking": { "current_release_date": "2025-07-07T22:00:00.000+00:00", "generator": { "date": "2025-07-08T08:00:01.511+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-1756", "initial_release_date": "2024-08-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-08-06T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-07T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-12T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Splunk-SVD aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-14T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-08-18T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-19T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-08-21T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-08-22T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-08-28T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-29T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-02T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-03T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-04T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-09-05T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-09T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-10T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-18T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-09-22T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-26T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-10-06T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-16T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-24T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-03-16T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-03-17T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-07T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Splunk-SVD aufgenommen" } ], "status": "final", "version": "42" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Certified Container Operator \u003c12.8.2", "product": { "name": "IBM App Connect Enterprise Certified Container Operator \u003c12.8.2", "product_id": "T041924" } }, { "category": "product_version", "name": "Certified Container Operator 12.8.2", "product": { "name": "IBM App Connect Enterprise Certified Container Operator 12.8.2", "product_id": "T041924-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:12.8.2::certified_container_operator" } } }, { "category": "product_version_range", "name": "Certified Container Operator \u003c12.0.8", "product": { "name": "IBM App Connect Enterprise Certified Container Operator \u003c12.0.8", "product_id": "T041925" } }, { "category": "product_version", "name": "Certified Container Operator 12.0.8", "product": { "name": "IBM App Connect Enterprise Certified Container Operator 12.0.8", "product_id": "T041925-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:12.0.8::certified_container_operator" } } } ], "category": "product_name", "name": "App Connect Enterprise" }, { "branches": [ { "category": "product_version", "name": "11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } } ], "category": "product_name", "name": "InfoSphere Information Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP9 IF03", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP9 IF03", "product_id": "T037731" } }, { "category": "product_version", "name": "7.5.0 UP9 IF03", "product": { "name": "IBM QRadar SIEM 7.5.0 UP9 IF03", "product_id": "T037731-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9_if03" } } }, { "category": "product_version", "name": "7.5.0", "product": { "name": "IBM QRadar SIEM 7.5.0", "product_id": "T041207", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version_range", "name": "\u003c6.3.0.11_ifix001", "product": { "name": "IBM Sterling Connect:Direct \u003c6.3.0.11_ifix001", "product_id": "T039900" } }, { "category": "product_version", "name": "6.3.0.11_ifix001", "product": { "name": "IBM Sterling Connect:Direct 6.3.0.11_ifix001", "product_id": "T039900-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.3.0.11_ifix001" } } } ], "category": "product_name", "name": "Sterling Connect:Direct" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "8.8", "product": { "name": "Red Hat Enterprise Linux 8.8", "product_id": "T036579", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8.8" } } }, { "category": "product_version_range", "name": "python-setuptools \u003c69.1.1", "product": { "name": "Red Hat Enterprise Linux python-setuptools \u003c69.1.1", "product_id": "T036580" } }, { "category": "product_version", "name": "python-setuptools 69.1.1", "product": { "name": "Red Hat Enterprise Linux python-setuptools 69.1.1", "product_id": "T036580-fixed", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:python-setuptools__69.1.1" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Splunk Splunk Enterprise", "product": { "name": "Splunk Splunk Enterprise", "product_id": "T008911", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:-" } } }, { "category": "product_version_range", "name": "\u003c9.4.3", "product": { "name": "Splunk Splunk Enterprise \u003c9.4.3", "product_id": "T045086" } }, { "category": "product_version", "name": "9.4.3", "product": { "name": "Splunk Splunk Enterprise 9.4.3", "product_id": "T045086-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.4.3" } } }, { "category": "product_version_range", "name": "\u003c9.3.5", "product": { "name": "Splunk Splunk Enterprise \u003c9.3.5", "product_id": "T045087" } }, { "category": "product_version", "name": "9.3.5", "product": { "name": "Splunk Splunk Enterprise 9.3.5", "product_id": "T045087-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.3.5" } } }, { "category": "product_version_range", "name": "\u003c9.2.7", "product": { "name": "Splunk Splunk Enterprise \u003c9.2.7", "product_id": "T045088" } }, { "category": "product_version", "name": "9.2.7", "product": { "name": "Splunk Splunk Enterprise 9.2.7", "product_id": "T045088-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.2.7" } } }, { "category": "product_version_range", "name": "\u003c9.1.10", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.10", "product_id": "T045089" } }, { "category": "product_version", "name": "9.1.10", "product": { "name": "Splunk Splunk Enterprise 9.1.10", "product_id": "T045089-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.10" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-6345", "product_status": { "known_affected": [ "T036579", "T041925", "67646", "T041924", "T008911", "T041207", "T037731", "T039900", "T002977", "T004914", "T032255", "T036580", "T002207", "444803", "T045086", "398363", "T045088", "T045087", "T045089" ] }, "release_date": "2024-08-04T22:00:00.000+00:00", "title": "CVE-2024-6345" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…