Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-47287 (GCVE-0-2021-47287)
Vulnerability from cvelistv5 – Published: 2024-05-21 14:34 – Updated: 2025-05-04 07:07{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-47287",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-17T17:37:45.698280Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-17T17:39:25.471Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-04T05:32:08.035Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/base/auxiliary.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "ce5b3de58fc21303722df46551f7eb9a91afb409",
"status": "affected",
"version": "7de3697e9cbd4bd3d62bafa249d57990e1b8f294",
"versionType": "git"
},
{
"lessThan": "4afa0c22eed33cfe0c590742387f0d16f32412f3",
"status": "affected",
"version": "7de3697e9cbd4bd3d62bafa249d57990e1b8f294",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/base/auxiliary.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.11"
},
{
"lessThan": "5.11",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"version": "5.13.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "5.14",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.13.6",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.14",
"versionStartIncluding": "5.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: auxiliary bus: Fix memory leak when driver_register() fail\n\nIf driver_register() returns with error we need to free the memory\nallocated for auxdrv-\u003edriver.name before returning from\n__auxiliary_driver_register()"
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T07:07:55.111Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409"
},
{
"url": "https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3"
}
],
"title": "driver core: auxiliary bus: Fix memory leak when driver_register() fail",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2021-47287",
"datePublished": "2024-05-21T14:34:50.937Z",
"dateReserved": "2024-05-21T13:27:52.129Z",
"dateUpdated": "2025-05-04T07:07:55.111Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:32:08.035Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47287\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-17T17:37:45.698280Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-17T17:37:46.818Z\"}}], \"cna\": {\"title\": \"driver core: auxiliary bus: Fix memory leak when driver_register() fail\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"7de3697e9cbd4bd3d62bafa249d57990e1b8f294\", \"lessThan\": \"ce5b3de58fc21303722df46551f7eb9a91afb409\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"7de3697e9cbd4bd3d62bafa249d57990e1b8f294\", \"lessThan\": \"4afa0c22eed33cfe0c590742387f0d16f32412f3\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/base/auxiliary.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.11\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.11\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.13.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.13.*\"}, {\"status\": \"unaffected\", \"version\": \"5.14\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/base/auxiliary.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409\"}, {\"url\": \"https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndriver core: auxiliary bus: Fix memory leak when driver_register() fail\\n\\nIf driver_register() returns with error we need to free the memory\\nallocated for auxdrv-\u003edriver.name before returning from\\n__auxiliary_driver_register()\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.13.6\", \"versionStartIncluding\": \"5.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.14\", \"versionStartIncluding\": \"5.11\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T07:07:55.111Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-47287\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T07:07:55.111Z\", \"dateReserved\": \"2024-05-21T13:27:52.129Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-21T14:34:50.937Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-G7GX-QMJ4-GXRC
Vulnerability from github – Published: 2024-05-21 15:31 – Updated: 2024-12-23 18:30In the Linux kernel, the following vulnerability has been resolved:
driver core: auxiliary bus: Fix memory leak when driver_register() fail
If driver_register() returns with error we need to free the memory allocated for auxdrv->driver.name before returning from __auxiliary_driver_register()
{
"affected": [],
"aliases": [
"CVE-2021-47287"
],
"database_specific": {
"cwe_ids": [
"CWE-401"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-05-21T15:15:16Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: auxiliary bus: Fix memory leak when driver_register() fail\n\nIf driver_register() returns with error we need to free the memory\nallocated for auxdrv-\u003edriver.name before returning from\n__auxiliary_driver_register()",
"id": "GHSA-g7gx-qmj4-gxrc",
"modified": "2024-12-23T18:30:47Z",
"published": "2024-05-21T15:31:41Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47287"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
CVE-2021-47287
Vulnerability from fstec - Published: 13.07.2021{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8 (Red Hat Enterprise Linux), 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb), \u0434\u043e 5.14 (Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), \u043e\u0442 5.11 \u0434\u043e 5.13.6 (Linux), 3.0 (ROSA Virtualization 3.0)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4afa0c22eed33cfe0c590742387f0d16f32412f3\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2021-47287\n\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2021-47287\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0440\u0435\u0434\u043e\u0439 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0431\u0435\u0437\u0430\u0433\u0435\u043d\u0442\u043d\u043e\u0433\u043e \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0448\u0438\u043d \u00abROSA Virtualization 3.0\u00bb: https://abf.rosa.ru/advisories/ROSA-SA-2025-2861",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "13.07.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "19.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "28.01.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-00791",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-47287",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), Linux, Debian GNU/Linux, ROSA Virtualization 3.0 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211621308)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 5.14 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.11 \u0434\u043e 5.13.6 , \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb ROSA Virtualization 3.0 3.0 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211621308)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 driver_register() \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0435\u0440\u0435\u0434 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0441\u0441\u044b\u043b\u043a\u0438 (\u00ab\u0443\u0442\u0435\u0447\u043a\u0430 \u043f\u0430\u043c\u044f\u0442\u0438\u00bb) (CWE-401)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 driver_register() \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u043c \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0435\u0440\u0435\u0434 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0441\u0441\u044b\u043b\u043a\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.kernel.org/linus/4afa0c22eed33cfe0c590742387f0d16f32412f3\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4afa0c22eed33cfe0c590742387f0d16f32412f3\nhttps://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3\nhttps://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409\nhttps://lore.kernel.org/linux-cve-announce/2024052121-CVE-2021-47287-6345@gregkh/\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47287\nhttps://security-tracker.debian.org/tracker/CVE-2021-47287\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81\nhttps://access.redhat.com/security/cve/CVE-2021-47287\nhttps://abf.rosa.ru/advisories/ROSA-SA-2025-2861",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-401",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
CERTFR-2024-AVI-0821
Vulnerability from certfr_avis - Published: 2024-09-27 - Updated: 2024-09-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-26886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26886"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"name": "CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2022-48619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48619"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2021-47441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47441"
},
{
"name": "CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"name": "CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"name": "CVE-2021-47455",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47455"
},
{
"name": "CVE-2024-36883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"name": "CVE-2024-40997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40997"
},
{
"name": "CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"name": "CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"name": "CVE-2021-47352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47352"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2024-26991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26991"
},
{
"name": "CVE-2021-47287",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47287"
},
{
"name": "CVE-2021-47338",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47338"
},
{
"name": "CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"name": "CVE-2024-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38581"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-26880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26880"
},
{
"name": "CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"name": "CVE-2024-26931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26931"
},
{
"name": "CVE-2021-47560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47560"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2021-47582",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47582"
},
{
"name": "CVE-2021-47385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47385"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2022-48687",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48687"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26929"
},
{
"name": "CVE-2024-42226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42226"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2023-52683",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52683"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"name": "CVE-2024-35944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35944"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-35809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35809"
},
{
"name": "CVE-2024-41005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2024-26947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26947"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"name": "CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-27013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27013"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2021-47492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47492"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2021-47386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47386"
},
{
"name": "CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"name": "CVE-2021-47412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47412"
},
{
"name": "CVE-2022-48754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48754"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2021-47466",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47466"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"name": "CVE-2021-47289",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47289"
},
{
"name": "CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"name": "CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"name": "CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"name": "CVE-2021-47383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47383"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-26908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26908"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-26939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26939"
},
{
"name": "CVE-2023-52884",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52884"
},
{
"name": "CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"name": "CVE-2024-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38562"
},
{
"name": "CVE-2021-47384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47384"
},
{
"name": "CVE-2021-47321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47321"
},
{
"name": "CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2024-35989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35989"
},
{
"name": "CVE-2024-35877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35877"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-26769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26769"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-23848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23848"
},
{
"name": "CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"name": "CVE-2022-48686",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48686"
},
{
"name": "CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"name": "CVE-2024-35895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35895"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"name": "CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"name": "CVE-2024-26894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26894"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2023-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52522"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2022-48638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48638"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2024-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
},
{
"name": "CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2021-47101",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47101"
},
{
"name": "CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"name": "CVE-2023-52476",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52476"
},
{
"name": "CVE-2024-26930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26930"
},
{
"name": "CVE-2024-40911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40911"
},
{
"name": "CVE-2024-27022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27022"
},
{
"name": "CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2024-26855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26855"
},
{
"name": "CVE-2023-52880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52880"
},
{
"name": "CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"name": "CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"name": "CVE-2024-36899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36899"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
}
],
"initial_release_date": "2024-09-27T00:00:00",
"last_revision_date": "2024-09-27T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0821",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Red Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:6997",
"url": "https://access.redhat.com/errata/RHSA-2024:6997"
},
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:7001",
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:7005",
"url": "https://access.redhat.com/errata/RHSA-2024:7005"
},
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:6995",
"url": "https://access.redhat.com/errata/RHSA-2024:6995"
},
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:6998",
"url": "https://access.redhat.com/errata/RHSA-2024:6998"
},
{
"published_at": "2024-09-18",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:6745",
"url": "https://access.redhat.com/errata/RHSA-2024:6745"
},
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:6999",
"url": "https://access.redhat.com/errata/RHSA-2024:6999"
},
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:7003",
"url": "https://access.redhat.com/errata/RHSA-2024:7003"
},
{
"published_at": "2024-09-18",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:6753",
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
},
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:7004",
"url": "https://access.redhat.com/errata/RHSA-2024:7004"
},
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:6994",
"url": "https://access.redhat.com/errata/RHSA-2024:6994"
},
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:7002",
"url": "https://access.redhat.com/errata/RHSA-2024:7002"
},
{
"published_at": "2024-09-26",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:7227",
"url": "https://access.redhat.com/errata/RHSA-2024:7227"
},
{
"published_at": "2024-09-18",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2024:6744",
"url": "https://access.redhat.com/errata/RHSA-2024:6744"
}
]
}
cve-2021-47287
Vulnerability from osv_almalinux
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
CVE-2023-6040 CVE-2024-26595 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52817 CVE-2023-52840 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug-kvm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug-modules"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug-modules-extra"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-kvm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-modules"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-modules-extra"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.rt7.363.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. \nSecurity Fix(es):\n\n CVE-2023-6040 CVE-2024-26595 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52817 CVE-2023-52840 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2024:7001",
"modified": "2024-09-24T11:25:16Z",
"published": "2024-09-24T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-46984"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47097"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47101"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47287"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47289"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47321"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47338"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47352"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47383"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47384"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47385"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47386"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47393"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47412"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47432"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47441"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47455"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47466"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47497"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47527"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47560"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47582"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47609"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48619"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48754"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48760"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48804"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48836"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48866"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52470"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52476"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52478"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52522"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52605"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52683"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52817"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52840"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-6040"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-23848"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26595"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26645"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26649"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26665"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26717"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26720"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26769"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26855"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26880"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26894"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26923"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26939"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-27013"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-27042"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-35809"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-35877"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-35884"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-35944"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-35989"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36883"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36901"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36902"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36920"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36939"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36953"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-37356"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-38558"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-38559"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-38570"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-38581"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-38619"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-39471"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-39499"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-39501"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-39506"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40901"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40904"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40911"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40912"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40929"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40931"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40941"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40954"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40958"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40959"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40960"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40972"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40977"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40978"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40988"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40989"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40995"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40997"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40998"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41005"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41007"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41008"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41012"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41013"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41014"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41035"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41038"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41039"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41040"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41041"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41044"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41055"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41056"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41060"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41071"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41076"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41090"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41091"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41097"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42084"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42090"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42096"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42114"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42124"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42131"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42152"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42154"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42226"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42228"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42237"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42238"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42240"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42246"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42322"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-43871"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2258012"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2258013"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2260038"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2265799"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2266358"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2266750"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267036"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267041"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267795"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267916"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267925"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2268295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2271648"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2271796"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2272793"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2273141"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2273148"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2273180"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2275661"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2275690"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2275742"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2277171"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2278220"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2278270"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2278447"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281217"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281317"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281704"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281720"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281807"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281847"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282324"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282345"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282354"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282355"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282356"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282357"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282366"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282401"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282422"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282440"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282508"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282511"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282676"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282757"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282851"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282890"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282903"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282918"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2283389"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2283424"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284271"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284515"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284545"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284596"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284628"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284634"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293247"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293270"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293273"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293304"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293377"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293408"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293423"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293440"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293441"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293658"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294313"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297471"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297473"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297478"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297488"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297495"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297496"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297513"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297515"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297525"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297538"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297542"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297543"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297544"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297556"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297561"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297562"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297572"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297573"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297579"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297581"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297582"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297589"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297706"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297909"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2298079"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2298140"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2298177"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2298640"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2299240"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2299336"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2299452"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300296"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300297"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300402"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300407"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300408"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300409"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300410"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300414"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300429"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300430"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300434"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300448"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300453"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300492"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300533"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300552"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300713"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301477"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301489"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301496"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301519"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301522"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301544"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2303077"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2303505"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2303506"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2303508"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2303514"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2305467"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2306365"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2024-7001.html"
}
],
"related": [
"CVE-2023-6040",
"CVE-2024-26595",
"CVE-2021-46984",
"CVE-2023-52478",
"CVE-2023-52476",
"CVE-2023-52522",
"CVE-2021-47101",
"CVE-2021-47097",
"CVE-2023-52605",
"CVE-2024-26645",
"CVE-2024-26665",
"CVE-2024-26720",
"CVE-2024-26717",
"CVE-2024-26769",
"CVE-2024-26894",
"CVE-2024-26880",
"CVE-2024-26855",
"CVE-2024-26923",
"CVE-2024-26939",
"CVE-2024-27013",
"CVE-2024-27042",
"CVE-2024-35809",
"CVE-2023-52683",
"CVE-2024-35884",
"CVE-2024-35877",
"CVE-2024-35944",
"CVE-2024-35989",
"CVE-2021-47412",
"CVE-2021-47393",
"CVE-2021-47386",
"CVE-2021-47385",
"CVE-2021-47384",
"CVE-2021-47383",
"CVE-2021-47432",
"CVE-2021-47352",
"CVE-2021-47338",
"CVE-2021-47321",
"CVE-2021-47289",
"CVE-2021-47287",
"CVE-2023-52817",
"CVE-2023-52840",
"CVE-2021-47441",
"CVE-2021-47466",
"CVE-2021-47455",
"CVE-2021-47497",
"CVE-2021-47560",
"CVE-2021-47527",
"CVE-2024-36883",
"CVE-2024-36920",
"CVE-2024-36902",
"CVE-2024-36953",
"CVE-2024-36939",
"CVE-2024-36901",
"CVE-2021-47582",
"CVE-2021-47609",
"CVE-2024-38619",
"CVE-2022-48754",
"CVE-2022-48760",
"CVE-2024-38581",
"CVE-2024-38570",
"CVE-2024-38559",
"CVE-2024-38558",
"CVE-2024-37356",
"CVE-2024-39471",
"CVE-2024-39499",
"CVE-2024-39501",
"CVE-2024-39506",
"CVE-2024-40904",
"CVE-2024-40911",
"CVE-2024-40912",
"CVE-2024-40929",
"CVE-2024-40931",
"CVE-2024-40941",
"CVE-2024-40954",
"CVE-2024-40958",
"CVE-2024-40959",
"CVE-2024-40960",
"CVE-2024-40972",
"CVE-2024-40977",
"CVE-2024-40978",
"CVE-2024-40988",
"CVE-2024-40989",
"CVE-2024-40995",
"CVE-2024-40997",
"CVE-2024-40998",
"CVE-2024-41005",
"CVE-2024-40901",
"CVE-2024-41007",
"CVE-2024-41008",
"CVE-2022-48804",
"CVE-2022-48836",
"CVE-2022-48866",
"CVE-2024-41090",
"CVE-2024-41091",
"CVE-2024-41012",
"CVE-2024-41013",
"CVE-2024-41014",
"CVE-2024-41035",
"CVE-2024-41038",
"CVE-2024-41039",
"CVE-2024-41040",
"CVE-2024-41041",
"CVE-2024-41044",
"CVE-2024-41055",
"CVE-2024-41056",
"CVE-2024-41060",
"CVE-2024-41071",
"CVE-2024-41076",
"CVE-2024-41097",
"CVE-2024-42084",
"CVE-2024-42090",
"CVE-2024-42096",
"CVE-2024-42114",
"CVE-2024-42124",
"CVE-2024-42131",
"CVE-2024-42152",
"CVE-2024-42154",
"CVE-2024-42226",
"CVE-2024-42228",
"CVE-2024-42237",
"CVE-2024-42238",
"CVE-2024-42240",
"CVE-2024-42246",
"CVE-2024-42322",
"CVE-2024-43871"
],
"summary": "Important: kernel-rt security update"
}
cve-2021-47287
Vulnerability from osv_almalinux
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
CVE-2023-6040 CVE-2024-26595 CVE-2024-26600 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26638 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26846 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52798 CVE-2023-52809 CVE-2023-52817 CVE-2023-52840 CVE-2023-52800 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36922 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36919 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38579 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41023 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41064 CVE-2024-41065 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42094 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42225 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43830 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "bpftool"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-abi-stablelists"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-cross-headers"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-debug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-debug-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-debug-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-debug-modules"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-debug-modules-extra"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-headers"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-modules"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-modules-extra"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-tools"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-tools-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-tools-libs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-zfcpdump"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-zfcpdump-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-zfcpdump-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-zfcpdump-modules"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-zfcpdump-modules-extra"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-perf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.22.1.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The kernel packages contain the Linux kernel, the core of any Linux operating system. \nSecurity Fix(es):\n\n CVE-2023-6040 CVE-2024-26595 CVE-2024-26600 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26638 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26846 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52798 CVE-2023-52809 CVE-2023-52817 CVE-2023-52840 CVE-2023-52800 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36922 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36919 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38579 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41023 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41064 CVE-2024-41065 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42094 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42225 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43830 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2024:7000",
"modified": "2024-09-25T15:23:15Z",
"published": "2024-09-24T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-46984"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47097"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47101"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47287"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47289"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47321"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47338"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47352"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47383"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47384"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47385"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47386"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47393"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47412"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47432"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47441"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47455"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47466"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47497"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47527"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47560"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47582"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-47609"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48619"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48754"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48760"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48804"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48836"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-48866"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52470"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52476"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52478"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52522"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52605"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52683"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52798"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52800"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52809"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52817"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52840"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-6040"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-23848"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26595"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26600"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26638"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26645"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26649"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26665"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26717"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26720"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26769"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26846"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26855"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26880"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26894"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26923"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26939"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-27013"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-27042"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-35809"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-35877"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-35884"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-35944"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-35989"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36883"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36901"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36902"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36919"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36920"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36922"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36939"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-36953"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-37356"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-38558"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-38559"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-38570"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-38579"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-38581"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-38619"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-39471"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-39499"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-39501"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-39506"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40901"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40904"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40911"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40912"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40929"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40931"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40941"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40954"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40958"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40959"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40960"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40972"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40977"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40978"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40988"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40989"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40995"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40997"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-40998"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41005"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41007"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41008"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41012"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41013"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41014"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41023"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41035"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41038"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41039"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41040"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41041"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41044"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41055"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41056"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41060"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41064"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41065"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41071"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41076"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41090"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41091"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-41097"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42084"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42090"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42094"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42096"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42114"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42124"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42131"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42152"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42154"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42225"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42226"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42228"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42237"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42238"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42240"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42246"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42265"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-42322"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-43830"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-43871"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2258012"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2258013"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2260038"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2265799"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2265838"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2266358"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2266750"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267036"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267041"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267795"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267916"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267925"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2268295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2270103"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2271648"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2271796"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2272793"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2273141"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2273148"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2273180"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2275558"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2275661"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2275690"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2275742"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2277171"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2278220"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2278270"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2278447"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281217"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281317"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281704"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281720"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281807"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2281847"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282324"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282345"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282354"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282355"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282356"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282357"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282366"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282401"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282422"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282440"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282508"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282511"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282648"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282669"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282676"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282757"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282764"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282851"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282890"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282903"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2282918"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2283389"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2283424"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284271"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284511"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284515"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284545"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284596"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284628"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284630"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2284634"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293247"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293270"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293273"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293304"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293377"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293408"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293414"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293423"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293440"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293441"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2293658"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294313"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297471"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297473"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297478"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297488"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297495"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297496"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297513"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297515"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297525"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297538"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297542"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297543"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297544"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297556"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297561"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297562"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297572"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297573"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297579"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297581"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297582"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297589"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297706"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2297909"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2298079"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2298140"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2298177"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2298640"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2299240"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2299336"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2299452"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300296"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300297"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300381"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300402"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300407"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300408"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300409"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300410"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300414"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300429"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300430"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300434"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300439"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300440"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300448"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300453"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300492"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300533"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300552"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300709"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2300713"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301477"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301489"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301496"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301519"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301522"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301543"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301544"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2303077"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2303505"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2303506"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2303508"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2303514"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2305410"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2305467"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2305488"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2306365"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2024-7000.html"
}
],
"related": [
"CVE-2023-6040",
"CVE-2024-26595",
"CVE-2024-26600",
"CVE-2021-46984",
"CVE-2023-52478",
"CVE-2023-52476",
"CVE-2023-52522",
"CVE-2021-47101",
"CVE-2021-47097",
"CVE-2023-52605",
"CVE-2024-26638",
"CVE-2024-26645",
"CVE-2024-26665",
"CVE-2024-26720",
"CVE-2024-26717",
"CVE-2024-26769",
"CVE-2024-26846",
"CVE-2024-26894",
"CVE-2024-26880",
"CVE-2024-26855",
"CVE-2024-26923",
"CVE-2024-26939",
"CVE-2024-27013",
"CVE-2024-27042",
"CVE-2024-35809",
"CVE-2023-52683",
"CVE-2024-35884",
"CVE-2024-35877",
"CVE-2024-35944",
"CVE-2024-35989",
"CVE-2021-47412",
"CVE-2021-47393",
"CVE-2021-47386",
"CVE-2021-47385",
"CVE-2021-47384",
"CVE-2021-47383",
"CVE-2021-47432",
"CVE-2021-47352",
"CVE-2021-47338",
"CVE-2021-47321",
"CVE-2021-47289",
"CVE-2021-47287",
"CVE-2023-52798",
"CVE-2023-52809",
"CVE-2023-52817",
"CVE-2023-52840",
"CVE-2023-52800",
"CVE-2021-47441",
"CVE-2021-47466",
"CVE-2021-47455",
"CVE-2021-47497",
"CVE-2021-47560",
"CVE-2021-47527",
"CVE-2024-36883",
"CVE-2024-36922",
"CVE-2024-36920",
"CVE-2024-36902",
"CVE-2024-36953",
"CVE-2024-36939",
"CVE-2024-36919",
"CVE-2024-36901",
"CVE-2021-47582",
"CVE-2021-47609",
"CVE-2024-38619",
"CVE-2022-48754",
"CVE-2022-48760",
"CVE-2024-38581",
"CVE-2024-38579",
"CVE-2024-38570",
"CVE-2024-38559",
"CVE-2024-38558",
"CVE-2024-37356",
"CVE-2024-39471",
"CVE-2024-39499",
"CVE-2024-39501",
"CVE-2024-39506",
"CVE-2024-40904",
"CVE-2024-40911",
"CVE-2024-40912",
"CVE-2024-40929",
"CVE-2024-40931",
"CVE-2024-40941",
"CVE-2024-40954",
"CVE-2024-40958",
"CVE-2024-40959",
"CVE-2024-40960",
"CVE-2024-40972",
"CVE-2024-40977",
"CVE-2024-40978",
"CVE-2024-40988",
"CVE-2024-40989",
"CVE-2024-40995",
"CVE-2024-40997",
"CVE-2024-40998",
"CVE-2024-41005",
"CVE-2024-40901",
"CVE-2024-41007",
"CVE-2024-41008",
"CVE-2022-48804",
"CVE-2022-48836",
"CVE-2022-48866",
"CVE-2024-41090",
"CVE-2024-41091",
"CVE-2024-41012",
"CVE-2024-41013",
"CVE-2024-41014",
"CVE-2024-41023",
"CVE-2024-41035",
"CVE-2024-41038",
"CVE-2024-41039",
"CVE-2024-41040",
"CVE-2024-41041",
"CVE-2024-41044",
"CVE-2024-41055",
"CVE-2024-41056",
"CVE-2024-41060",
"CVE-2024-41064",
"CVE-2024-41065",
"CVE-2024-41071",
"CVE-2024-41076",
"CVE-2024-41097",
"CVE-2024-42084",
"CVE-2024-42090",
"CVE-2024-42094",
"CVE-2024-42096",
"CVE-2024-42114",
"CVE-2024-42124",
"CVE-2024-42131",
"CVE-2024-42152",
"CVE-2024-42154",
"CVE-2024-42225",
"CVE-2024-42226",
"CVE-2024-42228",
"CVE-2024-42237",
"CVE-2024-42238",
"CVE-2024-42240",
"CVE-2024-42246",
"CVE-2024-42322",
"CVE-2024-43830",
"CVE-2024-43871"
],
"summary": "Important: kernel security update"
}
FKIE_CVE-2021-47287
Vulnerability from fkie_nvd - Published: 2024-05-21 15:15 - Updated: 2024-12-23 16:40| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409 | Patch |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 5.14 | |
| linux | linux_kernel | 5.14 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "512C22FC-1524-4E6F-9E62-4F4B7B6E0576",
"versionEndExcluding": "5.13.6",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "71268287-21A8-4488-AA4F-23C473153131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "23B9E5C6-FAB5-4A02-9E39-27C8787B0991",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: auxiliary bus: Fix memory leak when driver_register() fail\n\nIf driver_register() returns with error we need to free the memory\nallocated for auxdrv-\u003edriver.name before returning from\n__auxiliary_driver_register()"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: n\u00facleo del controlador: bus auxiliar: corrige la p\u00e9rdida de memoria cuando falla driver_register(). Si driver_register() regresa con error, necesitamos liberar la memoria asignada para auxdrv-\u0026gt;driver.name antes de regresar de __auxiliary_driver_register()"
}
],
"id": "CVE-2021-47287",
"lastModified": "2024-12-23T16:40:14.130",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-05-21T15:15:16.797",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.