{
  "document" : {
    "aggregate_severity" : {
      "text" : "mittel"
    },
    "category" : "csaf_base",
    "csaf_version" : "2.0",
    "distribution" : {
      "tlp" : {
        "label" : "WHITE",
        "url" : "https://www.first.org/tlp/"
      }
    },
    "lang" : "de-DE",
    "notes" : [ {
      "category" : "legal_disclaimer",
      "text" : "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen."
    }, {
      "category" : "description",
      "text" : "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
      "title" : "Produktbeschreibung"
    }, {
      "category" : "summary",
      "text" : "Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.",
      "title" : "Angriff"
    }, {
      "category" : "general",
      "text" : "- Linux",
      "title" : "Betroffene Betriebssysteme"
    } ],
    "publisher" : {
      "category" : "other",
      "contact_details" : "csaf-provider@cert-bund.de",
      "name" : "Bundesamt für Sicherheit in der Informationstechnik",
      "namespace" : "https://www.bsi.bund.de"
    },
    "references" : [ {
      "category" : "self",
      "summary" : "WID-SEC-W-2024-0474 - CSAF Version",
      "url" : "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0474.json"
    }, {
      "category" : "self",
      "summary" : "WID-SEC-2024-0474 - Portal Version",
      "url" : "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0474"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:0855-1 vom 2024-03-12",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:0858-1 vom 2024-03-13",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:0856-1 vom 2024-03-13",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:0857-1 vom 2024-03-13",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:0900-1 vom 2024-03-14",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html"
    }, {
      "category" : "external",
      "summary" : "CVE.org vom 2024-02-22",
      "url" : "https://www.cve.org/CVERecord/?id=CVE-2024-26593"
    }, {
      "category" : "external",
      "summary" : "CVE Announce auf lore.kernel.org vom 2024-02-22",
      "url" : "https://lore.kernel.org/linux-cve-announce/2024022315-CVE-2024-26593-9d89@gregkh/"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:0900-2 vom 2024-03-15",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:0926-1 vom 2024-03-22",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:0977-1 vom 2024-03-22",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:2394 vom 2024-04-30",
      "url" : "https://access.redhat.com/errata/RHSA-2024:2394"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DSA-5681 vom 2024-05-06",
      "url" : "https://lists.debian.org/debian-security-announce/2024/msg00090.html"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6767-1 vom 2024-05-07",
      "url" : "https://ubuntu.com/security/notices/USN-6767-1"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6766-1 vom 2024-05-07",
      "url" : "https://ubuntu.com/security/notices/USN-6766-1"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6767-2 vom 2024-05-14",
      "url" : "https://ubuntu.com/security/notices/USN-6767-2"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6766-2 vom 2024-05-15",
      "url" : "https://ubuntu.com/security/notices/USN-6766-2"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6766-3 vom 2024-05-20",
      "url" : "https://ubuntu.com/security/notices/USN-6766-3"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6795-1 vom 2024-05-28",
      "url" : "https://ubuntu.com/security/notices/USN-6795-1"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:3618 vom 2024-06-05",
      "url" : "https://access.redhat.com/errata/RHSA-2024:3618"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:3627 vom 2024-06-05",
      "url" : "https://access.redhat.com/errata/RHSA-2024:3627"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2024-3618 vom 2024-06-06",
      "url" : "https://linux.oracle.com/errata/ELSA-2024-3618.html"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6828-1 vom 2024-06-11",
      "url" : "https://ubuntu.com/security/notices/USN-6828-1"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DLA-3842 vom 2024-06-25",
      "url" : "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6895-1 vom 2024-07-12",
      "url" : "https://ubuntu.com/security/notices/USN-6895-1"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6895-2 vom 2024-07-16",
      "url" : "https://ubuntu.com/security/notices/USN-6895-2"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6900-1 vom 2024-07-17",
      "url" : "https://ubuntu.com/security/notices/USN-6900-1"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6895-3 vom 2024-07-19",
      "url" : "https://ubuntu.com/security/notices/USN-6895-3"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7162077 vom 2024-07-31",
      "url" : "https://www.ibm.com/support/pages/node/7162077"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6895-4 vom 2024-08-05",
      "url" : "https://ubuntu.com/security/notices/USN-6895-4"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7169778 vom 2024-09-24",
      "url" : "https://www.ibm.com/support/pages/node/7169778"
    }, {
      "category" : "external",
      "summary" : "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
      "url" : "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
    } ],
    "source_lang" : "en-US",
    "title" : "Linux Kernel: Schwachstelle ermöglicht Denial of Service",
    "tracking" : {
      "current_release_date" : "2024-10-09T22:00:00.000+00:00",
      "generator" : {
        "date" : "2024-10-10T11:53:33.433+00:00",
        "engine" : {
          "name" : "BSI-WID",
          "version" : "1.3.8"
        }
      },
      "id" : "WID-SEC-W-2024-0474",
      "initial_release_date" : "2024-02-22T23:00:00.000+00:00",
      "revision_history" : [ {
        "date" : "2024-02-22T23:00:00.000+00:00",
        "number" : "1",
        "summary" : "Initiale Fassung"
      }, {
        "date" : "2024-03-12T23:00:00.000+00:00",
        "number" : "2",
        "summary" : "Neue Updates von SUSE aufgenommen"
      }, {
        "date" : "2024-03-14T23:00:00.000+00:00",
        "number" : "3",
        "summary" : "Neue Updates von SUSE aufgenommen"
      }, {
        "date" : "2024-03-17T23:00:00.000+00:00",
        "number" : "4",
        "summary" : "Neue Updates von SUSE aufgenommen"
      }, {
        "date" : "2024-03-24T23:00:00.000+00:00",
        "number" : "5",
        "summary" : "Neue Updates von SUSE aufgenommen"
      }, {
        "date" : "2024-04-29T22:00:00.000+00:00",
        "number" : "6",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-05-06T22:00:00.000+00:00",
        "number" : "7",
        "summary" : "Neue Updates von Debian aufgenommen"
      }, {
        "date" : "2024-05-07T22:00:00.000+00:00",
        "number" : "8",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-05-13T22:00:00.000+00:00",
        "number" : "9",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-05-15T22:00:00.000+00:00",
        "number" : "10",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-05-20T22:00:00.000+00:00",
        "number" : "11",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-05-28T22:00:00.000+00:00",
        "number" : "12",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-06-04T22:00:00.000+00:00",
        "number" : "13",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-06-06T22:00:00.000+00:00",
        "number" : "14",
        "summary" : "Neue Updates von Oracle Linux aufgenommen"
      }, {
        "date" : "2024-06-11T22:00:00.000+00:00",
        "number" : "15",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-06-25T22:00:00.000+00:00",
        "number" : "16",
        "summary" : "Neue Updates von Debian aufgenommen"
      }, {
        "date" : "2024-07-14T22:00:00.000+00:00",
        "number" : "17",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-07-15T22:00:00.000+00:00",
        "number" : "18",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-07-17T22:00:00.000+00:00",
        "number" : "19",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-07-18T22:00:00.000+00:00",
        "number" : "20",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-07-31T22:00:00.000+00:00",
        "number" : "21",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-08-04T22:00:00.000+00:00",
        "number" : "22",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-09-23T22:00:00.000+00:00",
        "number" : "23",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-10-09T22:00:00.000+00:00",
        "number" : "24",
        "summary" : "Neue Updates von Dell aufgenommen"
      } ],
      "status" : "final",
      "version" : "24"
    }
  },
  "product_tree" : {
    "branches" : [ {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Debian Linux",
        "product" : {
          "name" : "Debian Linux",
          "product_id" : "2951",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:debian:debian_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Debian"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<10.1.16.3",
          "product" : {
            "name" : "IBM Spectrum Protect Plus <10.1.16.3",
            "product_id" : "T037795"
          }
        }, {
          "category" : "product_version",
          "name" : "10.1.16.3",
          "product" : {
            "name" : "IBM Spectrum Protect Plus 10.1.16.3",
            "product_id" : "T037795-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:spectrum_protect_plus:10.1.16.3"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Spectrum Protect Plus"
      } ],
      "category" : "vendor",
      "name" : "IBM"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<6.8-rc5",
          "product" : {
            "name" : "Open Source Linux Kernel <6.8-rc5",
            "product_id" : "T033078"
          }
        }, {
          "category" : "product_version",
          "name" : "6.8-rc5",
          "product" : {
            "name" : "Open Source Linux Kernel 6.8-rc5",
            "product_id" : "T033078-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:linux:linux_kernel:6.8-rc5"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<6.7.6",
          "product" : {
            "name" : "Open Source Linux Kernel <6.7.6",
            "product_id" : "T033080"
          }
        }, {
          "category" : "product_version",
          "name" : "6.7.6",
          "product" : {
            "name" : "Open Source Linux Kernel 6.7.6",
            "product_id" : "T033080-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:linux:linux_kernel:6.7.6"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<6.6.18",
          "product" : {
            "name" : "Open Source Linux Kernel <6.6.18",
            "product_id" : "T033081"
          }
        }, {
          "category" : "product_version",
          "name" : "6.6.18",
          "product" : {
            "name" : "Open Source Linux Kernel 6.6.18",
            "product_id" : "T033081-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:linux:linux_kernel:6.6.18"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<6.1.79",
          "product" : {
            "name" : "Open Source Linux Kernel <6.1.79",
            "product_id" : "T033082"
          }
        }, {
          "category" : "product_version",
          "name" : "6.1.79",
          "product" : {
            "name" : "Open Source Linux Kernel 6.1.79",
            "product_id" : "T033082-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:linux:linux_kernel:6.1.79"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<5.15.149",
          "product" : {
            "name" : "Open Source Linux Kernel <5.15.149",
            "product_id" : "T033083"
          }
        }, {
          "category" : "product_version",
          "name" : "5.15.149",
          "product" : {
            "name" : "Open Source Linux Kernel 5.15.149",
            "product_id" : "T033083-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:linux:linux_kernel:5.15.149"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<5.10.210",
          "product" : {
            "name" : "Open Source Linux Kernel <5.10.210",
            "product_id" : "T033084"
          }
        }, {
          "category" : "product_version",
          "name" : "5.10.210",
          "product" : {
            "name" : "Open Source Linux Kernel 5.10.210",
            "product_id" : "T033084-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:linux:linux_kernel:5.10.210"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<5.4.269",
          "product" : {
            "name" : "Open Source Linux Kernel <5.4.269",
            "product_id" : "T033085"
          }
        }, {
          "category" : "product_version",
          "name" : "5.4.269",
          "product" : {
            "name" : "Open Source Linux Kernel 5.4.269",
            "product_id" : "T033085-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:linux:linux_kernel:5.4.269"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Linux Kernel"
      } ],
      "category" : "vendor",
      "name" : "Open Source"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Oracle Linux",
        "product" : {
          "name" : "Oracle Linux",
          "product_id" : "T004914",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:oracle:linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Oracle"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Red Hat Enterprise Linux",
        "product" : {
          "name" : "Red Hat Enterprise Linux",
          "product_id" : "67646",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:redhat:enterprise_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Red Hat"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "SUSE Linux",
        "product" : {
          "name" : "SUSE Linux",
          "product_id" : "T002207",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:suse:suse_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "SUSE"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Ubuntu Linux",
        "product" : {
          "name" : "Ubuntu Linux",
          "product_id" : "T000126",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:canonical:ubuntu_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Ubuntu"
    } ]
  },
  "vulnerabilities" : [ {
    "cve" : "CVE-2024-26593",
    "notes" : [ {
      "category" : "description",
      "text" : "Es besteht eine Schwachstelle im Linux-Kernel. Dieser Fehler besteht im I2C (Inter-Integrated Circuit) i801-Treiber aufgrund eines fehlenden zweiten Reset, wodurch der falsche Teil des Blockpuffers gelesen wird. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
    } ],
    "product_status" : {
      "known_affected" : [ "67646", "T033084", "T033085", "T004914", "T037795", "T033078", "2951", "T002207", "T033082", "T033083", "T000126", "T033080", "T033081" ]
    },
    "release_date" : "2024-02-22T23:00:00.000+00:00",
    "title" : "CVE-2024-26593"
  } ]
}