INFSA-2024:7000: kernel security update

Information about definition

Identificator: INFSA-2024:7000

Type: security

Release date: 2024-10-23 10:31:18 UTC

Information about package

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Vulnerabilities description

  • CVE-2021-46984

    In the Linux kernel, the following vulnerability has been resolved: kyber: fix out of bounds access when preempted.

  • CVE-2021-47097

    In the Linux kernel, the following vulnerability has been resolved: Input: elantech - fix stack out of bound access in elantech_change_report_id().

  • CVE-2021-47101

    In the Linux kernel, the following vulnerability has been resolved: asix: fix uninit-value in asix_mdio_read().

  • CVE-2021-47287

    In the Linux kernel, the following vulnerability has been resolved: driver core: auxiliary bus: Fix memory leak when driver_register() fail.

  • CVE-2021-47289

    In the Linux kernel, the following vulnerability has been resolved: ACPI: fix NULL pointer dereference.

  • CVE-2021-47321

    In the Linux kernel, the following vulnerability has been resolved: watchdog: Fix possible use-after-free by calling del_timer_sync().

  • CVE-2021-47338

    In the Linux kernel, the following vulnerability has been resolved: fbmem: Do not delete the mode that is still in use.

  • CVE-2021-47352

    In the Linux kernel, the following vulnerability has been resolved: virtio-net: Add validation for used length.

  • CVE-2021-47383

    In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit.

  • CVE-2021-47384

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field.

  • CVE-2021-47385

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field.

  • CVE-2021-47386

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field.

  • CVE-2021-47393

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs.

  • CVE-2021-47412

    In the Linux kernel, the following vulnerability has been resolved: block: don't call rq_qos_ops->done_bio if the bio isn't tracked.

  • CVE-2021-47432

    In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Don't overflow in peek().

  • CVE-2021-47441

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: thermal: Fix out-of-bounds memory accesses.

  • CVE-2021-47455

    In the Linux kernel, the following vulnerability has been resolved: ptp: Fix possible memory leak in ptp_clock_register().

  • CVE-2021-47466

    In the Linux kernel, the following vulnerability has been resolved: mm, slub: fix potential memoryleak in kmem_cache_open().

  • CVE-2021-47497

    In the Linux kernel, the following vulnerability has been resolved: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells.

  • CVE-2021-47527

    In the Linux kernel, the following vulnerability has been resolved: serial: core: fix transmit-buffer reset and memleak.

  • CVE-2021-47560

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum: Protect driver from buggy firmware.

  • CVE-2021-47582

    In the Linux kernel, the following vulnerability has been resolved: USB: core: Make do_proc_control() and do_proc_bulk() killable.

  • CVE-2021-47609

    In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver.

  • CVE-2022-48619

    An issue was discovered in drivers/input/input.c in the Linux kernel before 5.17.10. An attacker can cause a denial of service (panic) because input_set_capability mishandles the situation in which an event code falls outside of a bitmap.

  • CVE-2022-48754

    In the Linux kernel, the following vulnerability has been resolved: phylib: fix potential use-after-free.

  • CVE-2022-48760

    In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix hang in usb_kill_urb by adding memory barriers.

  • CVE-2022-48804

    In the Linux kernel, the following vulnerability has been resolved: vt_ioctl: fix array_index_nospec in vt_setactivate.

  • CVE-2022-48836

    In the Linux kernel, the following vulnerability has been resolved: Input: aiptek - properly check endpoint type.

  • CVE-2022-48866

    In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts.

  • CVE-2023-52470

    In the Linux kernel, the following vulnerability has been resolved: drm/radeon: check the alloc_workqueue return value in radeon_crtc_init().

  • CVE-2023-52476

    In the Linux kernel, the following vulnerability has been resolved: perf/x86/lbr: Filter vsyscall addresses.

  • CVE-2023-52478

    In the Linux kernel, the following vulnerability has been resolved: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect.

  • CVE-2023-52522

    In the Linux kernel, the following vulnerability has been resolved: net: fix possible store tearing in neigh_periodic_work().

  • CVE-2023-52605

    In the Linux kernel, the following vulnerability has been resolved: ACPI: extlog: fix NULL pointer dereference check.

  • CVE-2023-52683

    In the Linux kernel, the following vulnerability has been resolved: ACPI: LPIT: Avoid u32 multiplication overflow.

  • CVE-2023-52798

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix dfs radar event locking.

  • CVE-2023-52800

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix htt pktlog locking.

  • CVE-2023-52809

    In the Linux kernel, the following vulnerability has been resolved: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup().

  • CVE-2023-52817

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL.

  • CVE-2023-52840

    In the Linux kernel, the following vulnerability has been resolved: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function().

  • CVE-2023-6040

    An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.

  • CVE-2024-23848

    In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.

  • CVE-2024-26595

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path.

  • CVE-2024-26600

    In the Linux kernel, the following vulnerability has been resolved: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP.

  • CVE-2024-26638

    In the Linux kernel, the following vulnerability has been resolved: nbd: always initialize struct msghdr completely.

  • CVE-2024-26645

    In the Linux kernel, the following vulnerability has been resolved: tracing: Ensure visibility when inserting an element into tracing_map.

  • CVE-2024-26649

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the null pointer when load rlc firmware.

  • CVE-2024-26665

    In the Linux kernel, the following vulnerability has been resolved: tunnels: fix out of bounds access when building IPv6 PMTU error.

  • CVE-2024-26717

    In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid-of: fix NULL-deref on failed power up.

  • CVE-2024-26720

    In the Linux kernel, the following vulnerability has been resolved: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again.

  • CVE-2024-26769

    In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: avoid deadlock on delete association path.

  • CVE-2024-26846

    In the Linux kernel, the following vulnerability has been resolved: nvme-fc: do not wait in vain when unloading module.

  • CVE-2024-26855

    In the Linux kernel, the following vulnerability has been resolved: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink().

  • CVE-2024-26880

    In the Linux kernel, the following vulnerability has been resolved: dm: call the resume method on internal suspend.

  • CVE-2024-26894

    In the Linux kernel, the following vulnerability has been resolved: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit().

  • CVE-2024-26923

    In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect().

  • CVE-2024-26939

    In the Linux kernel, the following vulnerability has been resolved: drm/i915/vma: Fix UAF on destroy against retire race.

  • CVE-2024-27013

    In the Linux kernel, the following vulnerability has been resolved: tun: limit printing rate when illegal packet received by tun dev.

  • CVE-2024-27042

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'.

  • CVE-2024-35809

    In the Linux kernel, the following vulnerability has been resolved: PCI/PM: Drain runtime-idle callbacks before driver removal.

  • CVE-2024-35877

    In the Linux kernel, the following vulnerability has been resolved: x86/mm/pat: fix VM_PAT handling in COW mappings.

  • CVE-2024-35884

    In the Linux kernel, the following vulnerability has been resolved: udp: do not accept non-tunnel GSO skbs landing in a tunnel.

  • CVE-2024-35944

    In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host().

  • CVE-2024-35989

    In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms.

  • CVE-2024-36883

    In the Linux kernel, the following vulnerability has been resolved: net: fix out-of-bounds access in ops_init.

  • CVE-2024-36901

    In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output().

  • CVE-2024-36902

    In the Linux kernel, the following vulnerability has been resolved: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action().

  • CVE-2024-36919

    In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload.

  • CVE-2024-36920

    In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING.

  • CVE-2024-36922

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: read txq->read_ptr under lock.

  • CVE-2024-36939

    In the Linux kernel, the following vulnerability has been resolved: nfs: Handle error of rpc_proc_register() in nfs_net_init().

  • CVE-2024-36953

    In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr().

  • CVE-2024-37356

    In the Linux kernel, the following vulnerability has been resolved: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().

  • CVE-2024-38558

    In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix overwriting ct original tuple for ICMPv6.

  • CVE-2024-38559

    In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated.

  • CVE-2024-38570

    In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix potential glock use-after-free on unmount.

  • CVE-2024-38579

    In the Linux kernel, the following vulnerability has been resolved: crypto: bcm - Fix pointer arithmetic.

  • CVE-2024-38581

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/mes: fix use-after-free issue.

  • CVE-2024-38619

    In the Linux kernel, the following vulnerability has been resolved: usb-storage: alauda: Check whether the media is initialized.

  • CVE-2024-39471

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add error handle to avoid out-of-bounds.

  • CVE-2024-39499

    In the Linux kernel, the following vulnerability has been resolved: vmci: prevent speculation leaks by sanitizing event in event_deliver().

  • CVE-2024-39501

    In the Linux kernel, the following vulnerability has been resolved: drivers: core: synchronize really_probe() and dev_uevent().

  • CVE-2024-39506

    In the Linux kernel, the following vulnerability has been resolved: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet.

  • CVE-2024-40901

    In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory.

  • CVE-2024-40904

    In the Linux kernel, the following vulnerability has been resolved: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages.

  • CVE-2024-40911

    In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Lock wiphy in cfg80211_get_station.

  • CVE-2024-40912

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup().

  • CVE-2024-40929

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids.

  • CVE-2024-40931

    In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure snd_una is properly initialized on connect.

  • CVE-2024-40941

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't read past the mfuart notifcation.

  • CVE-2024-40954

    In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails.

  • CVE-2024-40958

    In the Linux kernel, the following vulnerability has been resolved: netns: Make get_net_ns() handle zero refcount net.

  • CVE-2024-40959

    In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr().

  • CVE-2024-40960

    In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible NULL dereference in rt6_probe().

  • CVE-2024-40972

    In the Linux kernel, the following vulnerability has been resolved: ext4: do not create EA inode under buffer lock.

  • CVE-2024-40977

    In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery.

  • CVE-2024-40978

    In the Linux kernel, the following vulnerability has been resolved: scsi: qedi: Fix crash while reading debugfs attribute.

  • CVE-2024-40988

    In the Linux kernel, the following vulnerability has been resolved: drm/radeon: fix UBSAN warning in kv_dpm.c.

  • CVE-2024-40989

    In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Disassociate vcpus from redistributor region on teardown.

  • CVE-2024-40995

    In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc().

  • CVE-2024-40997

    In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate: fix memory leak on CPU EPP exit.

  • CVE-2024-40998

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super().

  • CVE-2024-41005

    In the Linux kernel, the following vulnerability has been resolved: netpoll: Fix race condition in netpoll_owner_active.

  • CVE-2024-41007

    In the Linux kernel, the following vulnerability has been resolved: tcp: avoid too many retransmit packets.

  • CVE-2024-41008

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: change vm->task_info handling.

  • CVE-2024-41012

    In the Linux kernel, the following vulnerability has been resolved: filelock: Remove locks reliably when fcntl/close race is detected.

  • CVE-2024-41013

    In the Linux kernel, the following vulnerability has been resolved: xfs: don't walk off the end of a directory data block.

  • CVE-2024-41014

    In the Linux kernel, the following vulnerability has been resolved: xfs: add bounds checking to xlog_recover_process_data.

  • CVE-2024-41023

    In the Linux kernel, the following vulnerability has been resolved: sched/deadline: Fix task_struct reference leak.

  • CVE-2024-41035

    In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor.

  • CVE-2024-41038

    In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers.

  • CVE-2024-41039

    In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Fix overflow checking of wmfw header.

  • CVE-2024-41040

    In the Linux kernel, the following vulnerability has been resolved: net/sched: Fix UAF when resolving a clash.

  • CVE-2024-41041

    In the Linux kernel, the following vulnerability has been resolved: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().

  • CVE-2024-41044

    In the Linux kernel, the following vulnerability has been resolved: ppp: reject claimed-as-LCP but actually malformed packets.

  • CVE-2024-41055

    In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid().

  • CVE-2024-41056

    In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files.

  • CVE-2024-41060

    In the Linux kernel, the following vulnerability has been resolved: drm/radeon: check bo_va->bo is non-NULL before using it.

  • CVE-2024-41064

    In the Linux kernel, the following vulnerability has been resolved: powerpc/eeh: avoid possible crash when edev->pdev changes.

  • CVE-2024-41065

    In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Whitelist dtl slub object for copying to userspace.

  • CVE-2024-41071

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing.

  • CVE-2024-41076

    In the Linux kernel, the following vulnerability has been resolved: NFSv4: Fix memory leak in nfs4_set_security_label.

  • CVE-2024-41090

    In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame.

  • CVE-2024-41091

    In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame.

  • CVE-2024-41097

    In the Linux kernel, the following vulnerability has been resolved: usb: atm: cxacru: fix endpoint checking in cxacru_bind().

  • CVE-2024-42084

    In the Linux kernel, the following vulnerability has been resolved: ftruncate: pass a signed offset.

  • CVE-2024-42090

    In the Linux kernel, the following vulnerability has been resolved: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER.

  • CVE-2024-42094

    In the Linux kernel, the following vulnerability has been resolved: net/iucv: Avoid explicit cpumask var allocation on stack.

  • CVE-2024-42096

    In the Linux kernel, the following vulnerability has been resolved: x86: stop playing stack games in profile_pc().

  • CVE-2024-42114

    In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values.

  • CVE-2024-42124

    In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Make qedf_execute_tmf() non-preemptible.

  • CVE-2024-42131

    In the Linux kernel, the following vulnerability has been resolved: mm: avoid overflows in dirty throttling logic.

  • CVE-2024-42152

    In the Linux kernel, the following vulnerability has been resolved: nvmet: fix a possible leak when destroy a ctrl during qp establishment.

  • CVE-2024-42154

    In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length.

  • CVE-2024-42225

    In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: replace skb_put with skb_put_zero.

  • CVE-2024-42226

    In the Linux kernel, the following vulnerability has been resolved: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB.

  • CVE-2024-42228

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc.

  • CVE-2024-42237

    In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Validate payload length before processing block.

  • CVE-2024-42238

    In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Return error if block header overflows file.

  • CVE-2024-42240

    In the Linux kernel, the following vulnerability has been resolved: x86/bhi: Avoid warning in #DB handler due to BHI mitigation.

  • CVE-2024-42246

    In the Linux kernel, the following vulnerability has been resolved: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket.

  • CVE-2024-42265

    In the Linux kernel, the following vulnerability has been resolved: protect the fetch of ->fd[fd] in do_dup2() from mispredictions.

  • CVE-2024-42322

    In the Linux kernel, the following vulnerability has been resolved: ipvs: properly dereference pe in ip_vs_add_service.

  • CVE-2024-43830

    In the Linux kernel, the following vulnerability has been resolved: leds: trigger: Unregister sysfs attributes before calling deactivate().

  • CVE-2024-43871

    In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu().

Severity level

CVE Score CVSS 2.0 Score CVSS 3.x Score CVSS 4.0
no information 6 no information
no information 6 no information
no information 6 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 5.1 no information
no information 4.4 no information
no information 6.6 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 4.7 no information
no information 4.7 no information
no information 5.5 no information
no information 4.8 no information
no information 5.1 no information
no information 7.1 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 3.3 no information
no information 6.7 no information
no information 5.5 no information
no information 5.6 no information
no information 4.1 no information
no information 7.1 no information
no information 5.5 no information
no information 6 no information
no information 4.4 no information
no information 5.5 no information
no information 6 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
NIST — CVE-2023-6040
no information 7.8 no information
no information 6.7 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 4.4 no information
no information 7.1 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 4.4 no information
no information 4.4 no information
no information 6 no information
no information 7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 7 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 6.6 no information
no information 5.5 no information
no information 4.4 no information
no information 5.8 no information
no information 4.4 no information
no information 7 no information
no information 5.5 no information
no information 4.4 no information
no information 4.1 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.7 no information
no information 4.4 no information
no information 5.5 no information
no information 4.1 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.1 no information
no information 5.5 no information
no information 4.1 no information
no information 4.7 no information
no information 5.6 no information
no information 5.5 no information
no information 5.1 no information
no information 5.5 no information
no information 4.7 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 7.1 no information
no information 6.1 no information
no information 6.1 no information
no information 5.5 no information
no information 5.5 no information
no information 5.2 no information
no information 5.2 no information
no information 4.7 no information
no information 4.9 no information
no information 5.5 no information
no information 5.2 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 7.8 no information
no information 5.5 no information
no information 7.1 no information
no information 7.1 no information
no information 5.5 no information
no information 6.3 no information
no information 4.7 no information
no information 5.5 no information
no information 5.1 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 4.4 no information
no information 4.8 no information
no information 5.5 no information
no information 6.3 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 6.6 no information
no information 5.5 no information
Critical, important, moderate, low

Updated packages