INFSA-2024:7001: kernel-rt security update
Information about definition
Identificator: INFSA-2024:7001
Type: security
Release date: 2024-10-23 10:32:05 UTC
Information about package
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Vulnerabilities description
- CVE-2021-46984
In the Linux kernel, the following vulnerability has been resolved: kyber: fix out of bounds access when preempted.
- CVE-2021-47097
In the Linux kernel, the following vulnerability has been resolved: Input: elantech - fix stack out of bound access in elantech_change_report_id().
- CVE-2021-47101
In the Linux kernel, the following vulnerability has been resolved: asix: fix uninit-value in asix_mdio_read().
- CVE-2021-47287
In the Linux kernel, the following vulnerability has been resolved: driver core: auxiliary bus: Fix memory leak when driver_register() fail.
- CVE-2021-47289
In the Linux kernel, the following vulnerability has been resolved: ACPI: fix NULL pointer dereference.
- CVE-2021-47321
In the Linux kernel, the following vulnerability has been resolved: watchdog: Fix possible use-after-free by calling del_timer_sync().
- CVE-2021-47338
In the Linux kernel, the following vulnerability has been resolved: fbmem: Do not delete the mode that is still in use.
- CVE-2021-47352
In the Linux kernel, the following vulnerability has been resolved: virtio-net: Add validation for used length.
- CVE-2021-47383
In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit.
- CVE-2021-47384
In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field.
- CVE-2021-47385
In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field.
- CVE-2021-47386
In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field.
- CVE-2021-47393
In the Linux kernel, the following vulnerability has been resolved: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs.
- CVE-2021-47412
In the Linux kernel, the following vulnerability has been resolved: block: don't call rq_qos_ops->done_bio if the bio isn't tracked.
- CVE-2021-47432
In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Don't overflow in peek().
- CVE-2021-47441
In the Linux kernel, the following vulnerability has been resolved: mlxsw: thermal: Fix out-of-bounds memory accesses.
- CVE-2021-47455
In the Linux kernel, the following vulnerability has been resolved: ptp: Fix possible memory leak in ptp_clock_register().
- CVE-2021-47466
In the Linux kernel, the following vulnerability has been resolved: mm, slub: fix potential memoryleak in kmem_cache_open().
- CVE-2021-47497
In the Linux kernel, the following vulnerability has been resolved: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells.
- CVE-2021-47527
In the Linux kernel, the following vulnerability has been resolved: serial: core: fix transmit-buffer reset and memleak.
- CVE-2021-47560
In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum: Protect driver from buggy firmware.
- CVE-2021-47582
In the Linux kernel, the following vulnerability has been resolved: USB: core: Make do_proc_control() and do_proc_bulk() killable.
- CVE-2021-47609
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver.
- CVE-2022-48619
An issue was discovered in drivers/input/input.c in the Linux kernel before 5.17.10. An attacker can cause a denial of service (panic) because input_set_capability mishandles the situation in which an event code falls outside of a bitmap.
- CVE-2022-48754
In the Linux kernel, the following vulnerability has been resolved: phylib: fix potential use-after-free.
- CVE-2022-48760
In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix hang in usb_kill_urb by adding memory barriers.
- CVE-2022-48804
In the Linux kernel, the following vulnerability has been resolved: vt_ioctl: fix array_index_nospec in vt_setactivate.
- CVE-2022-48836
In the Linux kernel, the following vulnerability has been resolved: Input: aiptek - properly check endpoint type.
- CVE-2022-48866
In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts.
- CVE-2023-52470
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: check the alloc_workqueue return value in radeon_crtc_init().
- CVE-2023-52476
In the Linux kernel, the following vulnerability has been resolved: perf/x86/lbr: Filter vsyscall addresses.
- CVE-2023-52478
In the Linux kernel, the following vulnerability has been resolved: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect.
- CVE-2023-52522
In the Linux kernel, the following vulnerability has been resolved: net: fix possible store tearing in neigh_periodic_work().
- CVE-2023-52605
In the Linux kernel, the following vulnerability has been resolved: ACPI: extlog: fix NULL pointer dereference check.
- CVE-2023-52683
In the Linux kernel, the following vulnerability has been resolved: ACPI: LPIT: Avoid u32 multiplication overflow.
- CVE-2023-52817
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL.
- CVE-2023-52840
In the Linux kernel, the following vulnerability has been resolved: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function().
- CVE-2023-6040
An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.
- CVE-2024-23848
In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.
- CVE-2024-26595
In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path.
- CVE-2024-26645
In the Linux kernel, the following vulnerability has been resolved: tracing: Ensure visibility when inserting an element into tracing_map.
- CVE-2024-26649
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the null pointer when load rlc firmware.
- CVE-2024-26665
In the Linux kernel, the following vulnerability has been resolved: tunnels: fix out of bounds access when building IPv6 PMTU error.
- CVE-2024-26717
In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid-of: fix NULL-deref on failed power up.
- CVE-2024-26720
In the Linux kernel, the following vulnerability has been resolved: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again.
- CVE-2024-26769
In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: avoid deadlock on delete association path.
- CVE-2024-26855
In the Linux kernel, the following vulnerability has been resolved: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink().
- CVE-2024-26880
In the Linux kernel, the following vulnerability has been resolved: dm: call the resume method on internal suspend.
- CVE-2024-26894
In the Linux kernel, the following vulnerability has been resolved: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit().
- CVE-2024-26923
In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect().
- CVE-2024-26939
In the Linux kernel, the following vulnerability has been resolved: drm/i915/vma: Fix UAF on destroy against retire race.
- CVE-2024-27013
In the Linux kernel, the following vulnerability has been resolved: tun: limit printing rate when illegal packet received by tun dev.
- CVE-2024-27042
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'.
- CVE-2024-35809
In the Linux kernel, the following vulnerability has been resolved: PCI/PM: Drain runtime-idle callbacks before driver removal.
- CVE-2024-35877
In the Linux kernel, the following vulnerability has been resolved: x86/mm/pat: fix VM_PAT handling in COW mappings.
- CVE-2024-35884
In the Linux kernel, the following vulnerability has been resolved: udp: do not accept non-tunnel GSO skbs landing in a tunnel.
- CVE-2024-35944
In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host().
- CVE-2024-35989
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms.
- CVE-2024-36883
In the Linux kernel, the following vulnerability has been resolved: net: fix out-of-bounds access in ops_init.
- CVE-2024-36901
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output().
- CVE-2024-36902
In the Linux kernel, the following vulnerability has been resolved: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action().
- CVE-2024-36920
In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING.
- CVE-2024-36939
In the Linux kernel, the following vulnerability has been resolved: nfs: Handle error of rpc_proc_register() in nfs_net_init().
- CVE-2024-36953
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr().
- CVE-2024-37356
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE-2024-38558
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix overwriting ct original tuple for ICMPv6.
- CVE-2024-38559
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated.
- CVE-2024-38570
In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix potential glock use-after-free on unmount.
- CVE-2024-38581
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/mes: fix use-after-free issue.
- CVE-2024-38619
In the Linux kernel, the following vulnerability has been resolved: usb-storage: alauda: Check whether the media is initialized.
- CVE-2024-39471
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add error handle to avoid out-of-bounds.
- CVE-2024-39499
In the Linux kernel, the following vulnerability has been resolved: vmci: prevent speculation leaks by sanitizing event in event_deliver().
- CVE-2024-39501
In the Linux kernel, the following vulnerability has been resolved: drivers: core: synchronize really_probe() and dev_uevent().
- CVE-2024-39506
In the Linux kernel, the following vulnerability has been resolved: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet.
- CVE-2024-40901
In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory.
- CVE-2024-40904
In the Linux kernel, the following vulnerability has been resolved: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages.
- CVE-2024-40911
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Lock wiphy in cfg80211_get_station.
- CVE-2024-40912
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup().
- CVE-2024-40929
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids.
- CVE-2024-40931
In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure snd_una is properly initialized on connect.
- CVE-2024-40941
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't read past the mfuart notifcation.
- CVE-2024-40954
In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails.
- CVE-2024-40958
In the Linux kernel, the following vulnerability has been resolved: netns: Make get_net_ns() handle zero refcount net.
- CVE-2024-40959
In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr().
- CVE-2024-40960
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible NULL dereference in rt6_probe().
- CVE-2024-40972
In the Linux kernel, the following vulnerability has been resolved: ext4: do not create EA inode under buffer lock.
- CVE-2024-40977
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery.
- CVE-2024-40978
In the Linux kernel, the following vulnerability has been resolved: scsi: qedi: Fix crash while reading debugfs attribute.
- CVE-2024-40988
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: fix UBSAN warning in kv_dpm.c.
- CVE-2024-40989
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Disassociate vcpus from redistributor region on teardown.
- CVE-2024-40995
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc().
- CVE-2024-40997
In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate: fix memory leak on CPU EPP exit.
- CVE-2024-40998
In the Linux kernel, the following vulnerability has been resolved: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super().
- CVE-2024-41005
In the Linux kernel, the following vulnerability has been resolved: netpoll: Fix race condition in netpoll_owner_active.
- CVE-2024-41007
In the Linux kernel, the following vulnerability has been resolved: tcp: avoid too many retransmit packets.
- CVE-2024-41008
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: change vm->task_info handling.
- CVE-2024-41012
In the Linux kernel, the following vulnerability has been resolved: filelock: Remove locks reliably when fcntl/close race is detected.
- CVE-2024-41013
In the Linux kernel, the following vulnerability has been resolved: xfs: don't walk off the end of a directory data block.
- CVE-2024-41014
In the Linux kernel, the following vulnerability has been resolved: xfs: add bounds checking to xlog_recover_process_data.
- CVE-2024-41035
In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor.
- CVE-2024-41038
In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers.
- CVE-2024-41039
In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Fix overflow checking of wmfw header.
- CVE-2024-41040
In the Linux kernel, the following vulnerability has been resolved: net/sched: Fix UAF when resolving a clash.
- CVE-2024-41041
In the Linux kernel, the following vulnerability has been resolved: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE-2024-41044
In the Linux kernel, the following vulnerability has been resolved: ppp: reject claimed-as-LCP but actually malformed packets.
- CVE-2024-41055
In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid().
- CVE-2024-41056
In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files.
- CVE-2024-41060
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: check bo_va->bo is non-NULL before using it.
- CVE-2024-41071
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing.
- CVE-2024-41076
In the Linux kernel, the following vulnerability has been resolved: NFSv4: Fix memory leak in nfs4_set_security_label.
- CVE-2024-41090
In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame.
- CVE-2024-41091
In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame.
- CVE-2024-41097
In the Linux kernel, the following vulnerability has been resolved: usb: atm: cxacru: fix endpoint checking in cxacru_bind().
- CVE-2024-42084
In the Linux kernel, the following vulnerability has been resolved: ftruncate: pass a signed offset.
- CVE-2024-42090
In the Linux kernel, the following vulnerability has been resolved: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER.
- CVE-2024-42096
In the Linux kernel, the following vulnerability has been resolved: x86: stop playing stack games in profile_pc().
- CVE-2024-42114
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values.
- CVE-2024-42124
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Make qedf_execute_tmf() non-preemptible.
- CVE-2024-42131
In the Linux kernel, the following vulnerability has been resolved: mm: avoid overflows in dirty throttling logic.
- CVE-2024-42152
In the Linux kernel, the following vulnerability has been resolved: nvmet: fix a possible leak when destroy a ctrl during qp establishment.
- CVE-2024-42154
In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length.
- CVE-2024-42226
In the Linux kernel, the following vulnerability has been resolved: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB.
- CVE-2024-42228
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc.
- CVE-2024-42237
In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Validate payload length before processing block.
- CVE-2024-42238
In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Return error if block header overflows file.
- CVE-2024-42240
In the Linux kernel, the following vulnerability has been resolved: x86/bhi: Avoid warning in #DB handler due to BHI mitigation.
- CVE-2024-42246
In the Linux kernel, the following vulnerability has been resolved: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket.
- CVE-2024-42322
In the Linux kernel, the following vulnerability has been resolved: ipvs: properly dereference pe in ip_vs_add_service.
- CVE-2024-43871
In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu().
Severity level
CVE | Score CVSS 2.0 | Score CVSS 3.x | Score CVSS 4.0 |
---|---|---|---|
NIST — CVE-2021-46984
|
no information | 6 | no information |
NIST — CVE-2021-47097
|
no information | 6 | no information |
NIST — CVE-2021-47101
|
no information | 6 | no information |
NIST — CVE-2021-47287
|
no information | 5.5 | no information |
NIST — CVE-2021-47289
|
no information | 5.5 | no information |
NIST — CVE-2021-47321
|
no information | 4.4 | no information |
NIST — CVE-2021-47338
|
no information | 5.1 | no information |
NIST — CVE-2021-47352
|
no information | 4.4 | no information |
NIST — CVE-2021-47383
|
no information | 6.6 | no information |
NIST — CVE-2021-47384
|
no information | 5.5 | no information |
NIST — CVE-2021-47385
|
no information | 4.4 | no information |
NIST — CVE-2021-47386
|
no information | 4.4 | no information |
NIST — CVE-2021-47393
|
no information | 4.7 | no information |
NIST — CVE-2021-47412
|
no information | 4.7 | no information |
NIST — CVE-2021-47432
|
no information | 5.5 | no information |
NIST — CVE-2021-47441
|
no information | 4.8 | no information |
NIST — CVE-2021-47455
|
no information | 5.1 | no information |
NIST — CVE-2021-47466
|
no information | 7.1 | no information |
NIST — CVE-2021-47497
|
no information | 4.4 | no information |
NIST — CVE-2021-47527
|
no information | 5.5 | no information |
NIST — CVE-2021-47560
|
no information | 4.4 | no information |
NIST — CVE-2021-47582
|
no information | 3.3 | no information |
NIST — CVE-2021-47609
|
no information | 6.7 | no information |
NIST — CVE-2022-48619
|
no information | 5.5 | no information |
NIST — CVE-2022-48754
|
no information | 5.6 | no information |
NIST — CVE-2022-48760
|
no information | 4.1 | no information |
NIST — CVE-2022-48804
|
no information | 7.1 | no information |
NIST — CVE-2022-48836
|
no information | 5.5 | no information |
NIST — CVE-2022-48866
|
no information | 6 | no information |
NIST — CVE-2023-52470
|
no information | 4.4 | no information |
NIST — CVE-2023-52476
|
no information | 5.5 | no information |
NIST — CVE-2023-52478
|
no information | 6 | no information |
NIST — CVE-2023-52522
|
no information | 5.5 | no information |
NIST — CVE-2023-52605
|
no information | 4.4 | no information |
NIST — CVE-2023-52683
|
no information | 5.5 | no information |
NIST — CVE-2023-52817
|
no information | 5.5 | no information |
NIST — CVE-2023-52840
|
no information | 4.4 | no information |
NIST — CVE-2023-6040
|
no information | 7.8 | no information |
NIST — CVE-2024-23848
|
no information | 6.7 | no information |
NIST — CVE-2024-26595
|
no information | 5.5 | no information |
NIST — CVE-2024-26645
|
no information | 4.4 | no information |
NIST — CVE-2024-26649
|
no information | 4.4 | no information |
NIST — CVE-2024-26665
|
no information | 7.1 | no information |
NIST — CVE-2024-26717
|
no information | 4.4 | no information |
NIST — CVE-2024-26720
|
no information | 5.5 | no information |
NIST — CVE-2024-26769
|
no information | 4.4 | no information |
NIST — CVE-2024-26855
|
no information | 4.4 | no information |
NIST — CVE-2024-26880
|
no information | 4.4 | no information |
NIST — CVE-2024-26894
|
no information | 6 | no information |
NIST — CVE-2024-26923
|
no information | 7 | no information |
NIST — CVE-2024-26939
|
no information | 5.5 | no information |
NIST — CVE-2024-27013
|
no information | 5.5 | no information |
NIST — CVE-2024-27042
|
no information | 5.5 | no information |
NIST — CVE-2024-35809
|
no information | 5.5 | no information |
NIST — CVE-2024-35877
|
no information | 5.5 | no information |
NIST — CVE-2024-35884
|
no information | 5.5 | no information |
NIST — CVE-2024-35944
|
no information | 5.5 | no information |
NIST — CVE-2024-35989
|
no information | 5.5 | no information |
NIST — CVE-2024-36883
|
no information | 7 | no information |
NIST — CVE-2024-36901
|
no information | 5.5 | no information |
NIST — CVE-2024-36902
|
no information | 5.5 | no information |
NIST — CVE-2024-36920
|
no information | 4.4 | no information |
NIST — CVE-2024-36939
|
no information | 5.5 | no information |
NIST — CVE-2024-36953
|
no information | 4.4 | no information |
NIST — CVE-2024-37356
|
no information | 6.6 | no information |
NIST — CVE-2024-38558
|
no information | 5.5 | no information |
NIST — CVE-2024-38559
|
no information | 4.4 | no information |
NIST — CVE-2024-38570
|
no information | 5.8 | no information |
NIST — CVE-2024-38581
|
no information | 7 | no information |
NIST — CVE-2024-38619
|
no information | 5.5 | no information |
NIST — CVE-2024-39471
|
no information | 4.4 | no information |
NIST — CVE-2024-39499
|
no information | 4.1 | no information |
NIST — CVE-2024-39501
|
no information | 5.5 | no information |
NIST — CVE-2024-39506
|
no information | 5.5 | no information |
NIST — CVE-2024-40901
|
no information | 5.5 | no information |
NIST — CVE-2024-40904
|
no information | 5.5 | no information |
NIST — CVE-2024-40911
|
no information | 4.4 | no information |
NIST — CVE-2024-40912
|
no information | 4.7 | no information |
NIST — CVE-2024-40929
|
no information | 4.4 | no information |
NIST — CVE-2024-40931
|
no information | 5.5 | no information |
NIST — CVE-2024-40941
|
no information | 4.1 | no information |
NIST — CVE-2024-40954
|
no information | 5.5 | no information |
NIST — CVE-2024-40958
|
no information | 5.5 | no information |
NIST — CVE-2024-40959
|
no information | 5.5 | no information |
NIST — CVE-2024-40960
|
no information | 5.5 | no information |
NIST — CVE-2024-40972
|
no information | 4.1 | no information |
NIST — CVE-2024-40977
|
no information | 5.5 | no information |
NIST — CVE-2024-40978
|
no information | 4.1 | no information |
NIST — CVE-2024-40988
|
no information | 4.7 | no information |
NIST — CVE-2024-40989
|
no information | 5.6 | no information |
NIST — CVE-2024-40995
|
no information | 5.5 | no information |
NIST — CVE-2024-40997
|
no information | 5.1 | no information |
NIST — CVE-2024-40998
|
no information | 5.5 | no information |
NIST — CVE-2024-41005
|
no information | 4.7 | no information |
NIST — CVE-2024-41007
|
no information | 5.5 | no information |
NIST — CVE-2024-41008
|
no information | 4.4 | no information |
NIST — CVE-2024-41012
|
no information | 5.5 | no information |
NIST — CVE-2024-41013
|
no information | 7.1 | no information |
NIST — CVE-2024-41014
|
no information | 6.1 | no information |
NIST — CVE-2024-41035
|
no information | 5.5 | no information |
NIST — CVE-2024-41038
|
no information | 5.5 | no information |
NIST — CVE-2024-41039
|
no information | 5.2 | no information |
NIST — CVE-2024-41040
|
no information | 5.2 | no information |
NIST — CVE-2024-41041
|
no information | 4.7 | no information |
NIST — CVE-2024-41044
|
no information | 4.9 | no information |
NIST — CVE-2024-41055
|
no information | 5.5 | no information |
NIST — CVE-2024-41056
|
no information | 5.2 | no information |
NIST — CVE-2024-41060
|
no information | 5.5 | no information |
NIST — CVE-2024-41071
|
no information | 7.8 | no information |
NIST — CVE-2024-41076
|
no information | 5.5 | no information |
NIST — CVE-2024-41090
|
no information | 7.1 | no information |
NIST — CVE-2024-41091
|
no information | 7.1 | no information |
NIST — CVE-2024-41097
|
no information | 5.5 | no information |
NIST — CVE-2024-42084
|
no information | 6.3 | no information |
NIST — CVE-2024-42090
|
no information | 4.7 | no information |
NIST — CVE-2024-42096
|
no information | 5.1 | no information |
NIST — CVE-2024-42114
|
no information | 4.4 | no information |
NIST — CVE-2024-42124
|
no information | 5.5 | no information |
NIST — CVE-2024-42131
|
no information | 4.4 | no information |
NIST — CVE-2024-42152
|
no information | 4.4 | no information |
NIST — CVE-2024-42154
|
no information | 4.4 | no information |
NIST — CVE-2024-42226
|
no information | 5.5 | no information |
NIST — CVE-2024-42228
|
no information | 6.3 | no information |
NIST — CVE-2024-42237
|
no information | 5.5 | no information |
NIST — CVE-2024-42238
|
no information | 5.5 | no information |
NIST — CVE-2024-42240
|
no information | 5.5 | no information |
NIST — CVE-2024-42246
|
no information | 5.5 | no information |
NIST — CVE-2024-42322
|
no information | 5.5 | no information |
NIST — CVE-2024-43871
|
no information | 5.5 | no information |
Updated packages