Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-46698 (GCVE-0-2024-46698)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-46698", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-29T15:04:59.820597Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-29T15:05:14.743Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/firmware/sysfb.c", "drivers/of/platform.c", "drivers/video/aperture.c", "include/linux/sysfb.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "17e78f43de0c6da34204cc858b4cc05671ea9acf", "status": "affected", "version": "5ae3716cfdcd286268133867f67d0803847acefc", "versionType": "git" }, { "lessThan": "b49420d6a1aeb399e5b107fc6eb8584d0860fbd7", "status": "affected", "version": "5ae3716cfdcd286268133867f67d0803847acefc", "versionType": "git" }, { "status": "affected", "version": "485ec8f8e1d8ae12aa1daa5ad345ba8940ad2db7", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/firmware/sysfb.c", "drivers/of/platform.c", "drivers/video/aperture.c", "include/linux/sysfb.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.5" }, { "lessThan": "6.5", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.10.*", "status": "unaffected", "version": "6.10.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.11", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.10.8", "versionStartIncluding": "6.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.11", "versionStartIncluding": "6.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.1.47", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo/aperture: optionally match the device in sysfb_disable()\n\nIn aperture_remove_conflicting_pci_devices(), we currently only\ncall sysfb_disable() on vga class devices. This leads to the\nfollowing problem when the pimary device is not VGA compatible:\n\n1. A PCI device with a non-VGA class is the boot display\n2. That device is probed first and it is not a VGA device so\n sysfb_disable() is not called, but the device resources\n are freed by aperture_detach_platform_device()\n3. Non-primary GPU has a VGA class and it ends up calling sysfb_disable()\n4. NULL pointer dereference via sysfb_disable() since the resources\n have already been freed by aperture_detach_platform_device() when\n it was called by the other device.\n\nFix this by passing a device pointer to sysfb_disable() and checking\nthe device to determine if we should execute it or not.\n\nv2: Fix build when CONFIG_SCREEN_INFO is not set\nv3: Move device check into the mutex\n Drop primary variable in aperture_remove_conflicting_pci_devices()\n Drop __init on pci sysfb_pci_dev_is_enabled()" } ], "providerMetadata": { "dateUpdated": "2025-05-04T12:58:38.132Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/17e78f43de0c6da34204cc858b4cc05671ea9acf" }, { "url": "https://git.kernel.org/stable/c/b49420d6a1aeb399e5b107fc6eb8584d0860fbd7" } ], "title": "video/aperture: optionally match the device in sysfb_disable()", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-46698", "datePublished": "2024-09-13T05:29:25.387Z", "dateReserved": "2024-09-11T15:12:18.250Z", "dateUpdated": "2025-05-04T12:58:38.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-46698\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-09-13T06:15:14.563\",\"lastModified\":\"2024-09-13T16:53:03.000\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvideo/aperture: optionally match the device in sysfb_disable()\\n\\nIn aperture_remove_conflicting_pci_devices(), we currently only\\ncall sysfb_disable() on vga class devices. This leads to the\\nfollowing problem when the pimary device is not VGA compatible:\\n\\n1. A PCI device with a non-VGA class is the boot display\\n2. That device is probed first and it is not a VGA device so\\n sysfb_disable() is not called, but the device resources\\n are freed by aperture_detach_platform_device()\\n3. Non-primary GPU has a VGA class and it ends up calling sysfb_disable()\\n4. NULL pointer dereference via sysfb_disable() since the resources\\n have already been freed by aperture_detach_platform_device() when\\n it was called by the other device.\\n\\nFix this by passing a device pointer to sysfb_disable() and checking\\nthe device to determine if we should execute it or not.\\n\\nv2: Fix build when CONFIG_SCREEN_INFO is not set\\nv3: Move device check into the mutex\\n Drop primary variable in aperture_remove_conflicting_pci_devices()\\n Drop __init on pci sysfb_pci_dev_is_enabled()\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: video/aperture: opcionalmente hacer coincidir el dispositivo en sysfb_disable() En aperture_remove_conflicting_pci_devices(), actualmente solo llamamos a sysfb_disable() en dispositivos de clase vga. Esto lleva al siguiente problema cuando el dispositivo principal no es compatible con VGA: 1. Un dispositivo PCI con una clase que no es VGA es la pantalla de arranque 2. Ese dispositivo se sondea primero y no es un dispositivo VGA, por lo que no se llama a sysfb_disable(), pero los recursos del dispositivo se liberan mediante aperture_detach_platform_device() 3. La GPU no principal tiene una clase VGA y termina llamando a sysfb_disable() 4. Desreferencia de puntero NULL a trav\u00e9s de sysfb_disable() ya que los recursos ya se han liberado mediante aperture_detach_platform_device() cuando fue llamado por el otro dispositivo. Solucione esto pasando un puntero de dispositivo a sysfb_disable() y verificando el dispositivo para determinar si debemos ejecutarlo o no. v2: Arreglar la compilaci\u00f3n cuando CONFIG_SCREEN_INFO no est\u00e1 configurado v3: Mover la verificaci\u00f3n del dispositivo al mutex Eliminar la variable principal en aperture_remove_conflicting_pci_devices() Eliminar __init en pci sysfb_pci_dev_is_enabled()\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5\",\"versionEndExcluding\":\"6.10.8\",\"matchCriteriaId\":\"44B0C10F-3694-48FB-9556-944BD815090B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3CE743-2126-47A3-8B7C-822B502CF119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEB27E7-30AA-45CC-8934-B89263EF3551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0005AEF-856E-47EB-BFE4-90C46899394D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"39889A68-6D34-47A6-82FC-CD0BF23D6754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8383ABF-1457-401F-9B61-EE50F4C61F4F\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/17e78f43de0c6da34204cc858b4cc05671ea9acf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b49420d6a1aeb399e5b107fc6eb8584d0860fbd7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-46698\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-29T15:04:59.820597Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-29T15:05:04.085Z\"}}], \"cna\": {\"title\": \"video/aperture: optionally match the device in sysfb_disable()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5ae3716cfdcd286268133867f67d0803847acefc\", \"lessThan\": \"17e78f43de0c6da34204cc858b4cc05671ea9acf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"5ae3716cfdcd286268133867f67d0803847acefc\", \"lessThan\": \"b49420d6a1aeb399e5b107fc6eb8584d0860fbd7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"485ec8f8e1d8ae12aa1daa5ad345ba8940ad2db7\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/firmware/sysfb.c\", \"drivers/of/platform.c\", \"drivers/video/aperture.c\", \"include/linux/sysfb.h\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.5\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.5\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.10.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/firmware/sysfb.c\", \"drivers/of/platform.c\", \"drivers/video/aperture.c\", \"include/linux/sysfb.h\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/17e78f43de0c6da34204cc858b4cc05671ea9acf\"}, {\"url\": \"https://git.kernel.org/stable/c/b49420d6a1aeb399e5b107fc6eb8584d0860fbd7\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvideo/aperture: optionally match the device in sysfb_disable()\\n\\nIn aperture_remove_conflicting_pci_devices(), we currently only\\ncall sysfb_disable() on vga class devices. This leads to the\\nfollowing problem when the pimary device is not VGA compatible:\\n\\n1. A PCI device with a non-VGA class is the boot display\\n2. That device is probed first and it is not a VGA device so\\n sysfb_disable() is not called, but the device resources\\n are freed by aperture_detach_platform_device()\\n3. Non-primary GPU has a VGA class and it ends up calling sysfb_disable()\\n4. NULL pointer dereference via sysfb_disable() since the resources\\n have already been freed by aperture_detach_platform_device() when\\n it was called by the other device.\\n\\nFix this by passing a device pointer to sysfb_disable() and checking\\nthe device to determine if we should execute it or not.\\n\\nv2: Fix build when CONFIG_SCREEN_INFO is not set\\nv3: Move device check into the mutex\\n Drop primary variable in aperture_remove_conflicting_pci_devices()\\n Drop __init on pci sysfb_pci_dev_is_enabled()\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10.8\", \"versionStartIncluding\": \"6.5\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11\", \"versionStartIncluding\": \"6.5\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"6.1.47\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:58:38.132Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-46698\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T12:58:38.132Z\", \"dateReserved\": \"2024-09-11T15:12:18.250Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-13T05:29:25.387Z\", \"assignerShortName\": \"Linux\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
wid-sec-w-2024-2133
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder einen unspezifischen Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2133 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2133.json" }, { "category": "self", "summary": "WID-SEC-2024-2133 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2133" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46675 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46675-ba70@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46676 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46676-0b05@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46677 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46677-b53c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46678 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46678-ca65@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46679 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46679-3527@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46680 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46680-f40d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46681 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46681-6086@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46682 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46682-df82@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46684 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46684-d492@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46685 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46685-6606@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46686 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46686-5b18@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46687 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46687-5668@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46688 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46688-7a5a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46689 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46689-4c19@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46690 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46690-38b2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46691 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46691-93e1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46692 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46692-f287@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46693 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46693-cbe3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46694 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46694-0706@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46695 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46695-affc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46696 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46696-a8c1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46697 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46697-d166@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46698 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46698-357c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46699 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46699-b1cf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46700 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46700-ed8e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcements vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5782 vom 2024-10-03", "url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-071 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-071.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3565-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3563-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3567-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3587-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3585-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019586.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16", "url": "https://ubuntu.com/security/notices/USN-7069-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7069-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-192 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-192.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-072 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-072.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-056 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-056.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-194 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-194.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-193 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-193.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12813.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7110-1 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7110-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7123-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09", "url": "https://linux.oracle.com/errata/ELSA-2024-12868.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10944 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10944" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10943 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10943" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10939" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10939.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10943 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10943.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7166-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11486 vom 2024-12-19", "url": "https://access.redhat.com/errata/RHSA-2024:11486" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", "url": "https://linux.oracle.com/errata/ELSA-2024-12887.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:10944 vom 2024-12-19", "url": "https://errata.build.resf.org/RLSA-2024:10944" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7166-3" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-11486 vom 2025-01-07", "url": "https://linux.oracle.com/errata/ELSA-2024-11486.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7186-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7186-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-09T23:00:00.000+00:00", "generator": { "date": "2025-01-10T09:18:25.298+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-2133", "initial_release_date": "2024-09-12T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian und Amazon aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat, Oracle Linux, Rocky Enterprise Software Foundation und SUSE aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "30" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T033107", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-46673", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46673" }, { "cve": "CVE-2024-46674", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46674" }, { "cve": "CVE-2024-46675", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46675" }, { "cve": "CVE-2024-46676", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46676" }, { "cve": "CVE-2024-46677", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46677" }, { "cve": "CVE-2024-46678", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46678" }, { "cve": "CVE-2024-46679", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46679" }, { "cve": "CVE-2024-46680", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46680" }, { "cve": "CVE-2024-46681", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46681" }, { "cve": "CVE-2024-46682", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46682" }, { "cve": "CVE-2024-46683", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46683" }, { "cve": "CVE-2024-46684", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46684" }, { "cve": "CVE-2024-46685", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46685" }, { "cve": "CVE-2024-46686", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46686" }, { "cve": "CVE-2024-46687", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46687" }, { "cve": "CVE-2024-46688", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46688" }, { "cve": "CVE-2024-46689", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46689" }, { "cve": "CVE-2024-46690", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46690" }, { "cve": "CVE-2024-46691", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46691" }, { "cve": "CVE-2024-46692", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46692" }, { "cve": "CVE-2024-46693", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46693" }, { "cve": "CVE-2024-46694", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46694" }, { "cve": "CVE-2024-46695", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46695" }, { "cve": "CVE-2024-46696", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46696" }, { "cve": "CVE-2024-46697", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46697" }, { "cve": "CVE-2024-46698", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46698" }, { "cve": "CVE-2024-46699", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46699" }, { "cve": "CVE-2024-46700", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46700" }, { "cve": "CVE-2024-46701", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46701" }, { "cve": "CVE-2024-46702", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46702" }, { "cve": "CVE-2024-46703", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46703" }, { "cve": "CVE-2024-46704", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46704" }, { "cve": "CVE-2024-46705", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46705" }, { "cve": "CVE-2024-46706", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46706" }, { "cve": "CVE-2024-46707", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46707" }, { "cve": "CVE-2024-46708", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46708" }, { "cve": "CVE-2024-46709", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46709" }, { "cve": "CVE-2024-46710", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46710" }, { "cve": "CVE-2024-46711", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46711" }, { "cve": "CVE-2024-46712", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46712" } ] }
WID-SEC-W-2024-2133
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder einen unspezifischen Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2133 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2133.json" }, { "category": "self", "summary": "WID-SEC-2024-2133 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2133" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46675 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46675-ba70@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46676 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46676-0b05@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46677 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46677-b53c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46678 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46678-ca65@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46679 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46679-3527@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46680 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46680-f40d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46681 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46681-6086@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46682 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46682-df82@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46684 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46684-d492@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46685 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46685-6606@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46686 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46686-5b18@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46687 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46687-5668@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46688 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46688-7a5a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46689 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46689-4c19@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46690 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46690-38b2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46691 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46691-93e1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46692 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46692-f287@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46693 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46693-cbe3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46694 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46694-0706@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46695 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46695-affc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46696 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46696-a8c1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46697 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46697-d166@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46698 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46698-357c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46699 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46699-b1cf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46700 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46700-ed8e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcements vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5782 vom 2024-10-03", "url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-071 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-071.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3565-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3563-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3567-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3587-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3585-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019586.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16", "url": "https://ubuntu.com/security/notices/USN-7069-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7069-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-192 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-192.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-072 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-072.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-056 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-056.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-194 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-194.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-193 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-193.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12813.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7110-1 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7110-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7123-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09", "url": "https://linux.oracle.com/errata/ELSA-2024-12868.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10944 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10944" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10943 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10943" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10939" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10939.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10943 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10943.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7166-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11486 vom 2024-12-19", "url": "https://access.redhat.com/errata/RHSA-2024:11486" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", "url": "https://linux.oracle.com/errata/ELSA-2024-12887.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:10944 vom 2024-12-19", "url": "https://errata.build.resf.org/RLSA-2024:10944" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7166-3" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-11486 vom 2025-01-07", "url": "https://linux.oracle.com/errata/ELSA-2024-11486.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7186-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7186-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-09T23:00:00.000+00:00", "generator": { "date": "2025-01-10T09:18:25.298+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-2133", "initial_release_date": "2024-09-12T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian und Amazon aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat, Oracle Linux, Rocky Enterprise Software Foundation und SUSE aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "30" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T033107", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-46673", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46673" }, { "cve": "CVE-2024-46674", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46674" }, { "cve": "CVE-2024-46675", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46675" }, { "cve": "CVE-2024-46676", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46676" }, { "cve": "CVE-2024-46677", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46677" }, { "cve": "CVE-2024-46678", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46678" }, { "cve": "CVE-2024-46679", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46679" }, { "cve": "CVE-2024-46680", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46680" }, { "cve": "CVE-2024-46681", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46681" }, { "cve": "CVE-2024-46682", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46682" }, { "cve": "CVE-2024-46683", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46683" }, { "cve": "CVE-2024-46684", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46684" }, { "cve": "CVE-2024-46685", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46685" }, { "cve": "CVE-2024-46686", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46686" }, { "cve": "CVE-2024-46687", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46687" }, { "cve": "CVE-2024-46688", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46688" }, { "cve": "CVE-2024-46689", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46689" }, { "cve": "CVE-2024-46690", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46690" }, { "cve": "CVE-2024-46691", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46691" }, { "cve": "CVE-2024-46692", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46692" }, { "cve": "CVE-2024-46693", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46693" }, { "cve": "CVE-2024-46694", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46694" }, { "cve": "CVE-2024-46695", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46695" }, { "cve": "CVE-2024-46696", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46696" }, { "cve": "CVE-2024-46697", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46697" }, { "cve": "CVE-2024-46698", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46698" }, { "cve": "CVE-2024-46699", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46699" }, { "cve": "CVE-2024-46700", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46700" }, { "cve": "CVE-2024-46701", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46701" }, { "cve": "CVE-2024-46702", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46702" }, { "cve": "CVE-2024-46703", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46703" }, { "cve": "CVE-2024-46704", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46704" }, { "cve": "CVE-2024-46705", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46705" }, { "cve": "CVE-2024-46706", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46706" }, { "cve": "CVE-2024-46707", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46707" }, { "cve": "CVE-2024-46708", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46708" }, { "cve": "CVE-2024-46709", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46709" }, { "cve": "CVE-2024-46710", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46710" }, { "cve": "CVE-2024-46711", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46711" }, { "cve": "CVE-2024-46712", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46712" } ] }
fkie_cve-2024-46698
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | 6.11 | |
linux | linux_kernel | 6.11 | |
linux | linux_kernel | 6.11 | |
linux | linux_kernel | 6.11 | |
linux | linux_kernel | 6.11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "44B0C10F-3694-48FB-9556-944BD815090B", "versionEndExcluding": "6.10.8", "versionStartIncluding": "6.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo/aperture: optionally match the device in sysfb_disable()\n\nIn aperture_remove_conflicting_pci_devices(), we currently only\ncall sysfb_disable() on vga class devices. This leads to the\nfollowing problem when the pimary device is not VGA compatible:\n\n1. A PCI device with a non-VGA class is the boot display\n2. That device is probed first and it is not a VGA device so\n sysfb_disable() is not called, but the device resources\n are freed by aperture_detach_platform_device()\n3. Non-primary GPU has a VGA class and it ends up calling sysfb_disable()\n4. NULL pointer dereference via sysfb_disable() since the resources\n have already been freed by aperture_detach_platform_device() when\n it was called by the other device.\n\nFix this by passing a device pointer to sysfb_disable() and checking\nthe device to determine if we should execute it or not.\n\nv2: Fix build when CONFIG_SCREEN_INFO is not set\nv3: Move device check into the mutex\n Drop primary variable in aperture_remove_conflicting_pci_devices()\n Drop __init on pci sysfb_pci_dev_is_enabled()" }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: video/aperture: opcionalmente hacer coincidir el dispositivo en sysfb_disable() En aperture_remove_conflicting_pci_devices(), actualmente solo llamamos a sysfb_disable() en dispositivos de clase vga. Esto lleva al siguiente problema cuando el dispositivo principal no es compatible con VGA: 1. Un dispositivo PCI con una clase que no es VGA es la pantalla de arranque 2. Ese dispositivo se sondea primero y no es un dispositivo VGA, por lo que no se llama a sysfb_disable(), pero los recursos del dispositivo se liberan mediante aperture_detach_platform_device() 3. La GPU no principal tiene una clase VGA y termina llamando a sysfb_disable() 4. Desreferencia de puntero NULL a trav\u00e9s de sysfb_disable() ya que los recursos ya se han liberado mediante aperture_detach_platform_device() cuando fue llamado por el otro dispositivo. Solucione esto pasando un puntero de dispositivo a sysfb_disable() y verificando el dispositivo para determinar si debemos ejecutarlo o no. v2: Arreglar la compilaci\u00f3n cuando CONFIG_SCREEN_INFO no est\u00e1 configurado v3: Mover la verificaci\u00f3n del dispositivo al mutex Eliminar la variable principal en aperture_remove_conflicting_pci_devices() Eliminar __init en pci sysfb_pci_dev_is_enabled()" } ], "id": "CVE-2024-46698", "lastModified": "2024-09-13T16:53:03.000", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-13T06:15:14.563", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/17e78f43de0c6da34204cc858b4cc05671ea9acf" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/b49420d6a1aeb399e5b107fc6eb8584d0860fbd7" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-7f48-pc7q-83qh
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
video/aperture: optionally match the device in sysfb_disable()
In aperture_remove_conflicting_pci_devices(), we currently only call sysfb_disable() on vga class devices. This leads to the following problem when the pimary device is not VGA compatible:
- A PCI device with a non-VGA class is the boot display
- That device is probed first and it is not a VGA device so sysfb_disable() is not called, but the device resources are freed by aperture_detach_platform_device()
- Non-primary GPU has a VGA class and it ends up calling sysfb_disable()
- NULL pointer dereference via sysfb_disable() since the resources have already been freed by aperture_detach_platform_device() when it was called by the other device.
Fix this by passing a device pointer to sysfb_disable() and checking the device to determine if we should execute it or not.
v2: Fix build when CONFIG_SCREEN_INFO is not set v3: Move device check into the mutex Drop primary variable in aperture_remove_conflicting_pci_devices() Drop __init on pci sysfb_pci_dev_is_enabled()
{ "affected": [], "aliases": [ "CVE-2024-46698" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-09-13T06:15:14Z", "severity": "MODERATE" }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo/aperture: optionally match the device in sysfb_disable()\n\nIn aperture_remove_conflicting_pci_devices(), we currently only\ncall sysfb_disable() on vga class devices. This leads to the\nfollowing problem when the pimary device is not VGA compatible:\n\n1. A PCI device with a non-VGA class is the boot display\n2. That device is probed first and it is not a VGA device so\n sysfb_disable() is not called, but the device resources\n are freed by aperture_detach_platform_device()\n3. Non-primary GPU has a VGA class and it ends up calling sysfb_disable()\n4. NULL pointer dereference via sysfb_disable() since the resources\n have already been freed by aperture_detach_platform_device() when\n it was called by the other device.\n\nFix this by passing a device pointer to sysfb_disable() and checking\nthe device to determine if we should execute it or not.\n\nv2: Fix build when CONFIG_SCREEN_INFO is not set\nv3: Move device check into the mutex\n Drop primary variable in aperture_remove_conflicting_pci_devices()\n Drop __init on pci sysfb_pci_dev_is_enabled()", "id": "GHSA-7f48-pc7q-83qh", "modified": "2024-09-13T18:31:46Z", "published": "2024-09-13T06:30:43Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-46698" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/17e78f43de0c6da34204cc858b4cc05671ea9acf" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/b49420d6a1aeb399e5b107fc6eb8584d0860fbd7" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
CERTFR-2025-AVI-0022
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Ubuntu 16.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 24.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 18.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 20.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 24.10", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 14.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 22.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "name": "CVE-2020-24490", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24490" }, { "name": "CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "name": "CVE-2022-38096", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38096" }, { "name": "CVE-2022-36402", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36402" }, { "name": "CVE-2023-6610", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6610" }, { "name": "CVE-2023-35827", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35827" }, { "name": "CVE-2024-25744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25744" }, { "name": "CVE-2024-26625", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26625" }, { "name": "CVE-2023-52594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52594" }, { "name": "CVE-2021-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47076" }, { "name": "CVE-2023-52532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52532" }, { "name": "CVE-2024-26607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26607" }, { "name": "CVE-2023-52434", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52434" }, { "name": "CVE-2021-47101", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47101" }, { "name": "CVE-2023-52486", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52486" }, { "name": "CVE-2023-52509", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52509" }, { "name": "CVE-2023-52639", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52639" }, { "name": "CVE-2023-52497", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52497" }, { "name": "CVE-2023-52507", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52507" }, { "name": "CVE-2021-47082", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47082" }, { "name": "CVE-2023-52621", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52621" }, { "name": "CVE-2024-26800", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26800" }, { "name": "CVE-2024-26777", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26777" }, { "name": "CVE-2021-47118", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47118" }, { "name": "CVE-2023-52488", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52488" }, { "name": "CVE-2023-52572", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52572" }, { "name": "CVE-2021-47001", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47001" }, { "name": "CVE-2023-52498", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52498" }, { "name": "CVE-2024-26669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26669" }, { "name": "CVE-2024-27072", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27072" }, { "name": "CVE-2024-26893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26893" }, { "name": "CVE-2024-36941", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36941" }, { "name": "CVE-2024-36946", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36946" }, { "name": "CVE-2024-36953", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36953" }, { "name": "CVE-2021-47501", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47501" }, { "name": "CVE-2023-52757", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757" }, { "name": "CVE-2023-52821", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52821" }, { "name": "CVE-2024-26822", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26822" }, { "name": "CVE-2024-26921", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26921" }, { "name": "CVE-2024-35847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35847" }, { "name": "CVE-2024-35904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35904" }, { "name": "CVE-2024-35951", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35951" }, { "name": "CVE-2024-35963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35963" }, { "name": "CVE-2024-35965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35965" }, { "name": "CVE-2024-35966", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35966" }, { "name": "CVE-2024-35967", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35967" }, { "name": "CVE-2024-36893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36893" }, { "name": "CVE-2024-36938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36938" }, { "name": "CVE-2024-36952", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36952" }, { "name": "CVE-2024-35886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35886" }, { "name": "CVE-2024-36004", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36004" }, { "name": "CVE-2024-38633", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38633" }, { "name": "CVE-2024-26947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26947" }, { "name": "CVE-2022-48733", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48733" }, { "name": "CVE-2024-38544", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38544" }, { "name": "CVE-2024-38545", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38545" }, { "name": "CVE-2024-38553", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38553" }, { "name": "CVE-2024-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38597" }, { "name": "CVE-2024-38619", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38619" }, { "name": "CVE-2024-39301", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39301" }, { "name": "CVE-2024-26661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26661" }, { "name": "CVE-2024-36270", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36270" }, { "name": "CVE-2024-40910", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40910" }, { "name": "CVE-2024-40912", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40912" }, { "name": "CVE-2024-40915", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40915" }, { "name": "CVE-2024-40959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40959" }, { "name": "CVE-2024-38602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38602" }, { "name": "CVE-2024-38611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38611" }, { "name": "CVE-2024-39463", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39463" }, { "name": "CVE-2024-36968", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36968" }, { "name": "CVE-2024-38538", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38538" }, { "name": "CVE-2024-38577", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38577" }, { "name": "CVE-2024-41011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41011" }, { "name": "CVE-2024-39472", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39472" }, { "name": "CVE-2023-52751", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52751" }, { "name": "CVE-2024-41017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41017" }, { "name": "CVE-2024-41090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41090" }, { "name": "CVE-2024-41091", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41091" }, { "name": "CVE-2021-47086", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47086" }, { "name": "CVE-2024-41012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41012" }, { "name": "CVE-2024-41015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41015" }, { "name": "CVE-2024-41016", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41016" }, { "name": "CVE-2024-41059", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41059" }, { "name": "CVE-2024-41060", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41060" }, { "name": "CVE-2024-41063", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41063" }, { "name": "CVE-2024-41064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41064" }, { "name": "CVE-2024-41070", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41070" }, { "name": "CVE-2024-41071", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41071" }, { "name": "CVE-2024-41072", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41072" }, { "name": "CVE-2024-41078", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41078" }, { "name": "CVE-2024-41081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41081" }, { "name": "CVE-2024-42079", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42079" }, { "name": "CVE-2022-48666", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48666" }, { "name": "CVE-2024-36484", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36484" }, { "name": "CVE-2024-41020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41020" }, { "name": "CVE-2024-41022", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41022" }, { "name": "CVE-2024-41065", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41065" }, { "name": "CVE-2024-41068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41068" }, { "name": "CVE-2024-41077", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41077" }, { "name": "CVE-2024-42101", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42101" }, { "name": "CVE-2024-42153", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42153" }, { "name": "CVE-2024-41073", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41073" }, { "name": "CVE-2024-38632", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38632" }, { "name": "CVE-2024-38667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38667" }, { "name": "CVE-2024-40973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40973" }, { "name": "CVE-2024-42068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42068" }, { "name": "CVE-2024-42077", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42077" }, { "name": "CVE-2024-42090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42090" }, { "name": "CVE-2024-42240", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42240" }, { "name": "CVE-2024-42270", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42270" }, { "name": "CVE-2022-48938", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48938" }, { "name": "CVE-2022-48943", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48943" }, { "name": "CVE-2023-52889", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52889" }, { "name": "CVE-2023-52904", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52904" }, { "name": "CVE-2024-41042", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41042" }, { "name": "CVE-2024-41098", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41098" }, { "name": "CVE-2024-42114", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42114" }, { "name": "CVE-2024-42126", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42126" }, { "name": "CVE-2024-42156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42156" }, { "name": "CVE-2024-42158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42158" }, { "name": "CVE-2024-42246", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42246" }, { "name": "CVE-2024-42259", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42259" }, { "name": "CVE-2024-42268", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42268" }, { "name": "CVE-2024-42269", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42269" }, { "name": "CVE-2024-42271", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42271" }, { "name": "CVE-2024-42274", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42274" }, { "name": "CVE-2024-42276", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42276" }, { "name": "CVE-2024-42277", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42277" }, { "name": "CVE-2024-42278", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42278" }, { "name": "CVE-2024-42279", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42279" }, { "name": "CVE-2024-42280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42280" }, { "name": "CVE-2024-42281", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42281" }, { "name": "CVE-2024-42283", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42283" }, { "name": "CVE-2024-42284", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42284" }, { "name": "CVE-2024-42285", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42285" }, { "name": "CVE-2024-42286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42286" }, { "name": "CVE-2024-42287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42287" }, { "name": "CVE-2024-42288", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42288" }, { "name": "CVE-2024-42289", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42289" }, { "name": "CVE-2024-42290", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42290" }, { "name": "CVE-2024-42291", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42291" }, { "name": "CVE-2024-42292", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42292" }, { "name": "CVE-2024-42295", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42295" }, { "name": "CVE-2024-42298", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42298" }, { "name": "CVE-2024-42301", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42301" }, { "name": "CVE-2024-42302", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42302" }, { "name": "CVE-2024-42303", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42303" }, { "name": "CVE-2024-42309", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42309" }, { "name": "CVE-2024-42310", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42310" }, { "name": "CVE-2024-42311", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42311" }, { "name": "CVE-2024-42312", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42312" }, { "name": "CVE-2024-42313", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42313" }, { "name": "CVE-2024-42314", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42314" }, { "name": "CVE-2024-42315", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42315" }, { "name": "CVE-2024-42316", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42316" }, { "name": "CVE-2024-42318", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42318" }, { "name": "CVE-2024-42319", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42319" }, { "name": "CVE-2024-42320", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42320" }, { "name": "CVE-2024-42322", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322" }, { "name": "CVE-2024-43817", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43817" }, { "name": "CVE-2024-43818", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43818" }, { "name": "CVE-2024-43819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43819" }, { "name": "CVE-2024-43821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43821" }, { "name": "CVE-2024-43823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43823" }, { "name": "CVE-2024-43824", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43824" }, { "name": "CVE-2024-43825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43825" }, { "name": "CVE-2024-43826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43826" }, { "name": "CVE-2024-43829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43829" }, { "name": "CVE-2024-43830", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43830" }, { "name": "CVE-2024-43831", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43831" }, { "name": "CVE-2024-43833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43833" }, { "name": "CVE-2024-43834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43834" }, { "name": "CVE-2024-43837", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43837" }, { "name": "CVE-2024-43839", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43839" }, { "name": "CVE-2024-43840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43840" }, { "name": "CVE-2024-43841", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43841" }, { "name": "CVE-2024-43842", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43842" }, { "name": "CVE-2024-43846", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43846" }, { "name": "CVE-2024-43847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43847" }, { "name": "CVE-2024-43849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43849" }, { "name": "CVE-2024-43850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43850" }, { "name": "CVE-2024-43853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43853" }, { "name": "CVE-2024-43854", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43854" }, { "name": "CVE-2024-43856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43856" }, { "name": "CVE-2024-43858", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43858" }, { "name": "CVE-2024-43860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43860" }, { "name": "CVE-2024-43861", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43861" }, { "name": "CVE-2024-43863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43863" }, { "name": "CVE-2024-43864", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43864" }, { "name": "CVE-2024-43866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43866" }, { "name": "CVE-2024-43867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43867" }, { "name": "CVE-2024-43871", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43871" }, { "name": "CVE-2024-43873", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43873" }, { "name": "CVE-2024-43875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43875" }, { "name": "CVE-2024-43876", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43876" }, { "name": "CVE-2024-43877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43877" }, { "name": "CVE-2024-43879", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43879" }, { "name": "CVE-2024-43880", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43880" }, { "name": "CVE-2024-43881", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43881" }, { "name": "CVE-2024-43882", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43882" }, { "name": "CVE-2024-43883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43883" }, { "name": "CVE-2024-43884", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43884" }, { "name": "CVE-2024-43889", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43889" }, { "name": "CVE-2024-43892", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43892" }, { "name": "CVE-2024-43893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43893" }, { "name": "CVE-2024-43894", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43894" }, { "name": "CVE-2024-43895", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43895" }, { "name": "CVE-2024-43899", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43899" }, { "name": "CVE-2024-43900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43900" }, { "name": "CVE-2024-43902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43902" }, { "name": "CVE-2024-43904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43904" }, { "name": "CVE-2024-43905", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43905" }, { "name": "CVE-2024-43906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43906" }, { "name": "CVE-2024-43907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43907" }, { "name": "CVE-2024-43908", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43908" }, { "name": "CVE-2024-43909", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43909" }, { "name": "CVE-2024-43911", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43911" }, { "name": "CVE-2024-43912", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43912" }, { "name": "CVE-2024-44931", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44931" }, { "name": "CVE-2024-44938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44938" }, { "name": "CVE-2024-44939", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44939" }, { "name": "CVE-2024-44947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44947" }, { "name": "CVE-2024-45003", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45003" }, { "name": "CVE-2024-43835", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43835" }, { "name": "CVE-2024-43859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43859" }, { "name": "CVE-2024-44940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44940" }, { "name": "CVE-2024-44946", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44946" }, { "name": "CVE-2024-44974", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44974" }, { "name": "CVE-2024-44977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44977" }, { "name": "CVE-2024-44982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44982" }, { "name": "CVE-2024-44983", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44983" }, { "name": "CVE-2024-44985", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44985" }, { "name": "CVE-2024-44986", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44986" }, { "name": "CVE-2024-44987", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44987" }, { "name": "CVE-2024-44988", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44988" }, { "name": "CVE-2024-44989", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44989" }, { "name": "CVE-2024-44990", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44990" }, { "name": "CVE-2024-44991", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44991" }, { "name": "CVE-2024-44995", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44995" }, { "name": "CVE-2024-44998", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44998" }, { "name": "CVE-2024-44999", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44999" }, { "name": "CVE-2024-45000", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45000" }, { "name": "CVE-2024-45002", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45002" }, { "name": "CVE-2024-45006", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45006" }, { "name": "CVE-2024-45007", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45007" }, { "name": "CVE-2024-45008", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45008" }, { "name": "CVE-2024-45009", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45009" }, { "name": "CVE-2024-45010", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45010" }, { "name": "CVE-2024-45011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45011" }, { "name": "CVE-2024-45018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45018" }, { "name": "CVE-2024-45019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45019" }, { "name": "CVE-2024-45021", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45021" }, { "name": "CVE-2024-45022", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45022" }, { "name": "CVE-2024-45025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45025" }, { "name": "CVE-2024-45026", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45026" }, { "name": "CVE-2024-45028", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45028" }, { "name": "CVE-2024-45029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45029" }, { "name": "CVE-2024-46673", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46673" }, { "name": "CVE-2024-46675", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46675" }, { "name": "CVE-2024-46676", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46676" }, { "name": "CVE-2024-46677", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46677" }, { "name": "CVE-2024-46679", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46679" }, { "name": "CVE-2024-46685", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46685" }, { "name": "CVE-2024-46686", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46686" }, { "name": "CVE-2024-46689", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46689" }, { "name": "CVE-2024-46694", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46694" }, { "name": "CVE-2024-46702", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46702" }, { "name": "CVE-2024-46707", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46707" }, { "name": "CVE-2024-46711", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46711" }, { "name": "CVE-2024-46713", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46713" }, { "name": "CVE-2024-46714", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46714" }, { "name": "CVE-2024-46715", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46715" }, { "name": "CVE-2024-46716", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46716" }, { "name": "CVE-2024-46717", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46717" }, { "name": "CVE-2024-46719", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46719" }, { "name": "CVE-2024-46720", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46720" }, { "name": "CVE-2024-46721", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46721" }, { "name": "CVE-2024-46722", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46722" }, { "name": "CVE-2024-46723", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46723" }, { "name": "CVE-2024-46724", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46724" }, { "name": "CVE-2024-46725", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46725" }, { "name": "CVE-2024-46726", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46726" }, { "name": "CVE-2024-46731", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46731" }, { "name": "CVE-2024-46732", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46732" }, { "name": "CVE-2024-46735", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46735" }, { "name": "CVE-2024-46737", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46737" }, { "name": "CVE-2024-46738", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46738" }, { "name": "CVE-2024-46739", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46739" }, { "name": "CVE-2024-46740", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46740" }, { "name": "CVE-2024-46743", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46743" }, { "name": "CVE-2024-46744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46744" }, { "name": "CVE-2024-46745", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46745" }, { "name": "CVE-2024-46746", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46746" }, { "name": "CVE-2024-46747", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46747" }, { "name": "CVE-2024-46750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46750" }, { "name": "CVE-2024-46752", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46752" }, { "name": "CVE-2024-46755", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46755" }, { "name": "CVE-2024-46756", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46756" }, { "name": "CVE-2024-46757", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46757" }, { "name": "CVE-2024-46758", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46758" }, { "name": "CVE-2024-46759", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46759" }, { "name": "CVE-2024-46761", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46761" }, { "name": "CVE-2024-46763", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763" }, { "name": "CVE-2024-46770", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46770" }, { "name": "CVE-2024-46771", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46771" }, { "name": "CVE-2024-46773", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46773" }, { "name": "CVE-2024-46777", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46777" }, { "name": "CVE-2024-46780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46780" }, { "name": "CVE-2024-46781", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46781" }, { "name": "CVE-2024-46782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46782" }, { "name": "CVE-2024-46783", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46783" }, { "name": "CVE-2024-46784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46784" }, { "name": "CVE-2024-46791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46791" }, { "name": "CVE-2024-46794", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46794" }, { "name": "CVE-2024-46795", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46795" }, { "name": "CVE-2024-46798", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46798" }, { "name": "CVE-2024-46800", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46800" }, { "name": "CVE-2024-46802", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46802" }, { "name": "CVE-2024-46804", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46804" }, { "name": "CVE-2024-46805", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46805" }, { "name": "CVE-2024-46807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46807" }, { "name": "CVE-2024-46810", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46810" }, { "name": "CVE-2024-46812", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812" }, { "name": "CVE-2024-46814", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46814" }, { "name": "CVE-2024-46815", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46815" }, { "name": "CVE-2024-46817", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46817" }, { "name": "CVE-2024-46818", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46818" }, { "name": "CVE-2024-46819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46819" }, { "name": "CVE-2024-46821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821" }, { "name": "CVE-2024-46822", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46822" }, { "name": "CVE-2024-46826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46826" }, { "name": "CVE-2024-46828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46828" }, { "name": "CVE-2024-46829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46829" }, { "name": "CVE-2024-46830", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46830" }, { "name": "CVE-2024-46832", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46832" }, { "name": "CVE-2024-46835", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46835" }, { "name": "CVE-2024-46836", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46836" }, { "name": "CVE-2024-46840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46840" }, { "name": "CVE-2024-46844", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46844" }, { "name": "CVE-2024-46846", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46846" }, { "name": "CVE-2024-46848", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46848" }, { "name": "CVE-2024-46849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46849" }, { "name": "CVE-2024-46852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46852" }, { "name": "CVE-2024-46853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46853" }, { "name": "CVE-2024-46854", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46854" }, { "name": "CVE-2024-46855", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46855" }, { "name": "CVE-2024-46857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46857" }, { "name": "CVE-2024-46858", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46858" }, { "name": "CVE-2024-46859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46859" }, { "name": "CVE-2024-46865", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46865" }, { "name": "CVE-2024-42272", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42272" }, { "name": "CVE-2024-42297", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42297" }, { "name": "CVE-2024-42265", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42265" }, { "name": "CVE-2024-42294", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42294" }, { "name": "CVE-2024-42304", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42304" }, { "name": "CVE-2024-42305", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42305" }, { "name": "CVE-2024-42306", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42306" }, { "name": "CVE-2024-43828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43828" }, { "name": "CVE-2024-43832", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43832" }, { "name": "CVE-2024-43845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43845" }, { "name": "CVE-2024-43870", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43870" }, { "name": "CVE-2024-43886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43886" }, { "name": "CVE-2024-43890", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43890" }, { "name": "CVE-2024-43914", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43914" }, { "name": "CVE-2024-44935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44935" }, { "name": "CVE-2024-44944", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44944" }, { "name": "CVE-2024-44948", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44948" }, { "name": "CVE-2024-44950", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44950" }, { "name": "CVE-2024-44954", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44954" }, { "name": "CVE-2024-44960", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44960" }, { "name": "CVE-2024-44961", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44961" }, { "name": "CVE-2024-44962", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44962" }, { "name": "CVE-2024-44965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44965" }, { "name": "CVE-2024-44967", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44967" }, { "name": "CVE-2024-44969", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44969" }, { "name": "CVE-2024-44970", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44970" }, { "name": "CVE-2024-44971", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44971" }, { "name": "CVE-2024-44972", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44972" }, { "name": "CVE-2024-44984", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44984" }, { "name": "CVE-2024-45001", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45001" }, { "name": "CVE-2024-45005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45005" }, { "name": "CVE-2024-45012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45012" }, { "name": "CVE-2024-45013", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45013" }, { "name": "CVE-2024-45015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45015" }, { "name": "CVE-2024-45017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45017" }, { "name": "CVE-2024-45020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45020" }, { "name": "CVE-2024-45030", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45030" }, { "name": "CVE-2024-46672", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46672" }, { "name": "CVE-2024-46678", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46678" }, { "name": "CVE-2024-46687", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46687" }, { "name": "CVE-2024-46691", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46691" }, { "name": "CVE-2024-46692", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46692" }, { "name": "CVE-2024-46693", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46693" }, { "name": "CVE-2024-46695", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46695" }, { "name": "CVE-2024-46706", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46706" }, { "name": "CVE-2024-46709", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46709" }, { "name": "CVE-2024-46710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46710" }, { "name": "CVE-2024-46727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46727" }, { "name": "CVE-2024-46728", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46728" }, { "name": "CVE-2024-46729", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46729" }, { "name": "CVE-2024-46730", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46730" }, { "name": "CVE-2024-46741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46741" }, { "name": "CVE-2024-46749", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46749" }, { "name": "CVE-2024-46751", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751" }, { "name": "CVE-2024-46753", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753" }, { "name": "CVE-2024-46760", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46760" }, { "name": "CVE-2024-46767", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46767" }, { "name": "CVE-2024-46772", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46772" }, { "name": "CVE-2024-46774", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774" }, { "name": "CVE-2024-46775", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46775" }, { "name": "CVE-2024-46776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46776" }, { "name": "CVE-2024-46778", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46778" }, { "name": "CVE-2024-46786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46786" }, { "name": "CVE-2024-46787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787" }, { "name": "CVE-2024-46797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46797" }, { "name": "CVE-2024-47668", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47668" }, { "name": "CVE-2023-52918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52918" }, { "name": "CVE-2024-41019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41019" }, { "name": "CVE-2024-47659", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47659" }, { "name": "CVE-2024-47663", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47663" }, { "name": "CVE-2024-47667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47667" }, { "name": "CVE-2024-47669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47669" }, { "name": "CVE-2024-42258", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42258" }, { "name": "CVE-2024-43857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43857" }, { "name": "CVE-2023-52917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52917" }, { "name": "CVE-2024-46754", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46754" }, { "name": "CVE-2024-46766", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46766" }, { "name": "CVE-2024-46803", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46803" }, { "name": "CVE-2024-46806", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46806" }, { "name": "CVE-2024-46809", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46809" }, { "name": "CVE-2024-46811", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46811" }, { "name": "CVE-2024-46813", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46813" }, { "name": "CVE-2024-46816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816" }, { "name": "CVE-2024-46825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46825" }, { "name": "CVE-2024-46827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46827" }, { "name": "CVE-2024-46831", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46831" }, { "name": "CVE-2024-46834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46834" }, { "name": "CVE-2024-46841", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46841" }, { "name": "CVE-2024-46842", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46842" }, { "name": "CVE-2024-46843", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46843" }, { "name": "CVE-2024-46851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46851" }, { "name": "CVE-2024-46860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46860" }, { "name": "CVE-2024-46861", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46861" }, { "name": "CVE-2024-46864", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46864" }, { "name": "CVE-2024-46870", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46870" }, { "name": "CVE-2024-46871", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46871" }, { "name": "CVE-2024-47658", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47658" }, { "name": "CVE-2024-47661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47661" }, { "name": "CVE-2024-42267", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42267" }, { "name": "CVE-2024-42296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42296" }, { "name": "CVE-2024-42299", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42299" }, { "name": "CVE-2024-43869", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43869" }, { "name": "CVE-2024-44934", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44934" }, { "name": "CVE-2024-44958", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44958" }, { "name": "CVE-2024-44966", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44966" }, { "name": "CVE-2024-47660", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47660" }, { "name": "CVE-2024-47665", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47665" }, { "name": "CVE-2024-47662", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47662" }, { "name": "CVE-2024-47664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47664" }, { "name": "CVE-2024-47670", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47670" }, { "name": "CVE-2024-47671", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47671" }, { "name": "CVE-2024-47672", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47672" }, { "name": "CVE-2024-47673", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47673" }, { "name": "CVE-2024-47674", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47674" }, { "name": "CVE-2024-47684", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47684" }, { "name": "CVE-2024-47685", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47685" }, { "name": "CVE-2024-47692", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47692" }, { "name": "CVE-2024-47693", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47693" }, { "name": "CVE-2024-47695", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47695" }, { "name": "CVE-2024-47696", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47696" }, { "name": "CVE-2024-47697", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47697" }, { "name": "CVE-2024-47698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47698" }, { "name": "CVE-2024-47699", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47699" }, { "name": "CVE-2024-47705", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47705" }, { "name": "CVE-2024-47706", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47706" }, { "name": "CVE-2024-47709", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47709" }, { "name": "CVE-2024-47710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47710" }, { "name": "CVE-2024-47712", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47712" }, { "name": "CVE-2024-47713", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47713" }, { "name": "CVE-2024-47715", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47715" }, { "name": "CVE-2024-47718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47718" }, { "name": "CVE-2024-47720", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47720" }, { "name": "CVE-2024-47723", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47723" }, { "name": "CVE-2024-47735", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47735" }, { "name": "CVE-2024-47737", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47737" }, { "name": "CVE-2024-47739", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47739" }, { "name": "CVE-2024-47742", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47742" }, { "name": "CVE-2024-47747", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47747" }, { "name": "CVE-2024-47748", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47748" }, { "name": "CVE-2024-47749", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47749" }, { "name": "CVE-2024-47756", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47756" }, { "name": "CVE-2024-47757", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47757" }, { "name": "CVE-2024-49851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49851" }, { "name": "CVE-2024-49852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49852" }, { "name": "CVE-2024-49858", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49858" }, { "name": "CVE-2024-49860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49860" }, { "name": "CVE-2024-49863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49863" }, { "name": "CVE-2024-49866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49866" }, { "name": "CVE-2024-49867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49867" }, { "name": "CVE-2024-49871", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49871" }, { "name": "CVE-2024-49875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49875" }, { "name": "CVE-2024-49877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49877" }, { "name": "CVE-2024-49878", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49878" }, { "name": "CVE-2024-49879", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49879" }, { "name": "CVE-2024-49881", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49881" }, { "name": "CVE-2024-49882", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49882" }, { "name": "CVE-2024-49883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49883" }, { "name": "CVE-2024-49886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49886" }, { "name": "CVE-2024-49890", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49890" }, { "name": "CVE-2024-49892", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49892" }, { "name": "CVE-2024-49894", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49894" }, { "name": "CVE-2024-49895", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49895" }, { "name": "CVE-2024-49896", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49896" }, { "name": "CVE-2024-49900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49900" }, { "name": "CVE-2024-49902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49902" }, { "name": "CVE-2024-49903", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49903" }, { "name": "CVE-2024-49907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49907" }, { "name": "CVE-2024-49913", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49913" }, { "name": "CVE-2024-49930", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49930" }, { "name": "CVE-2024-49933", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49933" }, { "name": "CVE-2024-49935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49935" }, { "name": "CVE-2024-49936", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49936" }, { "name": "CVE-2024-49938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49938" }, { "name": "CVE-2024-49946", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49946" }, { "name": "CVE-2024-49949", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49949" }, { "name": "CVE-2024-49954", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49954" }, { "name": "CVE-2024-49955", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49955" }, { "name": "CVE-2024-49957", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49957" }, { "name": "CVE-2024-49958", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49958" }, { "name": "CVE-2024-49959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49959" }, { "name": "CVE-2024-49962", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49962" }, { "name": "CVE-2024-49963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49963" }, { "name": "CVE-2024-49965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49965" }, { "name": "CVE-2024-49966", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49966" }, { "name": "CVE-2024-49967", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49967" }, { "name": "CVE-2024-49969", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49969" }, { "name": "CVE-2024-49973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49973" }, { "name": "CVE-2024-49975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49975" }, { "name": "CVE-2024-49981", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49981" }, { "name": "CVE-2024-49982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49982" }, { "name": "CVE-2024-49985", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49985" }, { "name": "CVE-2024-49995", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49995" }, { "name": "CVE-2024-50000", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50000" }, { "name": "CVE-2024-50001", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50001" }, { "name": "CVE-2024-50002", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50002" }, { "name": "CVE-2024-50006", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50006" }, { "name": "CVE-2024-50007", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50007" }, { "name": "CVE-2024-50008", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50008" }, { "name": "CVE-2024-50013", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50013" }, { "name": "CVE-2024-50015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50015" }, { "name": "CVE-2024-50019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50019" }, { "name": "CVE-2024-50024", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50024" }, { "name": "CVE-2024-50031", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50031" }, { "name": "CVE-2024-50033", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50033" }, { "name": "CVE-2024-50035", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50035" }, { "name": "CVE-2024-50040", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50040" }, { "name": "CVE-2024-50041", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50041" }, { "name": "CVE-2024-50044", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50044" }, { "name": "CVE-2024-50045", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50045" }, { "name": "CVE-2024-50046", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50046" }, { "name": "CVE-2024-50049", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50049" }, { "name": "CVE-2024-50059", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50059" }, { "name": "CVE-2024-50062", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50062" }, { "name": "CVE-2024-46824", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46824" }, { "name": "CVE-2024-44942", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44942" }, { "name": "CVE-2024-43868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43868" }, { "name": "CVE-2024-50264", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50264" }, { "name": "CVE-2024-53057", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53057" }, { "name": "CVE-2024-42260", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42260" }, { "name": "CVE-2024-42261", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42261" }, { "name": "CVE-2024-42262", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42262" }, { "name": "CVE-2024-42263", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42263" }, { "name": "CVE-2024-42264", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42264" }, { "name": "CVE-2024-42273", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42273" }, { "name": "CVE-2024-42307", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42307" }, { "name": "CVE-2024-42317", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42317" }, { "name": "CVE-2024-42321", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42321" }, { "name": "CVE-2024-43820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43820" }, { "name": "CVE-2024-43827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43827" }, { "name": "CVE-2024-43843", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43843" }, { "name": "CVE-2024-43852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43852" }, { "name": "CVE-2024-43887", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43887" }, { "name": "CVE-2024-43888", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43888" }, { "name": "CVE-2024-43891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43891" }, { "name": "CVE-2024-43910", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43910" }, { "name": "CVE-2024-43913", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43913" }, { "name": "CVE-2024-44937", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44937" }, { "name": "CVE-2024-44941", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44941" }, { "name": "CVE-2024-44943", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44943" }, { "name": "CVE-2024-44953", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44953" }, { "name": "CVE-2024-44956", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44956" }, { "name": "CVE-2024-44957", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44957" }, { "name": "CVE-2024-44959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44959" }, { "name": "CVE-2024-44963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44963" }, { "name": "CVE-2024-44973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44973" }, { "name": "CVE-2024-44975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44975" }, { "name": "CVE-2024-44978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44978" }, { "name": "CVE-2024-44979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44979" }, { "name": "CVE-2024-44980", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44980" }, { "name": "CVE-2024-44993", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44993" }, { "name": "CVE-2024-44996", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44996" }, { "name": "CVE-2024-45027", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45027" }, { "name": "CVE-2024-46680", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46680" }, { "name": "CVE-2024-46681", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46681" }, { "name": "CVE-2024-46683", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46683" }, { "name": "CVE-2024-46697", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46697" }, { "name": "CVE-2024-46698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46698" }, { "name": "CVE-2024-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46701" }, { "name": "CVE-2024-46703", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46703" }, { "name": "CVE-2024-46705", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46705" }, { "name": "CVE-2024-46708", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46708" }, { "name": "CVE-2024-46718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46718" }, { "name": "CVE-2024-46733", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46733" }, { "name": "CVE-2024-46762", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46762" }, { "name": "CVE-2024-46765", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46765" }, { "name": "CVE-2024-46768", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46768" }, { "name": "CVE-2024-46779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46779" }, { "name": "CVE-2024-46785", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46785" }, { "name": "CVE-2024-46788", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46788" }, { "name": "CVE-2024-46792", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46792" }, { "name": "CVE-2024-46793", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46793" }, { "name": "CVE-2024-46808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46808" }, { "name": "CVE-2024-46823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46823" }, { "name": "CVE-2024-46838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46838" }, { "name": "CVE-2024-46845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46845" }, { "name": "CVE-2024-46847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46847" }, { "name": "CVE-2024-46850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46850" }, { "name": "CVE-2024-46866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46866" }, { "name": "CVE-2024-46867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46867" }, { "name": "CVE-2024-46868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46868" }, { "name": "CVE-2024-47666", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47666" }, { "name": "CVE-2024-47683", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47683" }, { "name": "CVE-2024-49984", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49984" }, { "name": "CVE-2024-47679", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47679" }, { "name": "CVE-2024-47690", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47690" }, { "name": "CVE-2024-47701", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47701" }, { "name": "CVE-2024-47734", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47734" }, { "name": "CVE-2024-47740", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47740" }, { "name": "CVE-2024-49856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49856" }, { "name": "CVE-2024-49868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49868" }, { "name": "CVE-2024-49884", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49884" }, { "name": "CVE-2024-49889", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49889" }, { "name": "CVE-2024-49924", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49924" }, { "name": "CVE-2024-49927", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49927" }, { "name": "CVE-2024-49944", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49944" }, { "name": "CVE-2024-49948", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49948" }, { "name": "CVE-2024-49952", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49952" }, { "name": "CVE-2024-49977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49977" }, { "name": "CVE-2024-49983", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49983" }, { "name": "CVE-2024-49997", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49997" }, { "name": "CVE-2024-50003", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50003" }, { "name": "CVE-2024-50038", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50038" }, { "name": "CVE-2024-50039", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50039" }, { "name": "CVE-2024-50093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50093" }, { "name": "CVE-2024-50095", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50095" }, { "name": "CVE-2024-50096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50096" }, { "name": "CVE-2024-50179", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50179" }, { "name": "CVE-2024-50180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50180" }, { "name": "CVE-2024-50181", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50181" }, { "name": "CVE-2024-50184", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50184" }, { "name": "CVE-2024-50186", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50186" }, { "name": "CVE-2024-50188", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50188" }, { "name": "CVE-2024-50189", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50189" }, { "name": "CVE-2024-50191", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50191" }, { "name": "CVE-2024-50011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50011" } ], "initial_release_date": "2025-01-10T00:00:00", "last_revision_date": "2025-01-10T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0022", "revisions": [ { "description": "Version initiale", "revision_date": "2025-01-10T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu", "vendor_advisories": [ { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7186-1", "url": "https://ubuntu.com/security/notices/USN-7186-1" }, { "published_at": "2025-01-07", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7179-3", "url": "https://ubuntu.com/security/notices/USN-7179-3" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7154-2", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7184-1", "url": "https://ubuntu.com/security/notices/USN-7184-1" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7185-2", "url": "https://ubuntu.com/security/notices/USN-7185-2" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7183-1", "url": "https://ubuntu.com/security/notices/USN-7183-1" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7187-1", "url": "https://ubuntu.com/security/notices/USN-7187-1" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7194-1", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7185-1", "url": "https://ubuntu.com/security/notices/USN-7185-1" }, { "published_at": "2025-01-07", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7167-2", "url": "https://ubuntu.com/security/notices/USN-7167-2" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7159-5", "url": "https://ubuntu.com/security/notices/USN-7159-5" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7195-1", "url": "https://ubuntu.com/security/notices/USN-7195-1" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7169-4", "url": "https://ubuntu.com/security/notices/USN-7169-4" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7186-2", "url": "https://ubuntu.com/security/notices/USN-7186-2" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7196-1", "url": "https://ubuntu.com/security/notices/USN-7196-1" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7179-2", "url": "https://ubuntu.com/security/notices/USN-7179-2" }, { "published_at": "2025-01-07", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7169-3", "url": "https://ubuntu.com/security/notices/USN-7169-3" } ] }
CERTFR-2024-AVI-1080
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Ubuntu 16.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 24.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 18.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 20.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 14.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 22.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } } ], "affected_systems_content": null, "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2022-24448", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24448" }, { "name": "CVE-2024-25744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25744" }, { "name": "CVE-2023-52599", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52599" }, { "name": "CVE-2021-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47076" }, { "name": "CVE-2023-52531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52531" }, { "name": "CVE-2023-52502", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52502" }, { "name": "CVE-2024-26607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26607" }, { "name": "CVE-2024-26633", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26633" }, { "name": "CVE-2023-52639", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52639" }, { "name": "CVE-2023-52497", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52497" }, { "name": "CVE-2024-26800", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26800" }, { "name": "CVE-2024-26675", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26675" }, { "name": "CVE-2023-52488", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52488" }, { "name": "CVE-2021-47055", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47055" }, { "name": "CVE-2023-52578", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52578" }, { "name": "CVE-2023-52498", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52498" }, { "name": "CVE-2024-26636", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26636" }, { "name": "CVE-2023-52614", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52614" }, { "name": "CVE-2024-27022", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27022" }, { "name": "CVE-2024-26668", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26668" }, { "name": "CVE-2024-26669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26669" }, { "name": "CVE-2024-26893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26893" }, { "name": "CVE-2024-36953", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36953" }, { "name": "CVE-2021-47501", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47501" }, { "name": "CVE-2024-35877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35877" }, { "name": "CVE-2024-35904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35904" }, { "name": "CVE-2024-35951", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35951" }, { "name": "CVE-2024-36938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36938" }, { "name": "CVE-2024-38560", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38560" }, { "name": "CVE-2024-27397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27397" }, { "name": "CVE-2024-26947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26947" }, { "name": "CVE-2022-48733", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48733" }, { "name": "CVE-2024-26661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26661" }, { "name": "CVE-2024-25741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25741" }, { "name": "CVE-2024-39487", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39487" }, { "name": "CVE-2024-40915", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40915" }, { "name": "CVE-2024-38602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38602" }, { "name": "CVE-2024-38611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38611" }, { "name": "CVE-2024-36968", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36968" }, { "name": "CVE-2024-38538", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38538" }, { "name": "CVE-2024-38577", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38577" }, { "name": "CVE-2024-41011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41011" }, { "name": "CVE-2024-39472", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39472" }, { "name": "CVE-2024-41017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41017" }, { "name": "CVE-2024-41090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41090" }, { "name": "CVE-2024-41091", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41091" }, { "name": "CVE-2024-41009", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41009" }, { "name": "CVE-2024-41012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41012" }, { "name": "CVE-2024-41015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41015" }, { "name": "CVE-2024-41041", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41041" }, { "name": "CVE-2024-41044", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41044" }, { "name": "CVE-2024-41048", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41048" }, { "name": "CVE-2024-41057", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41057" }, { "name": "CVE-2024-41058", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41058" }, { "name": "CVE-2024-41059", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41059" }, { "name": "CVE-2024-41060", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41060" }, { "name": "CVE-2024-41063", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41063" }, { "name": "CVE-2024-41064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41064" }, { "name": "CVE-2024-41066", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41066" }, { "name": "CVE-2024-41069", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41069" }, { "name": "CVE-2024-41070", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41070" }, { "name": "CVE-2024-41071", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41071" }, { "name": "CVE-2024-41072", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41072" }, { "name": "CVE-2024-41076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41076" }, { "name": "CVE-2024-41078", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41078" }, { "name": "CVE-2024-41081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41081" }, { "name": "CVE-2024-41087", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41087" }, { "name": "CVE-2024-41089", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41089" }, { "name": "CVE-2024-41095", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41095" }, { "name": "CVE-2024-42070", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42070" }, { "name": "CVE-2024-42079", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42079" }, { "name": "CVE-2024-42093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42093" }, { "name": "CVE-2024-42096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42096" }, { "name": "CVE-2024-42105", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42105" }, { "name": "CVE-2024-42119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42119" }, { "name": "CVE-2024-42120", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42120" }, { "name": "CVE-2024-42124", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42124" }, { "name": "CVE-2024-42145", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42145" }, { "name": "CVE-2024-42161", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42161" }, { "name": "CVE-2024-42223", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42223" }, { "name": "CVE-2024-42224", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42224" }, { "name": "CVE-2024-42230", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230" }, { "name": "CVE-2022-48666", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48666" }, { "name": "CVE-2024-36484", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36484" }, { "name": "CVE-2024-41007", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41007" }, { "name": "CVE-2024-41020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41020" }, { "name": "CVE-2024-41022", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41022" }, { "name": "CVE-2024-41034", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41034" }, { "name": "CVE-2024-41035", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41035" }, { "name": "CVE-2024-41046", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41046" }, { "name": "CVE-2024-41049", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41049" }, { "name": "CVE-2024-41055", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41055" }, { "name": "CVE-2024-41065", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41065" }, { "name": "CVE-2024-41068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41068" }, { "name": "CVE-2024-41077", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41077" }, { "name": "CVE-2024-42101", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42101" }, { "name": "CVE-2024-42102", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42102" }, { "name": "CVE-2024-42104", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42104" }, { "name": "CVE-2024-42106", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42106" }, { "name": "CVE-2024-42115", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42115" }, { "name": "CVE-2024-42121", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42121" }, { "name": "CVE-2024-42127", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42127" }, { "name": "CVE-2024-42131", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42131" }, { "name": "CVE-2024-42137", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42137" }, { "name": "CVE-2024-42152", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42152" }, { "name": "CVE-2024-42153", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42153" }, { "name": "CVE-2024-42154", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42154" }, { "name": "CVE-2024-42157", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42157" }, { "name": "CVE-2024-42229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42229" }, { "name": "CVE-2024-42232", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42232" }, { "name": "CVE-2024-42236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42236" }, { "name": "CVE-2024-42244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42244" }, { "name": "CVE-2024-42247", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42247" }, { "name": "CVE-2024-42110", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42110" }, { "name": "CVE-2024-41073", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41073" }, { "name": "CVE-2024-41096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41096" }, { "name": "CVE-2024-42082", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42082" }, { "name": "CVE-2023-52887", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52887" }, { "name": "CVE-2024-41027", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41027" }, { "name": "CVE-2024-41047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41047" }, { "name": "CVE-2024-41092", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41092" }, { "name": "CVE-2024-41093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41093" }, { "name": "CVE-2024-41097", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41097" }, { "name": "CVE-2024-42068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42068" }, { "name": "CVE-2024-42076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42076" }, { "name": "CVE-2024-42077", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42077" }, { "name": "CVE-2024-42080", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42080" }, { "name": "CVE-2024-42084", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42084" }, { "name": "CVE-2024-42085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42085" }, { "name": "CVE-2024-42086", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42086" }, { "name": "CVE-2024-42087", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42087" }, { "name": "CVE-2024-42089", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42089" }, { "name": "CVE-2024-42090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42090" }, { "name": "CVE-2024-42092", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42092" }, { "name": "CVE-2024-42094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42094" }, { "name": "CVE-2024-42095", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42095" }, { "name": "CVE-2024-42097", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42097" }, { "name": "CVE-2024-42098", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42098" }, { "name": "CVE-2024-42109", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42109" }, { "name": "CVE-2024-42130", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42130" }, { "name": "CVE-2024-42140", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42140" }, { "name": "CVE-2024-42225", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42225" }, { "name": "CVE-2024-42240", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42240" }, { "name": "CVE-2024-42270", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42270" }, { "name": "CVE-2022-48938", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48938" }, { "name": "CVE-2022-48943", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48943" }, { "name": "CVE-2023-52889", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52889" }, { "name": "CVE-2024-39486", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39486" }, { "name": "CVE-2024-41010", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41010" }, { "name": "CVE-2024-41025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41025" }, { "name": "CVE-2024-41028", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41028" }, { "name": "CVE-2024-41032", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41032" }, { "name": "CVE-2024-41036", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41036" }, { "name": "CVE-2024-41037", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41037" }, { "name": "CVE-2024-41038", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41038" }, { "name": "CVE-2024-41039", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41039" }, { "name": "CVE-2024-41042", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41042" }, { "name": "CVE-2024-41045", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41045" }, { "name": "CVE-2024-41050", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41050" }, { "name": "CVE-2024-41051", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41051" }, { "name": "CVE-2024-41056", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41056" }, { "name": "CVE-2024-41061", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41061" }, { "name": "CVE-2024-41062", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41062" }, { "name": "CVE-2024-41074", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41074" }, { "name": "CVE-2024-41075", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41075" }, { "name": "CVE-2024-41079", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41079" }, { "name": "CVE-2024-41080", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41080" }, { "name": "CVE-2024-41084", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41084" }, { "name": "CVE-2024-41088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41088" }, { "name": "CVE-2024-41094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41094" }, { "name": "CVE-2024-41098", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41098" }, { "name": "CVE-2024-42064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42064" }, { "name": "CVE-2024-42069", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42069" }, { "name": "CVE-2024-42073", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42073" }, { "name": "CVE-2024-42074", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42074" }, { "name": "CVE-2024-42113", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42113" }, { "name": "CVE-2024-42114", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42114" }, { "name": "CVE-2024-42117", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42117" }, { "name": "CVE-2024-42126", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42126" }, { "name": "CVE-2024-42132", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42132" }, { "name": "CVE-2024-42133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42133" }, { "name": "CVE-2024-42136", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42136" }, { "name": "CVE-2024-42138", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42138" }, { "name": "CVE-2024-42141", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42141" }, { "name": "CVE-2024-42142", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42142" }, { "name": "CVE-2024-42144", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42144" }, { "name": "CVE-2024-42147", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42147" }, { "name": "CVE-2024-42155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42155" }, { "name": "CVE-2024-42156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42156" }, { "name": "CVE-2024-42158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42158" }, { "name": "CVE-2024-42159", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42159" }, { "name": "CVE-2024-42227", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42227" }, { "name": "CVE-2024-42228", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42228" }, { "name": "CVE-2024-42237", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42237" }, { "name": "CVE-2024-42238", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42238" }, { "name": "CVE-2024-42239", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42239" }, { "name": "CVE-2024-42241", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42241" }, { "name": "CVE-2024-42245", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42245" }, { "name": "CVE-2024-42246", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42246" }, { "name": "CVE-2024-42250", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42250" }, { "name": "CVE-2024-42253", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42253" }, { "name": "CVE-2024-42259", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42259" }, { "name": "CVE-2024-42268", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42268" }, { "name": "CVE-2024-42269", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42269" }, { "name": "CVE-2024-42271", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42271" }, { "name": "CVE-2024-42274", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42274" }, { "name": "CVE-2024-42276", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42276" }, { "name": "CVE-2024-42277", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42277" }, { "name": "CVE-2024-42278", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42278" }, { "name": "CVE-2024-42279", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42279" }, { "name": "CVE-2024-42280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42280" }, { "name": "CVE-2024-42281", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42281" }, { "name": "CVE-2024-42283", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42283" }, { "name": "CVE-2024-42284", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42284" }, { "name": "CVE-2024-42285", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42285" }, { "name": "CVE-2024-42286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42286" }, { "name": "CVE-2024-42287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42287" }, { "name": "CVE-2024-42288", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42288" }, { "name": "CVE-2024-42289", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42289" }, { "name": "CVE-2024-42290", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42290" }, { "name": "CVE-2024-42291", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42291" }, { "name": "CVE-2024-42292", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42292" }, { "name": "CVE-2024-42295", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42295" }, { "name": "CVE-2024-42298", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42298" }, { "name": "CVE-2024-42301", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42301" }, { "name": "CVE-2024-42302", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42302" }, { "name": "CVE-2024-42303", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42303" }, { "name": "CVE-2024-42309", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42309" }, { "name": "CVE-2024-42310", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42310" }, { "name": "CVE-2024-42311", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42311" }, { "name": "CVE-2024-42312", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42312" }, { "name": "CVE-2024-42313", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42313" }, { "name": "CVE-2024-42314", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42314" }, { "name": "CVE-2024-42315", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42315" }, { "name": "CVE-2024-42316", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42316" }, { "name": "CVE-2024-42318", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42318" }, { "name": "CVE-2024-42319", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42319" }, { "name": "CVE-2024-42320", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42320" }, { "name": "CVE-2024-42322", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322" }, { "name": "CVE-2024-43817", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43817" }, { "name": "CVE-2024-43818", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43818" }, { "name": "CVE-2024-43819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43819" }, { "name": "CVE-2024-43821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43821" }, { "name": "CVE-2024-43823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43823" }, { "name": "CVE-2024-43824", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43824" }, { "name": "CVE-2024-43825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43825" }, { "name": "CVE-2024-43826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43826" }, { "name": "CVE-2024-43829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43829" }, { "name": "CVE-2024-43830", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43830" }, { "name": "CVE-2024-43831", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43831" }, { "name": "CVE-2024-43833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43833" }, { "name": "CVE-2024-43834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43834" }, { "name": "CVE-2024-43837", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43837" }, { "name": "CVE-2024-43839", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43839" }, { "name": "CVE-2024-43840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43840" }, { "name": "CVE-2024-43841", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43841" }, { "name": "CVE-2024-43842", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43842" }, { "name": "CVE-2024-43846", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43846" }, { "name": "CVE-2024-43847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43847" }, { "name": "CVE-2024-43849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43849" }, { "name": "CVE-2024-43850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43850" }, { "name": "CVE-2024-43853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43853" }, { "name": "CVE-2024-43854", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43854" }, { "name": "CVE-2024-43855", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43855" }, { "name": "CVE-2024-43856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43856" }, { "name": "CVE-2024-43858", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43858" }, { "name": "CVE-2024-43860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43860" }, { "name": "CVE-2024-43861", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43861" }, { "name": "CVE-2024-43863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43863" }, { "name": "CVE-2024-43864", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43864" }, { "name": "CVE-2024-43866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43866" }, { "name": "CVE-2024-43867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43867" }, { "name": "CVE-2024-43871", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43871" }, { "name": "CVE-2024-43873", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43873" }, { "name": "CVE-2024-43875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43875" }, { "name": "CVE-2024-43876", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43876" }, { "name": "CVE-2024-43877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43877" }, { "name": "CVE-2024-43879", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43879" }, { "name": "CVE-2024-43880", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43880" }, { "name": "CVE-2024-43881", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43881" }, { "name": "CVE-2024-43882", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43882" }, { "name": "CVE-2024-43883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43883" }, { "name": "CVE-2024-43884", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43884" }, { "name": "CVE-2024-43889", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43889" }, { "name": "CVE-2024-43892", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43892" }, { "name": "CVE-2024-43893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43893" }, { "name": "CVE-2024-43894", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43894" }, { "name": "CVE-2024-43895", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43895" }, { "name": "CVE-2024-43899", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43899" }, { "name": "CVE-2024-43900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43900" }, { "name": "CVE-2024-43902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43902" }, { "name": "CVE-2024-43904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43904" }, { "name": "CVE-2024-43905", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43905" }, { "name": "CVE-2024-43906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43906" }, { "name": "CVE-2024-43907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43907" }, { "name": "CVE-2024-43908", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43908" }, { "name": "CVE-2024-43909", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43909" }, { "name": "CVE-2024-43911", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43911" }, { "name": "CVE-2024-43912", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43912" }, { "name": "CVE-2024-44931", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44931" }, { "name": "CVE-2024-44938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44938" }, { "name": "CVE-2024-44939", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44939" }, { "name": "CVE-2024-44947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44947" }, { "name": "CVE-2024-41023", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41023" }, { "name": "CVE-2024-41031", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41031" }, { "name": "CVE-2024-42243", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42243" }, { "name": "CVE-2024-42160", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42160" }, { "name": "CVE-2024-45003", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45003" }, { "name": "CVE-2024-43835", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43835" }, { "name": "CVE-2024-43859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43859" }, { "name": "CVE-2024-44940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44940" }, { "name": "CVE-2024-44946", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44946" }, { "name": "CVE-2024-44974", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44974" }, { "name": "CVE-2024-44977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44977" }, { "name": "CVE-2024-44982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44982" }, { "name": "CVE-2024-44983", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44983" }, { "name": "CVE-2024-44985", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44985" }, { "name": "CVE-2024-44986", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44986" }, { "name": "CVE-2024-44987", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44987" }, { "name": "CVE-2024-44988", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44988" }, { "name": "CVE-2024-44989", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44989" }, { "name": "CVE-2024-44990", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44990" }, { "name": "CVE-2024-44991", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44991" }, { "name": "CVE-2024-44995", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44995" }, { "name": "CVE-2024-44998", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44998" }, { "name": "CVE-2024-44999", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44999" }, { "name": "CVE-2024-45000", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45000" }, { "name": "CVE-2024-45002", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45002" }, { "name": "CVE-2024-45006", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45006" }, { "name": "CVE-2024-45007", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45007" }, { "name": "CVE-2024-45008", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45008" }, { "name": "CVE-2024-45009", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45009" }, { "name": "CVE-2024-45010", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45010" }, { "name": "CVE-2024-45011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45011" }, { "name": "CVE-2024-45016", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45016" }, { "name": "CVE-2024-45018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45018" }, { "name": "CVE-2024-45019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45019" }, { "name": "CVE-2024-45021", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45021" }, { "name": "CVE-2024-45022", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45022" }, { "name": "CVE-2024-45025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45025" }, { "name": "CVE-2024-45026", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45026" }, { "name": "CVE-2024-45028", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45028" }, { "name": "CVE-2024-45029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45029" }, { "name": "CVE-2024-46673", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46673" }, { "name": "CVE-2024-46675", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46675" }, { "name": "CVE-2024-46676", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46676" }, { "name": "CVE-2024-46677", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46677" }, { "name": "CVE-2024-46679", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46679" }, { "name": "CVE-2024-46685", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46685" }, { "name": "CVE-2024-46686", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46686" }, { "name": "CVE-2024-46689", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46689" }, { "name": "CVE-2024-46694", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46694" }, { "name": "CVE-2024-46702", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46702" }, { "name": "CVE-2024-46707", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46707" }, { "name": "CVE-2024-46711", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46711" }, { "name": "CVE-2024-46713", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46713" }, { "name": "CVE-2024-46714", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46714" }, { "name": "CVE-2024-46715", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46715" }, { "name": "CVE-2024-46716", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46716" }, { "name": "CVE-2024-46717", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46717" }, { "name": "CVE-2024-46719", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46719" }, { "name": "CVE-2024-46720", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46720" }, { "name": "CVE-2024-46721", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46721" }, { "name": "CVE-2024-46722", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46722" }, { "name": "CVE-2024-46723", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46723" }, { "name": "CVE-2024-46724", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46724" }, { "name": "CVE-2024-46725", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46725" }, { "name": "CVE-2024-46726", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46726" }, { "name": "CVE-2024-46731", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46731" }, { "name": "CVE-2024-46732", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46732" }, { "name": "CVE-2024-46735", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46735" }, { "name": "CVE-2024-46737", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46737" }, { "name": "CVE-2024-46738", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46738" }, { "name": "CVE-2024-46739", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46739" }, { "name": "CVE-2024-46740", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46740" }, { "name": "CVE-2024-46743", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46743" }, { "name": "CVE-2024-46744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46744" }, { "name": "CVE-2024-46745", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46745" }, { "name": "CVE-2024-46746", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46746" }, { "name": "CVE-2024-46747", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46747" }, { "name": "CVE-2024-46750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46750" }, { "name": "CVE-2024-46752", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46752" }, { "name": "CVE-2024-46755", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46755" }, { "name": "CVE-2024-46756", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46756" }, { "name": "CVE-2024-46757", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46757" }, { "name": "CVE-2024-46758", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46758" }, { "name": "CVE-2024-46759", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46759" }, { "name": "CVE-2024-46761", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46761" }, { "name": "CVE-2024-46763", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763" }, { "name": "CVE-2024-46770", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46770" }, { "name": "CVE-2024-46771", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46771" }, { "name": "CVE-2024-46773", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46773" }, { "name": "CVE-2024-46777", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46777" }, { "name": "CVE-2024-46780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46780" }, { "name": "CVE-2024-46781", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46781" }, { "name": "CVE-2024-46782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46782" }, { "name": "CVE-2024-46783", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46783" }, { "name": "CVE-2024-46784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46784" }, { "name": "CVE-2024-46791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46791" }, { "name": "CVE-2024-46794", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46794" }, { "name": "CVE-2024-46795", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46795" }, { "name": "CVE-2024-46798", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46798" }, { "name": "CVE-2024-46800", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46800" }, { "name": "CVE-2024-46802", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46802" }, { "name": "CVE-2024-46804", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46804" }, { "name": "CVE-2024-46805", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46805" }, { "name": "CVE-2024-46807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46807" }, { "name": "CVE-2024-46810", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46810" }, { "name": "CVE-2024-46812", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812" }, { "name": "CVE-2024-46814", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46814" }, { "name": "CVE-2024-46815", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46815" }, { "name": "CVE-2024-46817", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46817" }, { "name": "CVE-2024-46818", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46818" }, { "name": "CVE-2024-46819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46819" }, { "name": "CVE-2024-46821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821" }, { "name": "CVE-2024-46822", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46822" }, { "name": "CVE-2024-46826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46826" }, { "name": "CVE-2024-46828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46828" }, { "name": "CVE-2024-46829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46829" }, { "name": "CVE-2024-46830", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46830" }, { "name": "CVE-2024-46832", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46832" }, { "name": "CVE-2024-46835", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46835" }, { "name": "CVE-2024-46836", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46836" }, { "name": "CVE-2024-46840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46840" }, { "name": "CVE-2024-46844", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46844" }, { "name": "CVE-2024-46846", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46846" }, { "name": "CVE-2024-46848", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46848" }, { "name": "CVE-2024-46849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46849" }, { "name": "CVE-2024-46852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46852" }, { "name": "CVE-2024-46853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46853" }, { "name": "CVE-2024-46854", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46854" }, { "name": "CVE-2024-46855", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46855" }, { "name": "CVE-2024-46857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46857" }, { "name": "CVE-2024-46858", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46858" }, { "name": "CVE-2024-46859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46859" }, { "name": "CVE-2024-42272", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42272" }, { "name": "CVE-2024-42297", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42297" }, { "name": "CVE-2024-41082", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41082" }, { "name": "CVE-2024-42252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42252" }, { "name": "CVE-2024-42265", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42265" }, { "name": "CVE-2024-42294", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42294" }, { "name": "CVE-2024-42304", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42304" }, { "name": "CVE-2024-42305", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42305" }, { "name": "CVE-2024-42306", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42306" }, { "name": "CVE-2024-43828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43828" }, { "name": "CVE-2024-43832", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43832" }, { "name": "CVE-2024-43845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43845" }, { "name": "CVE-2024-43870", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43870" }, { "name": "CVE-2024-43886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43886" }, { "name": "CVE-2024-43890", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43890" }, { "name": "CVE-2024-43914", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43914" }, { "name": "CVE-2024-44935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44935" }, { "name": "CVE-2024-44944", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44944" }, { "name": "CVE-2024-44948", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44948" }, { "name": "CVE-2024-44950", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44950" }, { "name": "CVE-2024-44954", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44954" }, { "name": "CVE-2024-44960", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44960" }, { "name": "CVE-2024-44961", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44961" }, { "name": "CVE-2024-44962", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44962" }, { "name": "CVE-2024-44965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44965" }, { "name": "CVE-2024-44967", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44967" }, { "name": "CVE-2024-44969", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44969" }, { "name": "CVE-2024-44970", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44970" }, { "name": "CVE-2024-44971", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44971" }, { "name": "CVE-2024-44972", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44972" }, { "name": "CVE-2024-44984", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44984" }, { "name": "CVE-2024-45001", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45001" }, { "name": "CVE-2024-45005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45005" }, { "name": "CVE-2024-45012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45012" }, { "name": "CVE-2024-45013", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45013" }, { "name": "CVE-2024-45015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45015" }, { "name": "CVE-2024-45017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45017" }, { "name": "CVE-2024-45020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45020" }, { "name": "CVE-2024-45030", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45030" }, { "name": "CVE-2024-46672", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46672" }, { "name": "CVE-2024-46678", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46678" }, { "name": "CVE-2024-46687", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46687" }, { "name": "CVE-2024-46691", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46691" }, { "name": "CVE-2024-46692", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46692" }, { "name": "CVE-2024-46693", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46693" }, { "name": "CVE-2024-46695", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46695" }, { "name": "CVE-2024-46706", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46706" }, { "name": "CVE-2024-46709", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46709" }, { "name": "CVE-2024-46710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46710" }, { "name": "CVE-2024-46727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46727" }, { "name": "CVE-2024-46728", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46728" }, { "name": "CVE-2024-46729", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46729" }, { "name": "CVE-2024-46730", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46730" }, { "name": "CVE-2024-46741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46741" }, { "name": "CVE-2024-46749", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46749" }, { "name": "CVE-2024-46751", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751" }, { "name": "CVE-2024-46753", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753" }, { "name": "CVE-2024-46760", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46760" }, { "name": "CVE-2024-46767", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46767" }, { "name": "CVE-2024-46772", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46772" }, { "name": "CVE-2024-46774", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774" }, { "name": "CVE-2024-46775", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46775" }, { "name": "CVE-2024-46776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46776" }, { "name": "CVE-2024-46778", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46778" }, { "name": "CVE-2024-46786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46786" }, { "name": "CVE-2024-46787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787" }, { "name": "CVE-2024-46797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46797" }, { "name": "CVE-2024-47668", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47668" }, { "name": "CVE-2023-52888", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52888" }, { "name": "CVE-2023-52918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52918" }, { "name": "CVE-2024-41018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41018" }, { "name": "CVE-2024-41019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41019" }, { "name": "CVE-2024-41021", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41021" }, { "name": "CVE-2024-41029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41029" }, { "name": "CVE-2024-41030", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41030" }, { "name": "CVE-2024-41033", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41033" }, { "name": "CVE-2024-41052", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41052" }, { "name": "CVE-2024-41053", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41053" }, { "name": "CVE-2024-41054", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41054" }, { "name": "CVE-2024-41067", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41067" }, { "name": "CVE-2024-41083", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41083" }, { "name": "CVE-2024-41085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41085" }, { "name": "CVE-2024-41086", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41086" }, { "name": "CVE-2024-42063", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42063" }, { "name": "CVE-2024-42065", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42065" }, { "name": "CVE-2024-42066", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42066" }, { "name": "CVE-2024-42067", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42067" }, { "name": "CVE-2024-42088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42088" }, { "name": "CVE-2024-42091", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42091" }, { "name": "CVE-2024-42100", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42100" }, { "name": "CVE-2024-42103", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42103" }, { "name": "CVE-2024-42108", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42108" }, { "name": "CVE-2024-42111", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42111" }, { "name": "CVE-2024-42112", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42112" }, { "name": "CVE-2024-42118", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42118" }, { "name": "CVE-2024-42128", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42128" }, { "name": "CVE-2024-42129", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42129" }, { "name": "CVE-2024-42135", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42135" }, { "name": "CVE-2024-42146", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42146" }, { "name": "CVE-2024-42149", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42149" }, { "name": "CVE-2024-42150", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42150" }, { "name": "CVE-2024-42151", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42151" }, { "name": "CVE-2024-42231", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42231" }, { "name": "CVE-2024-42234", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42234" }, { "name": "CVE-2024-42235", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42235" }, { "name": "CVE-2024-42248", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42248" }, { "name": "CVE-2024-42251", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42251" }, { "name": "CVE-2024-47659", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47659" }, { "name": "CVE-2024-47663", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47663" }, { "name": "CVE-2024-47667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47667" }, { "name": "CVE-2024-47669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47669" }, { "name": "CVE-2024-42258", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42258" }, { "name": "CVE-2024-43857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43857" }, { "name": "CVE-2024-46754", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46754" }, { "name": "CVE-2024-46766", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46766" }, { "name": "CVE-2024-46803", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46803" }, { "name": "CVE-2024-46806", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46806" }, { "name": "CVE-2024-46809", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46809" }, { "name": "CVE-2024-46811", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46811" }, { "name": "CVE-2024-46813", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46813" }, { "name": "CVE-2024-46816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816" }, { "name": "CVE-2024-46825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46825" }, { "name": "CVE-2024-46827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46827" }, { "name": "CVE-2024-46831", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46831" }, { "name": "CVE-2024-46834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46834" }, { "name": "CVE-2024-46841", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46841" }, { "name": "CVE-2024-46842", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46842" }, { "name": "CVE-2024-46843", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46843" }, { "name": "CVE-2024-46851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46851" }, { "name": "CVE-2024-46860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46860" }, { "name": "CVE-2024-46861", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46861" }, { "name": "CVE-2024-46864", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46864" }, { "name": "CVE-2024-46870", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46870" }, { "name": "CVE-2024-46871", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46871" }, { "name": "CVE-2024-47658", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47658" }, { "name": "CVE-2024-47661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47661" }, { "name": "CVE-2024-42267", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42267" }, { "name": "CVE-2024-42296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42296" }, { "name": "CVE-2024-42299", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42299" }, { "name": "CVE-2024-43869", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43869" }, { "name": "CVE-2024-44934", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44934" }, { "name": "CVE-2024-44958", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44958" }, { "name": "CVE-2024-44966", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44966" }, { "name": "CVE-2024-47660", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47660" }, { "name": "CVE-2024-47665", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47665" }, { "name": "CVE-2024-47662", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47662" }, { "name": "CVE-2024-47664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47664" }, { "name": "CVE-2024-47674", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47674" }, { "name": "CVE-2024-46824", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46824" }, { "name": "CVE-2024-44942", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44942" }, { "name": "CVE-2024-43868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43868" }, { "name": "CVE-2024-42260", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42260" }, { "name": "CVE-2024-42261", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42261" }, { "name": "CVE-2024-42262", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42262" }, { "name": "CVE-2024-42263", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42263" }, { "name": "CVE-2024-42264", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42264" }, { "name": "CVE-2024-42273", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42273" }, { "name": "CVE-2024-42307", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42307" }, { "name": "CVE-2024-42317", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42317" }, { "name": "CVE-2024-42321", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42321" }, { "name": "CVE-2024-43820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43820" }, { "name": "CVE-2024-43827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43827" }, { "name": "CVE-2024-43843", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43843" }, { "name": "CVE-2024-43852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43852" }, { "name": "CVE-2024-43887", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43887" }, { "name": "CVE-2024-43888", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43888" }, { "name": "CVE-2024-43891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43891" }, { "name": "CVE-2024-43910", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43910" }, { "name": "CVE-2024-43913", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43913" }, { "name": "CVE-2024-44937", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44937" }, { "name": "CVE-2024-44941", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44941" }, { "name": "CVE-2024-44943", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44943" }, { "name": "CVE-2024-44953", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44953" }, { "name": "CVE-2024-44956", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44956" }, { "name": "CVE-2024-44957", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44957" }, { "name": "CVE-2024-44959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44959" }, { "name": "CVE-2024-44963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44963" }, { "name": "CVE-2024-44973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44973" }, { "name": "CVE-2024-44975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44975" }, { "name": "CVE-2024-44978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44978" }, { "name": "CVE-2024-44979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44979" }, { "name": "CVE-2024-44980", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44980" }, { "name": "CVE-2024-44993", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44993" }, { "name": "CVE-2024-44996", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44996" }, { "name": "CVE-2024-45027", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45027" }, { "name": "CVE-2024-46680", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46680" }, { "name": "CVE-2024-46681", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46681" }, { "name": "CVE-2024-46683", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46683" }, { "name": "CVE-2024-46697", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46697" }, { "name": "CVE-2024-46698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46698" }, { "name": "CVE-2024-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46701" }, { "name": "CVE-2024-46703", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46703" }, { "name": "CVE-2024-46705", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46705" }, { "name": "CVE-2024-46708", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46708" }, { "name": "CVE-2024-46718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46718" }, { "name": "CVE-2024-46733", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46733" }, { "name": "CVE-2024-46762", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46762" }, { "name": "CVE-2024-46765", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46765" }, { "name": "CVE-2024-46768", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46768" }, { "name": "CVE-2024-46779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46779" }, { "name": "CVE-2024-46785", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46785" }, { "name": "CVE-2024-46788", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46788" }, { "name": "CVE-2024-46792", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46792" }, { "name": "CVE-2024-46793", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46793" }, { "name": "CVE-2024-46808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46808" }, { "name": "CVE-2024-46823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46823" }, { "name": "CVE-2024-46838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46838" }, { "name": "CVE-2024-46845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46845" }, { "name": "CVE-2024-46847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46847" }, { "name": "CVE-2024-46850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46850" }, { "name": "CVE-2024-46866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46866" }, { "name": "CVE-2024-46867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46867" }, { "name": "CVE-2024-46868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46868" }, { "name": "CVE-2024-47666", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47666" }, { "name": "CVE-2024-47683", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47683" }, { "name": "CVE-2024-49984", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49984" } ], "initial_release_date": "2024-12-13T00:00:00", "last_revision_date": "2024-12-13T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-1080", "revisions": [ { "description": "Version initiale", "revision_date": "2024-12-13T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu", "vendor_advisories": [ { "published_at": "2024-12-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7144-1", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "published_at": "2024-12-12", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7159-1", "url": "https://ubuntu.com/security/notices/USN-7159-1" }, { "published_at": "2024-12-12", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7155-1", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "published_at": "2024-12-12", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7154-1", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "published_at": "2024-12-10", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7148-1", "url": "https://ubuntu.com/security/notices/USN-7148-1" }, { "published_at": "2024-12-12", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7156-1", "url": "https://ubuntu.com/security/notices/USN-7156-1" } ] }
cnvd-2024-39360
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://git.kernel.org/stable/c/17e78f43de0c6da34204cc858b4cc05671ea9acf
Name | Linux Linux Kernel >=6.5,<6.10.8 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2024-46698", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2024-46698" } }, "description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a7a\u6307\u9488\u53d6\u6d88\u5f15\u7528\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://git.kernel.org/stable/c/17e78f43de0c6da34204cc858b4cc05671ea9acf", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2024-39360", "openTime": "2024-09-26", "patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a7a\u6307\u9488\u53d6\u6d88\u5f15\u7528\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Linux kernel\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\uff08CNVD-2024-39360\uff09\u7684\u8865\u4e01", "products": { "product": "Linux Linux Kernel \u003e=6.5\uff0c\u003c6.10.8" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2024-46698", "serverity": "\u4e2d", "submitTime": "2024-09-18", "title": "Linux kernel\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\uff08CNVD-2024-39360\uff09" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.