Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-46701 (GCVE-0-2024-46701)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-46701", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-29T15:04:11.603675Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-29T15:04:25.862Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/libfs.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "308b4fc2403b335894592ee9dc212a5e58bb309f", "status": "affected", "version": "a2e459555c5f9da3e619b7e47a63f98574dc75f1", "versionType": "git" }, { "lessThan": "64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a", "status": "affected", "version": "a2e459555c5f9da3e619b7e47a63f98574dc75f1", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/libfs.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.6" }, { "lessThan": "6.6", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.10.*", "status": "unaffected", "version": "6.10.7", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.11", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.10.7", "versionStartIncluding": "6.6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.11", "versionStartIncluding": "6.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibfs: fix infinite directory reads for offset dir\n\nAfter we switch tmpfs dir operations from simple_dir_operations to\nsimple_offset_dir_operations, every rename happened will fill new dentry\nto dest dir\u0027s maple tree(\u0026SHMEM_I(inode)-\u003edir_offsets-\u003emt) with a free\nkey starting with octx-\u003enewx_offset, and then set newx_offset equals to\nfree key + 1. This will lead to infinite readdir combine with rename\nhappened at the same time, which fail generic/736 in xfstests(detail show\nas below).\n\n1. create 5000 files(1 2 3...) under one dir\n2. call readdir(man 3 readdir) once, and get one entry\n3. rename(entry, \"TEMPFILE\"), then rename(\"TEMPFILE\", entry)\n4. loop 2~3, until readdir return nothing or we loop too many\n times(tmpfs break test with the second condition)\n\nWe choose the same logic what commit 9b378f6ad48cf (\"btrfs: fix infinite\ndirectory reads\") to fix it, record the last_index when we open dir, and\ndo not emit the entry which index \u003e= last_index. The file-\u003eprivate_data\nnow used in offset dir can use directly to do this, and we also update\nthe last_index when we llseek the dir file.\n\n[brauner: only update last_index after seek when offset is zero like Jan suggested]" } ], "providerMetadata": { "dateUpdated": "2025-05-04T09:32:13.970Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/308b4fc2403b335894592ee9dc212a5e58bb309f" }, { "url": "https://git.kernel.org/stable/c/64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a" } ], "title": "libfs: fix infinite directory reads for offset dir", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-46701", "datePublished": "2024-09-13T06:27:29.911Z", "dateReserved": "2024-09-11T15:12:18.251Z", "dateUpdated": "2025-05-04T09:32:13.970Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-46701\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-09-13T07:15:05.127\",\"lastModified\":\"2024-09-19T13:40:27.817\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nlibfs: fix infinite directory reads for offset dir\\n\\nAfter we switch tmpfs dir operations from simple_dir_operations to\\nsimple_offset_dir_operations, every rename happened will fill new dentry\\nto dest dir\u0027s maple tree(\u0026SHMEM_I(inode)-\u003edir_offsets-\u003emt) with a free\\nkey starting with octx-\u003enewx_offset, and then set newx_offset equals to\\nfree key + 1. This will lead to infinite readdir combine with rename\\nhappened at the same time, which fail generic/736 in xfstests(detail show\\nas below).\\n\\n1. create 5000 files(1 2 3...) under one dir\\n2. call readdir(man 3 readdir) once, and get one entry\\n3. rename(entry, \\\"TEMPFILE\\\"), then rename(\\\"TEMPFILE\\\", entry)\\n4. loop 2~3, until readdir return nothing or we loop too many\\n times(tmpfs break test with the second condition)\\n\\nWe choose the same logic what commit 9b378f6ad48cf (\\\"btrfs: fix infinite\\ndirectory reads\\\") to fix it, record the last_index when we open dir, and\\ndo not emit the entry which index \u003e= last_index. The file-\u003eprivate_data\\nnow used in offset dir can use directly to do this, and we also update\\nthe last_index when we llseek the dir file.\\n\\n[brauner: only update last_index after seek when offset is zero like Jan suggested]\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: libfs: arregla lecturas de directorio infinitas para el directorio offset Despu\u00e9s de cambiar las operaciones de directorio tmpfs de simple_dir_operations a simple_offset_dir_operations, cada cambio de nombre que se produzca llenar\u00e1 new dentry en el \u00e1rbol de maple del directorio de destino (\u0026amp;SHMEM_I(inode)-\u0026gt;dir_offsets-\u0026gt;mt) con una clave libre que comienza con octx-\u0026gt;newx_offset, y luego establece newx_offset igual a la clave libre + 1. Esto provocar\u00e1 una combinaci\u00f3n de lectura de directorio infinita con el cambio de nombre ocurrido al mismo tiempo, lo que falla generic/736 en xfstests (los detalles se muestran a continuaci\u00f3n). 1. crear 5000 archivos (1 2 3...) bajo un directorio 2. llamar a readdir(man 3 readdir) una vez, y obtener una entrada 3. renombrar(entrada, \\\"TEMPFILE\\\"), luego renombrar(\\\"TEMPFILE\\\", entrada) 4. repetir 2~3 veces, hasta que readdir no devuelva nada o repetimos demasiadas veces (tmpfs interrumpe la prueba con la segunda condici\u00f3n) Elegimos la misma l\u00f3gica que el commit 9b378f6ad48cf (\\\"btrfs: arregla lecturas infinitas de directorio\\\") para arreglarlo, registrar el last_index cuando abrimos el directorio, y no emitir la entrada cuyo \u00edndice \u0026gt;= last_index. El file-\u0026gt;private_data que ahora se usa en el directorio de desplazamiento se puede usar directamente para hacer esto, y tambi\u00e9n actualizamos el last_index cuando buscamos el archivo dir. [brauner: solo actualizamos last_index despu\u00e9s de la b\u00fasqueda cuando el desplazamiento es cero como sugiri\u00f3 Jan]\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.6\",\"versionEndExcluding\":\"6.10.7\",\"matchCriteriaId\":\"FC206D9C-CA64-401C-AA0C-3DC0DA769B2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3CE743-2126-47A3-8B7C-822B502CF119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEB27E7-30AA-45CC-8934-B89263EF3551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0005AEF-856E-47EB-BFE4-90C46899394D\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/308b4fc2403b335894592ee9dc212a5e58bb309f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-46701\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-29T15:04:11.603675Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-29T15:04:15.756Z\"}}], \"cna\": {\"title\": \"libfs: fix infinite directory reads for offset dir\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"a2e459555c5f\", \"lessThan\": \"308b4fc2403b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a2e459555c5f\", \"lessThan\": \"64a7ce76fb90\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/libfs.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.6\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.6\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.10.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/libfs.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/308b4fc2403b335894592ee9dc212a5e58bb309f\"}, {\"url\": \"https://git.kernel.org/stable/c/64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a\"}], \"x_generator\": {\"engine\": \"bippy-9e1c9544281a\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nlibfs: fix infinite directory reads for offset dir\\n\\nAfter we switch tmpfs dir operations from simple_dir_operations to\\nsimple_offset_dir_operations, every rename happened will fill new dentry\\nto dest dir\u0027s maple tree(\u0026SHMEM_I(inode)-\u003edir_offsets-\u003emt) with a free\\nkey starting with octx-\u003enewx_offset, and then set newx_offset equals to\\nfree key + 1. This will lead to infinite readdir combine with rename\\nhappened at the same time, which fail generic/736 in xfstests(detail show\\nas below).\\n\\n1. create 5000 files(1 2 3...) under one dir\\n2. call readdir(man 3 readdir) once, and get one entry\\n3. rename(entry, \\\"TEMPFILE\\\"), then rename(\\\"TEMPFILE\\\", entry)\\n4. loop 2~3, until readdir return nothing or we loop too many\\n times(tmpfs break test with the second condition)\\n\\nWe choose the same logic what commit 9b378f6ad48cf (\\\"btrfs: fix infinite\\ndirectory reads\\\") to fix it, record the last_index when we open dir, and\\ndo not emit the entry which index \u003e= last_index. The file-\u003eprivate_data\\nnow used in offset dir can use directly to do this, and we also update\\nthe last_index when we llseek the dir file.\\n\\n[brauner: only update last_index after seek when offset is zero like Jan suggested]\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-11-05T09:44:56.069Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-46701\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-05T09:44:56.069Z\", \"dateReserved\": \"2024-09-11T15:12:18.251Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-13T06:27:29.911Z\", \"assignerShortName\": \"Linux\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ghsa-q844-wpfg-w2h9
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
libfs: fix infinite directory reads for offset dir
After we switch tmpfs dir operations from simple_dir_operations to simple_offset_dir_operations, every rename happened will fill new dentry to dest dir's maple tree(&SHMEM_I(inode)->dir_offsets->mt) with a free key starting with octx->newx_offset, and then set newx_offset equals to free key + 1. This will lead to infinite readdir combine with rename happened at the same time, which fail generic/736 in xfstests(detail show as below).
- create 5000 files(1 2 3...) under one dir
- call readdir(man 3 readdir) once, and get one entry
- rename(entry, "TEMPFILE"), then rename("TEMPFILE", entry)
- loop 2~3, until readdir return nothing or we loop too many times(tmpfs break test with the second condition)
We choose the same logic what commit 9b378f6ad48cf ("btrfs: fix infinite directory reads") to fix it, record the last_index when we open dir, and do not emit the entry which index >= last_index. The file->private_data now used in offset dir can use directly to do this, and we also update the last_index when we llseek the dir file.
[brauner: only update last_index after seek when offset is zero like Jan suggested]
{ "affected": [], "aliases": [ "CVE-2024-46701" ], "database_specific": { "cwe_ids": [ "CWE-835" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-09-13T07:15:05Z", "severity": "MODERATE" }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibfs: fix infinite directory reads for offset dir\n\nAfter we switch tmpfs dir operations from simple_dir_operations to\nsimple_offset_dir_operations, every rename happened will fill new dentry\nto dest dir\u0027s maple tree(\u0026SHMEM_I(inode)-\u003edir_offsets-\u003emt) with a free\nkey starting with octx-\u003enewx_offset, and then set newx_offset equals to\nfree key + 1. This will lead to infinite readdir combine with rename\nhappened at the same time, which fail generic/736 in xfstests(detail show\nas below).\n\n1. create 5000 files(1 2 3...) under one dir\n2. call readdir(man 3 readdir) once, and get one entry\n3. rename(entry, \"TEMPFILE\"), then rename(\"TEMPFILE\", entry)\n4. loop 2~3, until readdir return nothing or we loop too many\n times(tmpfs break test with the second condition)\n\nWe choose the same logic what commit 9b378f6ad48cf (\"btrfs: fix infinite\ndirectory reads\") to fix it, record the last_index when we open dir, and\ndo not emit the entry which index \u003e= last_index. The file-\u003eprivate_data\nnow used in offset dir can use directly to do this, and we also update\nthe last_index when we llseek the dir file.\n\n[brauner: only update last_index after seek when offset is zero like Jan suggested]", "id": "GHSA-q844-wpfg-w2h9", "modified": "2024-09-19T15:30:49Z", "published": "2024-09-13T09:30:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-46701" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/308b4fc2403b335894592ee9dc212a5e58bb309f" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
wid-sec-w-2024-2133
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder einen unspezifischen Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2133 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2133.json" }, { "category": "self", "summary": "WID-SEC-2024-2133 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2133" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46675 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46675-ba70@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46676 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46676-0b05@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46677 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46677-b53c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46678 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46678-ca65@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46679 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46679-3527@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46680 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46680-f40d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46681 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46681-6086@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46682 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46682-df82@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46684 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46684-d492@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46685 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46685-6606@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46686 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46686-5b18@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46687 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46687-5668@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46688 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46688-7a5a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46689 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46689-4c19@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46690 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46690-38b2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46691 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46691-93e1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46692 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46692-f287@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46693 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46693-cbe3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46694 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46694-0706@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46695 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46695-affc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46696 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46696-a8c1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46697 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46697-d166@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46698 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46698-357c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46699 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46699-b1cf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46700 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46700-ed8e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcements vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5782 vom 2024-10-03", "url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-071 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-071.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3565-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3563-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3567-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3587-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3585-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019586.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16", "url": "https://ubuntu.com/security/notices/USN-7069-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7069-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-192 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-192.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-072 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-072.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-056 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-056.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-194 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-194.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-193 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-193.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12813.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7110-1 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7110-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7123-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09", "url": "https://linux.oracle.com/errata/ELSA-2024-12868.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10944 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10944" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10943 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10943" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10939" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10939.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10943 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10943.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7166-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11486 vom 2024-12-19", "url": "https://access.redhat.com/errata/RHSA-2024:11486" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", "url": "https://linux.oracle.com/errata/ELSA-2024-12887.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:10944 vom 2024-12-19", "url": "https://errata.build.resf.org/RLSA-2024:10944" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7166-3" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-11486 vom 2025-01-07", "url": "https://linux.oracle.com/errata/ELSA-2024-11486.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7186-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7186-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-09T23:00:00.000+00:00", "generator": { "date": "2025-01-10T09:18:25.298+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-2133", "initial_release_date": "2024-09-12T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian und Amazon aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat, Oracle Linux, Rocky Enterprise Software Foundation und SUSE aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "30" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T033107", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-46673", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46673" }, { "cve": "CVE-2024-46674", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46674" }, { "cve": "CVE-2024-46675", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46675" }, { "cve": "CVE-2024-46676", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46676" }, { "cve": "CVE-2024-46677", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46677" }, { "cve": "CVE-2024-46678", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46678" }, { "cve": "CVE-2024-46679", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46679" }, { "cve": "CVE-2024-46680", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46680" }, { "cve": "CVE-2024-46681", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46681" }, { "cve": "CVE-2024-46682", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46682" }, { "cve": "CVE-2024-46683", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46683" }, { "cve": "CVE-2024-46684", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46684" }, { "cve": "CVE-2024-46685", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46685" }, { "cve": "CVE-2024-46686", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46686" }, { "cve": "CVE-2024-46687", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46687" }, { "cve": "CVE-2024-46688", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46688" }, { "cve": "CVE-2024-46689", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46689" }, { "cve": "CVE-2024-46690", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46690" }, { "cve": "CVE-2024-46691", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46691" }, { "cve": "CVE-2024-46692", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46692" }, { "cve": "CVE-2024-46693", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46693" }, { "cve": "CVE-2024-46694", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46694" }, { "cve": "CVE-2024-46695", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46695" }, { "cve": "CVE-2024-46696", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46696" }, { "cve": "CVE-2024-46697", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46697" }, { "cve": "CVE-2024-46698", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46698" }, { "cve": "CVE-2024-46699", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46699" }, { "cve": "CVE-2024-46700", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46700" }, { "cve": "CVE-2024-46701", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46701" }, { "cve": "CVE-2024-46702", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46702" }, { "cve": "CVE-2024-46703", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46703" }, { "cve": "CVE-2024-46704", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46704" }, { "cve": "CVE-2024-46705", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46705" }, { "cve": "CVE-2024-46706", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46706" }, { "cve": "CVE-2024-46707", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46707" }, { "cve": "CVE-2024-46708", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46708" }, { "cve": "CVE-2024-46709", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46709" }, { "cve": "CVE-2024-46710", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46710" }, { "cve": "CVE-2024-46711", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46711" }, { "cve": "CVE-2024-46712", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46712" } ] }
WID-SEC-W-2024-2133
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder einen unspezifischen Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2133 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2133.json" }, { "category": "self", "summary": "WID-SEC-2024-2133 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2133" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46675 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46675-ba70@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46676 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46676-0b05@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46677 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46677-b53c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46678 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46678-ca65@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46679 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46679-3527@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46680 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46680-f40d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46681 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46681-6086@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46682 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46682-df82@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46684 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091337-CVE-2024-46684-d492@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46685 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46685-6606@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46686 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46686-5b18@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46687 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46687-5668@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46688 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091338-CVE-2024-46688-7a5a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46689 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46689-4c19@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46690 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46690-38b2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46691 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46691-93e1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46692 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091339-CVE-2024-46692-f287@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46693 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46693-cbe3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46694 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46694-0706@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46695 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46695-affc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46696 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46696-a8c1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46697 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46697-d166@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46698 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46698-357c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46699 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46699-b1cf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-46700 vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/2024091341-CVE-2024-46700-ed8e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcements vom 2024-09-12", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5782 vom 2024-10-03", "url": "https://lists.debian.org/debian-security-announce/2024/msg00195.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-071 vom 2024-10-02", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-071.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3547-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019566.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3565-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3563-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3567-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3587-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3585-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019586.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16", "url": "https://ubuntu.com/security/notices/USN-7069-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7069-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-192 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-192.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-072 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-072.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-056 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-056.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-194 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-194.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-193 vom 2024-10-31", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-193.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12813.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7110-1 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7110-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7123-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09", "url": "https://linux.oracle.com/errata/ELSA-2024-12868.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10944 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10944" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10943 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10943" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10939" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10939.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10943 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10943.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7166-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11486 vom 2024-12-19", "url": "https://access.redhat.com/errata/RHSA-2024:11486" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", "url": "https://linux.oracle.com/errata/ELSA-2024-12887.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:10944 vom 2024-12-19", "url": "https://errata.build.resf.org/RLSA-2024:10944" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7166-3" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-11486 vom 2025-01-07", "url": "https://linux.oracle.com/errata/ELSA-2024-11486.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7186-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7186-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-09T23:00:00.000+00:00", "generator": { "date": "2025-01-10T09:18:25.298+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-2133", "initial_release_date": "2024-09-12T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian und Amazon aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat, Oracle Linux, Rocky Enterprise Software Foundation und SUSE aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "30" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T033107", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-46673", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46673" }, { "cve": "CVE-2024-46674", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46674" }, { "cve": "CVE-2024-46675", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46675" }, { "cve": "CVE-2024-46676", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46676" }, { "cve": "CVE-2024-46677", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46677" }, { "cve": "CVE-2024-46678", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46678" }, { "cve": "CVE-2024-46679", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46679" }, { "cve": "CVE-2024-46680", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46680" }, { "cve": "CVE-2024-46681", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46681" }, { "cve": "CVE-2024-46682", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46682" }, { "cve": "CVE-2024-46683", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46683" }, { "cve": "CVE-2024-46684", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46684" }, { "cve": "CVE-2024-46685", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46685" }, { "cve": "CVE-2024-46686", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46686" }, { "cve": "CVE-2024-46687", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46687" }, { "cve": "CVE-2024-46688", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46688" }, { "cve": "CVE-2024-46689", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46689" }, { "cve": "CVE-2024-46690", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46690" }, { "cve": "CVE-2024-46691", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46691" }, { "cve": "CVE-2024-46692", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46692" }, { "cve": "CVE-2024-46693", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46693" }, { "cve": "CVE-2024-46694", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46694" }, { "cve": "CVE-2024-46695", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46695" }, { "cve": "CVE-2024-46696", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46696" }, { "cve": "CVE-2024-46697", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46697" }, { "cve": "CVE-2024-46698", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46698" }, { "cve": "CVE-2024-46699", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46699" }, { "cve": "CVE-2024-46700", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46700" }, { "cve": "CVE-2024-46701", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46701" }, { "cve": "CVE-2024-46702", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46702" }, { "cve": "CVE-2024-46703", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46703" }, { "cve": "CVE-2024-46704", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46704" }, { "cve": "CVE-2024-46705", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46705" }, { "cve": "CVE-2024-46706", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46706" }, { "cve": "CVE-2024-46707", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46707" }, { "cve": "CVE-2024-46708", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46708" }, { "cve": "CVE-2024-46709", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46709" }, { "cve": "CVE-2024-46710", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46710" }, { "cve": "CVE-2024-46711", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46711" }, { "cve": "CVE-2024-46712", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen. Diese Fehler bestehen in mehreren Komponenten und Subsystemen wie Bluetooth, Video/Aperture oder Ethtool, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer Use-after-free-, einer NULL-Zeiger-Dereferenz oder einer fehlenden Berechtigungspr\u00fcfung und mehr. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T033107", "398363", "T004914", "T032255" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2024-46712" } ] }
fkie_cve-2024-46701
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | 6.11 | |
linux | linux_kernel | 6.11 | |
linux | linux_kernel | 6.11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC206D9C-CA64-401C-AA0C-3DC0DA769B2D", "versionEndExcluding": "6.10.7", "versionStartIncluding": "6.6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibfs: fix infinite directory reads for offset dir\n\nAfter we switch tmpfs dir operations from simple_dir_operations to\nsimple_offset_dir_operations, every rename happened will fill new dentry\nto dest dir\u0027s maple tree(\u0026SHMEM_I(inode)-\u003edir_offsets-\u003emt) with a free\nkey starting with octx-\u003enewx_offset, and then set newx_offset equals to\nfree key + 1. This will lead to infinite readdir combine with rename\nhappened at the same time, which fail generic/736 in xfstests(detail show\nas below).\n\n1. create 5000 files(1 2 3...) under one dir\n2. call readdir(man 3 readdir) once, and get one entry\n3. rename(entry, \"TEMPFILE\"), then rename(\"TEMPFILE\", entry)\n4. loop 2~3, until readdir return nothing or we loop too many\n times(tmpfs break test with the second condition)\n\nWe choose the same logic what commit 9b378f6ad48cf (\"btrfs: fix infinite\ndirectory reads\") to fix it, record the last_index when we open dir, and\ndo not emit the entry which index \u003e= last_index. The file-\u003eprivate_data\nnow used in offset dir can use directly to do this, and we also update\nthe last_index when we llseek the dir file.\n\n[brauner: only update last_index after seek when offset is zero like Jan suggested]" }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: libfs: arregla lecturas de directorio infinitas para el directorio offset Despu\u00e9s de cambiar las operaciones de directorio tmpfs de simple_dir_operations a simple_offset_dir_operations, cada cambio de nombre que se produzca llenar\u00e1 new dentry en el \u00e1rbol de maple del directorio de destino (\u0026amp;SHMEM_I(inode)-\u0026gt;dir_offsets-\u0026gt;mt) con una clave libre que comienza con octx-\u0026gt;newx_offset, y luego establece newx_offset igual a la clave libre + 1. Esto provocar\u00e1 una combinaci\u00f3n de lectura de directorio infinita con el cambio de nombre ocurrido al mismo tiempo, lo que falla generic/736 en xfstests (los detalles se muestran a continuaci\u00f3n). 1. crear 5000 archivos (1 2 3...) bajo un directorio 2. llamar a readdir(man 3 readdir) una vez, y obtener una entrada 3. renombrar(entrada, \"TEMPFILE\"), luego renombrar(\"TEMPFILE\", entrada) 4. repetir 2~3 veces, hasta que readdir no devuelva nada o repetimos demasiadas veces (tmpfs interrumpe la prueba con la segunda condici\u00f3n) Elegimos la misma l\u00f3gica que el commit 9b378f6ad48cf (\"btrfs: arregla lecturas infinitas de directorio\") para arreglarlo, registrar el last_index cuando abrimos el directorio, y no emitir la entrada cuyo \u00edndice \u0026gt;= last_index. El file-\u0026gt;private_data que ahora se usa en el directorio de desplazamiento se puede usar directamente para hacer esto, y tambi\u00e9n actualizamos el last_index cuando buscamos el archivo dir. [brauner: solo actualizamos last_index despu\u00e9s de la b\u00fasqueda cuando el desplazamiento es cero como sugiri\u00f3 Jan]" } ], "id": "CVE-2024-46701", "lastModified": "2024-09-19T13:40:27.817", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-13T07:15:05.127", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/308b4fc2403b335894592ee9dc212a5e58bb309f" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CERTFR-2025-AVI-0022
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Ubuntu 16.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 24.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 18.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 20.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 24.10", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 14.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 22.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "name": "CVE-2020-24490", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24490" }, { "name": "CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "name": "CVE-2022-38096", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38096" }, { "name": "CVE-2022-36402", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36402" }, { "name": "CVE-2023-6610", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6610" }, { "name": "CVE-2023-35827", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35827" }, { "name": "CVE-2024-25744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25744" }, { "name": "CVE-2024-26625", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26625" }, { "name": "CVE-2023-52594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52594" }, { "name": "CVE-2021-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47076" }, { "name": "CVE-2023-52532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52532" }, { "name": "CVE-2024-26607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26607" }, { "name": "CVE-2023-52434", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52434" }, { "name": "CVE-2021-47101", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47101" }, { "name": "CVE-2023-52486", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52486" }, { "name": "CVE-2023-52509", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52509" }, { "name": "CVE-2023-52639", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52639" }, { "name": "CVE-2023-52497", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52497" }, { "name": "CVE-2023-52507", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52507" }, { "name": "CVE-2021-47082", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47082" }, { "name": "CVE-2023-52621", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52621" }, { "name": "CVE-2024-26800", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26800" }, { "name": "CVE-2024-26777", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26777" }, { "name": "CVE-2021-47118", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47118" }, { "name": "CVE-2023-52488", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52488" }, { "name": "CVE-2023-52572", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52572" }, { "name": "CVE-2021-47001", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47001" }, { "name": "CVE-2023-52498", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52498" }, { "name": "CVE-2024-26669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26669" }, { "name": "CVE-2024-27072", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27072" }, { "name": "CVE-2024-26893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26893" }, { "name": "CVE-2024-36941", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36941" }, { "name": "CVE-2024-36946", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36946" }, { "name": "CVE-2024-36953", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36953" }, { "name": "CVE-2021-47501", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47501" }, { "name": "CVE-2023-52757", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757" }, { "name": "CVE-2023-52821", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52821" }, { "name": "CVE-2024-26822", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26822" }, { "name": "CVE-2024-26921", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26921" }, { "name": "CVE-2024-35847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35847" }, { "name": "CVE-2024-35904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35904" }, { "name": "CVE-2024-35951", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35951" }, { "name": "CVE-2024-35963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35963" }, { "name": "CVE-2024-35965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35965" }, { "name": "CVE-2024-35966", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35966" }, { "name": "CVE-2024-35967", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35967" }, { "name": "CVE-2024-36893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36893" }, { "name": "CVE-2024-36938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36938" }, { "name": "CVE-2024-36952", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36952" }, { "name": "CVE-2024-35886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35886" }, { "name": "CVE-2024-36004", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36004" }, { "name": "CVE-2024-38633", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38633" }, { "name": "CVE-2024-26947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26947" }, { "name": "CVE-2022-48733", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48733" }, { "name": "CVE-2024-38544", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38544" }, { "name": "CVE-2024-38545", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38545" }, { "name": "CVE-2024-38553", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38553" }, { "name": "CVE-2024-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38597" }, { "name": "CVE-2024-38619", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38619" }, { "name": "CVE-2024-39301", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39301" }, { "name": "CVE-2024-26661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26661" }, { "name": "CVE-2024-36270", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36270" }, { "name": "CVE-2024-40910", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40910" }, { "name": "CVE-2024-40912", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40912" }, { "name": "CVE-2024-40915", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40915" }, { "name": "CVE-2024-40959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40959" }, { "name": "CVE-2024-38602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38602" }, { "name": "CVE-2024-38611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38611" }, { "name": "CVE-2024-39463", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39463" }, { "name": "CVE-2024-36968", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36968" }, { "name": "CVE-2024-38538", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38538" }, { "name": "CVE-2024-38577", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38577" }, { "name": "CVE-2024-41011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41011" }, { "name": "CVE-2024-39472", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39472" }, { "name": "CVE-2023-52751", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52751" }, { "name": "CVE-2024-41017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41017" }, { "name": "CVE-2024-41090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41090" }, { "name": "CVE-2024-41091", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41091" }, { "name": "CVE-2021-47086", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47086" }, { "name": "CVE-2024-41012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41012" }, { "name": "CVE-2024-41015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41015" }, { "name": "CVE-2024-41016", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41016" }, { "name": "CVE-2024-41059", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41059" }, { "name": "CVE-2024-41060", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41060" }, { "name": "CVE-2024-41063", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41063" }, { "name": "CVE-2024-41064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41064" }, { "name": "CVE-2024-41070", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41070" }, { "name": "CVE-2024-41071", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41071" }, { "name": "CVE-2024-41072", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41072" }, { "name": "CVE-2024-41078", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41078" }, { "name": "CVE-2024-41081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41081" }, { "name": "CVE-2024-42079", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42079" }, { "name": "CVE-2022-48666", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48666" }, { "name": "CVE-2024-36484", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36484" }, { "name": "CVE-2024-41020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41020" }, { "name": "CVE-2024-41022", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41022" }, { "name": "CVE-2024-41065", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41065" }, { "name": "CVE-2024-41068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41068" }, { "name": "CVE-2024-41077", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41077" }, { "name": "CVE-2024-42101", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42101" }, { "name": "CVE-2024-42153", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42153" }, { "name": "CVE-2024-41073", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41073" }, { "name": "CVE-2024-38632", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38632" }, { "name": "CVE-2024-38667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38667" }, { "name": "CVE-2024-40973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40973" }, { "name": "CVE-2024-42068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42068" }, { "name": "CVE-2024-42077", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42077" }, { "name": "CVE-2024-42090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42090" }, { "name": "CVE-2024-42240", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42240" }, { "name": "CVE-2024-42270", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42270" }, { "name": "CVE-2022-48938", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48938" }, { "name": "CVE-2022-48943", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48943" }, { "name": "CVE-2023-52889", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52889" }, { "name": "CVE-2023-52904", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52904" }, { "name": "CVE-2024-41042", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41042" }, { "name": "CVE-2024-41098", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41098" }, { "name": "CVE-2024-42114", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42114" }, { "name": "CVE-2024-42126", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42126" }, { "name": "CVE-2024-42156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42156" }, { "name": "CVE-2024-42158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42158" }, { "name": "CVE-2024-42246", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42246" }, { "name": "CVE-2024-42259", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42259" }, { "name": "CVE-2024-42268", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42268" }, { "name": "CVE-2024-42269", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42269" }, { "name": "CVE-2024-42271", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42271" }, { "name": "CVE-2024-42274", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42274" }, { "name": "CVE-2024-42276", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42276" }, { "name": "CVE-2024-42277", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42277" }, { "name": "CVE-2024-42278", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42278" }, { "name": "CVE-2024-42279", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42279" }, { "name": "CVE-2024-42280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42280" }, { "name": "CVE-2024-42281", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42281" }, { "name": "CVE-2024-42283", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42283" }, { "name": "CVE-2024-42284", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42284" }, { "name": "CVE-2024-42285", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42285" }, { "name": "CVE-2024-42286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42286" }, { "name": "CVE-2024-42287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42287" }, { "name": "CVE-2024-42288", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42288" }, { "name": "CVE-2024-42289", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42289" }, { "name": "CVE-2024-42290", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42290" }, { "name": "CVE-2024-42291", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42291" }, { "name": "CVE-2024-42292", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42292" }, { "name": "CVE-2024-42295", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42295" }, { "name": "CVE-2024-42298", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42298" }, { "name": "CVE-2024-42301", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42301" }, { "name": "CVE-2024-42302", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42302" }, { "name": "CVE-2024-42303", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42303" }, { "name": "CVE-2024-42309", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42309" }, { "name": "CVE-2024-42310", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42310" }, { "name": "CVE-2024-42311", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42311" }, { "name": "CVE-2024-42312", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42312" }, { "name": "CVE-2024-42313", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42313" }, { "name": "CVE-2024-42314", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42314" }, { "name": "CVE-2024-42315", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42315" }, { "name": "CVE-2024-42316", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42316" }, { "name": "CVE-2024-42318", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42318" }, { "name": "CVE-2024-42319", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42319" }, { "name": "CVE-2024-42320", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42320" }, { "name": "CVE-2024-42322", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322" }, { "name": "CVE-2024-43817", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43817" }, { "name": "CVE-2024-43818", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43818" }, { "name": "CVE-2024-43819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43819" }, { "name": "CVE-2024-43821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43821" }, { "name": "CVE-2024-43823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43823" }, { "name": "CVE-2024-43824", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43824" }, { "name": "CVE-2024-43825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43825" }, { "name": "CVE-2024-43826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43826" }, { "name": "CVE-2024-43829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43829" }, { "name": "CVE-2024-43830", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43830" }, { "name": "CVE-2024-43831", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43831" }, { "name": "CVE-2024-43833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43833" }, { "name": "CVE-2024-43834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43834" }, { "name": "CVE-2024-43837", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43837" }, { "name": "CVE-2024-43839", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43839" }, { "name": "CVE-2024-43840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43840" }, { "name": "CVE-2024-43841", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43841" }, { "name": "CVE-2024-43842", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43842" }, { "name": "CVE-2024-43846", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43846" }, { "name": "CVE-2024-43847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43847" }, { "name": "CVE-2024-43849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43849" }, { "name": "CVE-2024-43850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43850" }, { "name": "CVE-2024-43853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43853" }, { "name": "CVE-2024-43854", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43854" }, { "name": "CVE-2024-43856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43856" }, { "name": "CVE-2024-43858", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43858" }, { "name": "CVE-2024-43860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43860" }, { "name": "CVE-2024-43861", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43861" }, { "name": "CVE-2024-43863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43863" }, { "name": "CVE-2024-43864", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43864" }, { "name": "CVE-2024-43866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43866" }, { "name": "CVE-2024-43867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43867" }, { "name": "CVE-2024-43871", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43871" }, { "name": "CVE-2024-43873", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43873" }, { "name": "CVE-2024-43875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43875" }, { "name": "CVE-2024-43876", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43876" }, { "name": "CVE-2024-43877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43877" }, { "name": "CVE-2024-43879", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43879" }, { "name": "CVE-2024-43880", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43880" }, { "name": "CVE-2024-43881", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43881" }, { "name": "CVE-2024-43882", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43882" }, { "name": "CVE-2024-43883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43883" }, { "name": "CVE-2024-43884", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43884" }, { "name": "CVE-2024-43889", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43889" }, { "name": "CVE-2024-43892", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43892" }, { "name": "CVE-2024-43893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43893" }, { "name": "CVE-2024-43894", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43894" }, { "name": "CVE-2024-43895", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43895" }, { "name": "CVE-2024-43899", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43899" }, { "name": "CVE-2024-43900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43900" }, { "name": "CVE-2024-43902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43902" }, { "name": "CVE-2024-43904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43904" }, { "name": "CVE-2024-43905", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43905" }, { "name": "CVE-2024-43906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43906" }, { "name": "CVE-2024-43907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43907" }, { "name": "CVE-2024-43908", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43908" }, { "name": "CVE-2024-43909", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43909" }, { "name": "CVE-2024-43911", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43911" }, { "name": "CVE-2024-43912", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43912" }, { "name": "CVE-2024-44931", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44931" }, { "name": "CVE-2024-44938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44938" }, { "name": "CVE-2024-44939", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44939" }, { "name": "CVE-2024-44947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44947" }, { "name": "CVE-2024-45003", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45003" }, { "name": "CVE-2024-43835", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43835" }, { "name": "CVE-2024-43859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43859" }, { "name": "CVE-2024-44940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44940" }, { "name": "CVE-2024-44946", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44946" }, { "name": "CVE-2024-44974", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44974" }, { "name": "CVE-2024-44977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44977" }, { "name": "CVE-2024-44982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44982" }, { "name": "CVE-2024-44983", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44983" }, { "name": "CVE-2024-44985", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44985" }, { "name": "CVE-2024-44986", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44986" }, { "name": "CVE-2024-44987", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44987" }, { "name": "CVE-2024-44988", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44988" }, { "name": "CVE-2024-44989", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44989" }, { "name": "CVE-2024-44990", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44990" }, { "name": "CVE-2024-44991", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44991" }, { "name": "CVE-2024-44995", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44995" }, { "name": "CVE-2024-44998", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44998" }, { "name": "CVE-2024-44999", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44999" }, { "name": "CVE-2024-45000", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45000" }, { "name": "CVE-2024-45002", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45002" }, { "name": "CVE-2024-45006", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45006" }, { "name": "CVE-2024-45007", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45007" }, { "name": "CVE-2024-45008", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45008" }, { "name": "CVE-2024-45009", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45009" }, { "name": "CVE-2024-45010", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45010" }, { "name": "CVE-2024-45011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45011" }, { "name": "CVE-2024-45018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45018" }, { "name": "CVE-2024-45019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45019" }, { "name": "CVE-2024-45021", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45021" }, { "name": "CVE-2024-45022", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45022" }, { "name": "CVE-2024-45025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45025" }, { "name": "CVE-2024-45026", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45026" }, { "name": "CVE-2024-45028", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45028" }, { "name": "CVE-2024-45029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45029" }, { "name": "CVE-2024-46673", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46673" }, { "name": "CVE-2024-46675", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46675" }, { "name": "CVE-2024-46676", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46676" }, { "name": "CVE-2024-46677", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46677" }, { "name": "CVE-2024-46679", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46679" }, { "name": "CVE-2024-46685", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46685" }, { "name": "CVE-2024-46686", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46686" }, { "name": "CVE-2024-46689", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46689" }, { "name": "CVE-2024-46694", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46694" }, { "name": "CVE-2024-46702", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46702" }, { "name": "CVE-2024-46707", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46707" }, { "name": "CVE-2024-46711", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46711" }, { "name": "CVE-2024-46713", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46713" }, { "name": "CVE-2024-46714", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46714" }, { "name": "CVE-2024-46715", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46715" }, { "name": "CVE-2024-46716", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46716" }, { "name": "CVE-2024-46717", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46717" }, { "name": "CVE-2024-46719", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46719" }, { "name": "CVE-2024-46720", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46720" }, { "name": "CVE-2024-46721", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46721" }, { "name": "CVE-2024-46722", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46722" }, { "name": "CVE-2024-46723", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46723" }, { "name": "CVE-2024-46724", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46724" }, { "name": "CVE-2024-46725", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46725" }, { "name": "CVE-2024-46726", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46726" }, { "name": "CVE-2024-46731", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46731" }, { "name": "CVE-2024-46732", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46732" }, { "name": "CVE-2024-46735", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46735" }, { "name": "CVE-2024-46737", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46737" }, { "name": "CVE-2024-46738", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46738" }, { "name": "CVE-2024-46739", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46739" }, { "name": "CVE-2024-46740", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46740" }, { "name": "CVE-2024-46743", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46743" }, { "name": "CVE-2024-46744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46744" }, { "name": "CVE-2024-46745", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46745" }, { "name": "CVE-2024-46746", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46746" }, { "name": "CVE-2024-46747", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46747" }, { "name": "CVE-2024-46750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46750" }, { "name": "CVE-2024-46752", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46752" }, { "name": "CVE-2024-46755", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46755" }, { "name": "CVE-2024-46756", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46756" }, { "name": "CVE-2024-46757", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46757" }, { "name": "CVE-2024-46758", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46758" }, { "name": "CVE-2024-46759", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46759" }, { "name": "CVE-2024-46761", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46761" }, { "name": "CVE-2024-46763", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763" }, { "name": "CVE-2024-46770", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46770" }, { "name": "CVE-2024-46771", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46771" }, { "name": "CVE-2024-46773", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46773" }, { "name": "CVE-2024-46777", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46777" }, { "name": "CVE-2024-46780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46780" }, { "name": "CVE-2024-46781", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46781" }, { "name": "CVE-2024-46782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46782" }, { "name": "CVE-2024-46783", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46783" }, { "name": "CVE-2024-46784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46784" }, { "name": "CVE-2024-46791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46791" }, { "name": "CVE-2024-46794", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46794" }, { "name": "CVE-2024-46795", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46795" }, { "name": "CVE-2024-46798", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46798" }, { "name": "CVE-2024-46800", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46800" }, { "name": "CVE-2024-46802", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46802" }, { "name": "CVE-2024-46804", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46804" }, { "name": "CVE-2024-46805", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46805" }, { "name": "CVE-2024-46807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46807" }, { "name": "CVE-2024-46810", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46810" }, { "name": "CVE-2024-46812", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812" }, { "name": "CVE-2024-46814", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46814" }, { "name": "CVE-2024-46815", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46815" }, { "name": "CVE-2024-46817", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46817" }, { "name": "CVE-2024-46818", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46818" }, { "name": "CVE-2024-46819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46819" }, { "name": "CVE-2024-46821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821" }, { "name": "CVE-2024-46822", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46822" }, { "name": "CVE-2024-46826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46826" }, { "name": "CVE-2024-46828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46828" }, { "name": "CVE-2024-46829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46829" }, { "name": "CVE-2024-46830", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46830" }, { "name": "CVE-2024-46832", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46832" }, { "name": "CVE-2024-46835", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46835" }, { "name": "CVE-2024-46836", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46836" }, { "name": "CVE-2024-46840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46840" }, { "name": "CVE-2024-46844", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46844" }, { "name": "CVE-2024-46846", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46846" }, { "name": "CVE-2024-46848", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46848" }, { "name": "CVE-2024-46849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46849" }, { "name": "CVE-2024-46852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46852" }, { "name": "CVE-2024-46853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46853" }, { "name": "CVE-2024-46854", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46854" }, { "name": "CVE-2024-46855", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46855" }, { "name": "CVE-2024-46857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46857" }, { "name": "CVE-2024-46858", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46858" }, { "name": "CVE-2024-46859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46859" }, { "name": "CVE-2024-46865", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46865" }, { "name": "CVE-2024-42272", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42272" }, { "name": "CVE-2024-42297", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42297" }, { "name": "CVE-2024-42265", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42265" }, { "name": "CVE-2024-42294", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42294" }, { "name": "CVE-2024-42304", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42304" }, { "name": "CVE-2024-42305", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42305" }, { "name": "CVE-2024-42306", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42306" }, { "name": "CVE-2024-43828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43828" }, { "name": "CVE-2024-43832", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43832" }, { "name": "CVE-2024-43845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43845" }, { "name": "CVE-2024-43870", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43870" }, { "name": "CVE-2024-43886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43886" }, { "name": "CVE-2024-43890", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43890" }, { "name": "CVE-2024-43914", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43914" }, { "name": "CVE-2024-44935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44935" }, { "name": "CVE-2024-44944", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44944" }, { "name": "CVE-2024-44948", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44948" }, { "name": "CVE-2024-44950", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44950" }, { "name": "CVE-2024-44954", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44954" }, { "name": "CVE-2024-44960", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44960" }, { "name": "CVE-2024-44961", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44961" }, { "name": "CVE-2024-44962", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44962" }, { "name": "CVE-2024-44965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44965" }, { "name": "CVE-2024-44967", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44967" }, { "name": "CVE-2024-44969", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44969" }, { "name": "CVE-2024-44970", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44970" }, { "name": "CVE-2024-44971", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44971" }, { "name": "CVE-2024-44972", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44972" }, { "name": "CVE-2024-44984", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44984" }, { "name": "CVE-2024-45001", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45001" }, { "name": "CVE-2024-45005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45005" }, { "name": "CVE-2024-45012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45012" }, { "name": "CVE-2024-45013", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45013" }, { "name": "CVE-2024-45015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45015" }, { "name": "CVE-2024-45017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45017" }, { "name": "CVE-2024-45020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45020" }, { "name": "CVE-2024-45030", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45030" }, { "name": "CVE-2024-46672", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46672" }, { "name": "CVE-2024-46678", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46678" }, { "name": "CVE-2024-46687", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46687" }, { "name": "CVE-2024-46691", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46691" }, { "name": "CVE-2024-46692", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46692" }, { "name": "CVE-2024-46693", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46693" }, { "name": "CVE-2024-46695", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46695" }, { "name": "CVE-2024-46706", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46706" }, { "name": "CVE-2024-46709", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46709" }, { "name": "CVE-2024-46710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46710" }, { "name": "CVE-2024-46727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46727" }, { "name": "CVE-2024-46728", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46728" }, { "name": "CVE-2024-46729", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46729" }, { "name": "CVE-2024-46730", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46730" }, { "name": "CVE-2024-46741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46741" }, { "name": "CVE-2024-46749", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46749" }, { "name": "CVE-2024-46751", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751" }, { "name": "CVE-2024-46753", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753" }, { "name": "CVE-2024-46760", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46760" }, { "name": "CVE-2024-46767", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46767" }, { "name": "CVE-2024-46772", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46772" }, { "name": "CVE-2024-46774", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774" }, { "name": "CVE-2024-46775", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46775" }, { "name": "CVE-2024-46776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46776" }, { "name": "CVE-2024-46778", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46778" }, { "name": "CVE-2024-46786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46786" }, { "name": "CVE-2024-46787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787" }, { "name": "CVE-2024-46797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46797" }, { "name": "CVE-2024-47668", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47668" }, { "name": "CVE-2023-52918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52918" }, { "name": "CVE-2024-41019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41019" }, { "name": "CVE-2024-47659", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47659" }, { "name": "CVE-2024-47663", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47663" }, { "name": "CVE-2024-47667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47667" }, { "name": "CVE-2024-47669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47669" }, { "name": "CVE-2024-42258", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42258" }, { "name": "CVE-2024-43857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43857" }, { "name": "CVE-2023-52917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52917" }, { "name": "CVE-2024-46754", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46754" }, { "name": "CVE-2024-46766", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46766" }, { "name": "CVE-2024-46803", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46803" }, { "name": "CVE-2024-46806", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46806" }, { "name": "CVE-2024-46809", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46809" }, { "name": "CVE-2024-46811", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46811" }, { "name": "CVE-2024-46813", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46813" }, { "name": "CVE-2024-46816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816" }, { "name": "CVE-2024-46825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46825" }, { "name": "CVE-2024-46827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46827" }, { "name": "CVE-2024-46831", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46831" }, { "name": "CVE-2024-46834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46834" }, { "name": "CVE-2024-46841", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46841" }, { "name": "CVE-2024-46842", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46842" }, { "name": "CVE-2024-46843", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46843" }, { "name": "CVE-2024-46851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46851" }, { "name": "CVE-2024-46860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46860" }, { "name": "CVE-2024-46861", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46861" }, { "name": "CVE-2024-46864", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46864" }, { "name": "CVE-2024-46870", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46870" }, { "name": "CVE-2024-46871", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46871" }, { "name": "CVE-2024-47658", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47658" }, { "name": "CVE-2024-47661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47661" }, { "name": "CVE-2024-42267", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42267" }, { "name": "CVE-2024-42296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42296" }, { "name": "CVE-2024-42299", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42299" }, { "name": "CVE-2024-43869", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43869" }, { "name": "CVE-2024-44934", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44934" }, { "name": "CVE-2024-44958", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44958" }, { "name": "CVE-2024-44966", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44966" }, { "name": "CVE-2024-47660", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47660" }, { "name": "CVE-2024-47665", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47665" }, { "name": "CVE-2024-47662", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47662" }, { "name": "CVE-2024-47664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47664" }, { "name": "CVE-2024-47670", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47670" }, { "name": "CVE-2024-47671", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47671" }, { "name": "CVE-2024-47672", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47672" }, { "name": "CVE-2024-47673", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47673" }, { "name": "CVE-2024-47674", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47674" }, { "name": "CVE-2024-47684", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47684" }, { "name": "CVE-2024-47685", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47685" }, { "name": "CVE-2024-47692", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47692" }, { "name": "CVE-2024-47693", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47693" }, { "name": "CVE-2024-47695", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47695" }, { "name": "CVE-2024-47696", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47696" }, { "name": "CVE-2024-47697", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47697" }, { "name": "CVE-2024-47698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47698" }, { "name": "CVE-2024-47699", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47699" }, { "name": "CVE-2024-47705", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47705" }, { "name": "CVE-2024-47706", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47706" }, { "name": "CVE-2024-47709", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47709" }, { "name": "CVE-2024-47710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47710" }, { "name": "CVE-2024-47712", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47712" }, { "name": "CVE-2024-47713", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47713" }, { "name": "CVE-2024-47715", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47715" }, { "name": "CVE-2024-47718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47718" }, { "name": "CVE-2024-47720", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47720" }, { "name": "CVE-2024-47723", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47723" }, { "name": "CVE-2024-47735", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47735" }, { "name": "CVE-2024-47737", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47737" }, { "name": "CVE-2024-47739", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47739" }, { "name": "CVE-2024-47742", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47742" }, { "name": "CVE-2024-47747", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47747" }, { "name": "CVE-2024-47748", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47748" }, { "name": "CVE-2024-47749", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47749" }, { "name": "CVE-2024-47756", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47756" }, { "name": "CVE-2024-47757", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47757" }, { "name": "CVE-2024-49851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49851" }, { "name": "CVE-2024-49852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49852" }, { "name": "CVE-2024-49858", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49858" }, { "name": "CVE-2024-49860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49860" }, { "name": "CVE-2024-49863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49863" }, { "name": "CVE-2024-49866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49866" }, { "name": "CVE-2024-49867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49867" }, { "name": "CVE-2024-49871", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49871" }, { "name": "CVE-2024-49875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49875" }, { "name": "CVE-2024-49877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49877" }, { "name": "CVE-2024-49878", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49878" }, { "name": "CVE-2024-49879", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49879" }, { "name": "CVE-2024-49881", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49881" }, { "name": "CVE-2024-49882", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49882" }, { "name": "CVE-2024-49883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49883" }, { "name": "CVE-2024-49886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49886" }, { "name": "CVE-2024-49890", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49890" }, { "name": "CVE-2024-49892", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49892" }, { "name": "CVE-2024-49894", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49894" }, { "name": "CVE-2024-49895", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49895" }, { "name": "CVE-2024-49896", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49896" }, { "name": "CVE-2024-49900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49900" }, { "name": "CVE-2024-49902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49902" }, { "name": "CVE-2024-49903", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49903" }, { "name": "CVE-2024-49907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49907" }, { "name": "CVE-2024-49913", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49913" }, { "name": "CVE-2024-49930", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49930" }, { "name": "CVE-2024-49933", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49933" }, { "name": "CVE-2024-49935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49935" }, { "name": "CVE-2024-49936", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49936" }, { "name": "CVE-2024-49938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49938" }, { "name": "CVE-2024-49946", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49946" }, { "name": "CVE-2024-49949", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49949" }, { "name": "CVE-2024-49954", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49954" }, { "name": "CVE-2024-49955", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49955" }, { "name": "CVE-2024-49957", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49957" }, { "name": "CVE-2024-49958", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49958" }, { "name": "CVE-2024-49959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49959" }, { "name": "CVE-2024-49962", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49962" }, { "name": "CVE-2024-49963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49963" }, { "name": "CVE-2024-49965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49965" }, { "name": "CVE-2024-49966", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49966" }, { "name": "CVE-2024-49967", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49967" }, { "name": "CVE-2024-49969", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49969" }, { "name": "CVE-2024-49973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49973" }, { "name": "CVE-2024-49975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49975" }, { "name": "CVE-2024-49981", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49981" }, { "name": "CVE-2024-49982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49982" }, { "name": "CVE-2024-49985", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49985" }, { "name": "CVE-2024-49995", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49995" }, { "name": "CVE-2024-50000", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50000" }, { "name": "CVE-2024-50001", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50001" }, { "name": "CVE-2024-50002", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50002" }, { "name": "CVE-2024-50006", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50006" }, { "name": "CVE-2024-50007", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50007" }, { "name": "CVE-2024-50008", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50008" }, { "name": "CVE-2024-50013", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50013" }, { "name": "CVE-2024-50015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50015" }, { "name": "CVE-2024-50019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50019" }, { "name": "CVE-2024-50024", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50024" }, { "name": "CVE-2024-50031", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50031" }, { "name": "CVE-2024-50033", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50033" }, { "name": "CVE-2024-50035", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50035" }, { "name": "CVE-2024-50040", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50040" }, { "name": "CVE-2024-50041", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50041" }, { "name": "CVE-2024-50044", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50044" }, { "name": "CVE-2024-50045", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50045" }, { "name": "CVE-2024-50046", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50046" }, { "name": "CVE-2024-50049", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50049" }, { "name": "CVE-2024-50059", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50059" }, { "name": "CVE-2024-50062", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50062" }, { "name": "CVE-2024-46824", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46824" }, { "name": "CVE-2024-44942", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44942" }, { "name": "CVE-2024-43868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43868" }, { "name": "CVE-2024-50264", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50264" }, { "name": "CVE-2024-53057", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53057" }, { "name": "CVE-2024-42260", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42260" }, { "name": "CVE-2024-42261", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42261" }, { "name": "CVE-2024-42262", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42262" }, { "name": "CVE-2024-42263", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42263" }, { "name": "CVE-2024-42264", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42264" }, { "name": "CVE-2024-42273", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42273" }, { "name": "CVE-2024-42307", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42307" }, { "name": "CVE-2024-42317", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42317" }, { "name": "CVE-2024-42321", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42321" }, { "name": "CVE-2024-43820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43820" }, { "name": "CVE-2024-43827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43827" }, { "name": "CVE-2024-43843", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43843" }, { "name": "CVE-2024-43852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43852" }, { "name": "CVE-2024-43887", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43887" }, { "name": "CVE-2024-43888", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43888" }, { "name": "CVE-2024-43891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43891" }, { "name": "CVE-2024-43910", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43910" }, { "name": "CVE-2024-43913", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43913" }, { "name": "CVE-2024-44937", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44937" }, { "name": "CVE-2024-44941", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44941" }, { "name": "CVE-2024-44943", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44943" }, { "name": "CVE-2024-44953", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44953" }, { "name": "CVE-2024-44956", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44956" }, { "name": "CVE-2024-44957", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44957" }, { "name": "CVE-2024-44959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44959" }, { "name": "CVE-2024-44963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44963" }, { "name": "CVE-2024-44973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44973" }, { "name": "CVE-2024-44975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44975" }, { "name": "CVE-2024-44978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44978" }, { "name": "CVE-2024-44979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44979" }, { "name": "CVE-2024-44980", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44980" }, { "name": "CVE-2024-44993", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44993" }, { "name": "CVE-2024-44996", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44996" }, { "name": "CVE-2024-45027", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45027" }, { "name": "CVE-2024-46680", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46680" }, { "name": "CVE-2024-46681", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46681" }, { "name": "CVE-2024-46683", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46683" }, { "name": "CVE-2024-46697", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46697" }, { "name": "CVE-2024-46698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46698" }, { "name": "CVE-2024-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46701" }, { "name": "CVE-2024-46703", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46703" }, { "name": "CVE-2024-46705", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46705" }, { "name": "CVE-2024-46708", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46708" }, { "name": "CVE-2024-46718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46718" }, { "name": "CVE-2024-46733", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46733" }, { "name": "CVE-2024-46762", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46762" }, { "name": "CVE-2024-46765", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46765" }, { "name": "CVE-2024-46768", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46768" }, { "name": "CVE-2024-46779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46779" }, { "name": "CVE-2024-46785", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46785" }, { "name": "CVE-2024-46788", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46788" }, { "name": "CVE-2024-46792", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46792" }, { "name": "CVE-2024-46793", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46793" }, { "name": "CVE-2024-46808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46808" }, { "name": "CVE-2024-46823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46823" }, { "name": "CVE-2024-46838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46838" }, { "name": "CVE-2024-46845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46845" }, { "name": "CVE-2024-46847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46847" }, { "name": "CVE-2024-46850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46850" }, { "name": "CVE-2024-46866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46866" }, { "name": "CVE-2024-46867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46867" }, { "name": "CVE-2024-46868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46868" }, { "name": "CVE-2024-47666", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47666" }, { "name": "CVE-2024-47683", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47683" }, { "name": "CVE-2024-49984", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49984" }, { "name": "CVE-2024-47679", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47679" }, { "name": "CVE-2024-47690", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47690" }, { "name": "CVE-2024-47701", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47701" }, { "name": "CVE-2024-47734", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47734" }, { "name": "CVE-2024-47740", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47740" }, { "name": "CVE-2024-49856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49856" }, { "name": "CVE-2024-49868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49868" }, { "name": "CVE-2024-49884", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49884" }, { "name": "CVE-2024-49889", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49889" }, { "name": "CVE-2024-49924", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49924" }, { "name": "CVE-2024-49927", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49927" }, { "name": "CVE-2024-49944", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49944" }, { "name": "CVE-2024-49948", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49948" }, { "name": "CVE-2024-49952", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49952" }, { "name": "CVE-2024-49977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49977" }, { "name": "CVE-2024-49983", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49983" }, { "name": "CVE-2024-49997", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49997" }, { "name": "CVE-2024-50003", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50003" }, { "name": "CVE-2024-50038", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50038" }, { "name": "CVE-2024-50039", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50039" }, { "name": "CVE-2024-50093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50093" }, { "name": "CVE-2024-50095", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50095" }, { "name": "CVE-2024-50096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50096" }, { "name": "CVE-2024-50179", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50179" }, { "name": "CVE-2024-50180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50180" }, { "name": "CVE-2024-50181", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50181" }, { "name": "CVE-2024-50184", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50184" }, { "name": "CVE-2024-50186", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50186" }, { "name": "CVE-2024-50188", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50188" }, { "name": "CVE-2024-50189", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50189" }, { "name": "CVE-2024-50191", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50191" }, { "name": "CVE-2024-50011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50011" } ], "initial_release_date": "2025-01-10T00:00:00", "last_revision_date": "2025-01-10T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0022", "revisions": [ { "description": "Version initiale", "revision_date": "2025-01-10T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu", "vendor_advisories": [ { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7186-1", "url": "https://ubuntu.com/security/notices/USN-7186-1" }, { "published_at": "2025-01-07", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7179-3", "url": "https://ubuntu.com/security/notices/USN-7179-3" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7154-2", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7184-1", "url": "https://ubuntu.com/security/notices/USN-7184-1" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7185-2", "url": "https://ubuntu.com/security/notices/USN-7185-2" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7183-1", "url": "https://ubuntu.com/security/notices/USN-7183-1" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7187-1", "url": "https://ubuntu.com/security/notices/USN-7187-1" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7194-1", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7185-1", "url": "https://ubuntu.com/security/notices/USN-7185-1" }, { "published_at": "2025-01-07", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7167-2", "url": "https://ubuntu.com/security/notices/USN-7167-2" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7159-5", "url": "https://ubuntu.com/security/notices/USN-7159-5" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7195-1", "url": "https://ubuntu.com/security/notices/USN-7195-1" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7169-4", "url": "https://ubuntu.com/security/notices/USN-7169-4" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7186-2", "url": "https://ubuntu.com/security/notices/USN-7186-2" }, { "published_at": "2025-01-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7196-1", "url": "https://ubuntu.com/security/notices/USN-7196-1" }, { "published_at": "2025-01-06", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7179-2", "url": "https://ubuntu.com/security/notices/USN-7179-2" }, { "published_at": "2025-01-07", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7169-3", "url": "https://ubuntu.com/security/notices/USN-7169-3" } ] }
CERTFR-2024-AVI-1080
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Ubuntu 16.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 24.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 18.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 20.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 14.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 22.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } } ], "affected_systems_content": null, "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2022-24448", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24448" }, { "name": "CVE-2024-25744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25744" }, { "name": "CVE-2023-52599", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52599" }, { "name": "CVE-2021-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47076" }, { "name": "CVE-2023-52531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52531" }, { "name": "CVE-2023-52502", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52502" }, { "name": "CVE-2024-26607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26607" }, { "name": "CVE-2024-26633", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26633" }, { "name": "CVE-2023-52639", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52639" }, { "name": "CVE-2023-52497", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52497" }, { "name": "CVE-2024-26800", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26800" }, { "name": "CVE-2024-26675", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26675" }, { "name": "CVE-2023-52488", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52488" }, { "name": "CVE-2021-47055", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47055" }, { "name": "CVE-2023-52578", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52578" }, { "name": "CVE-2023-52498", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52498" }, { "name": "CVE-2024-26636", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26636" }, { "name": "CVE-2023-52614", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52614" }, { "name": "CVE-2024-27022", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27022" }, { "name": "CVE-2024-26668", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26668" }, { "name": "CVE-2024-26669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26669" }, { "name": "CVE-2024-26893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26893" }, { "name": "CVE-2024-36953", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36953" }, { "name": "CVE-2021-47501", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47501" }, { "name": "CVE-2024-35877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35877" }, { "name": "CVE-2024-35904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35904" }, { "name": "CVE-2024-35951", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35951" }, { "name": "CVE-2024-36938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36938" }, { "name": "CVE-2024-38560", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38560" }, { "name": "CVE-2024-27397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27397" }, { "name": "CVE-2024-26947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26947" }, { "name": "CVE-2022-48733", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48733" }, { "name": "CVE-2024-26661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26661" }, { "name": "CVE-2024-25741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25741" }, { "name": "CVE-2024-39487", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39487" }, { "name": "CVE-2024-40915", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40915" }, { "name": "CVE-2024-38602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38602" }, { "name": "CVE-2024-38611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38611" }, { "name": "CVE-2024-36968", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36968" }, { "name": "CVE-2024-38538", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38538" }, { "name": "CVE-2024-38577", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38577" }, { "name": "CVE-2024-41011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41011" }, { "name": "CVE-2024-39472", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39472" }, { "name": "CVE-2024-41017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41017" }, { "name": "CVE-2024-41090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41090" }, { "name": "CVE-2024-41091", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41091" }, { "name": "CVE-2024-41009", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41009" }, { "name": "CVE-2024-41012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41012" }, { "name": "CVE-2024-41015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41015" }, { "name": "CVE-2024-41041", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41041" }, { "name": "CVE-2024-41044", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41044" }, { "name": "CVE-2024-41048", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41048" }, { "name": "CVE-2024-41057", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41057" }, { "name": "CVE-2024-41058", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41058" }, { "name": "CVE-2024-41059", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41059" }, { "name": "CVE-2024-41060", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41060" }, { "name": "CVE-2024-41063", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41063" }, { "name": "CVE-2024-41064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41064" }, { "name": "CVE-2024-41066", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41066" }, { "name": "CVE-2024-41069", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41069" }, { "name": "CVE-2024-41070", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41070" }, { "name": "CVE-2024-41071", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41071" }, { "name": "CVE-2024-41072", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41072" }, { "name": "CVE-2024-41076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41076" }, { "name": "CVE-2024-41078", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41078" }, { "name": "CVE-2024-41081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41081" }, { "name": "CVE-2024-41087", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41087" }, { "name": "CVE-2024-41089", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41089" }, { "name": "CVE-2024-41095", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41095" }, { "name": "CVE-2024-42070", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42070" }, { "name": "CVE-2024-42079", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42079" }, { "name": "CVE-2024-42093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42093" }, { "name": "CVE-2024-42096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42096" }, { "name": "CVE-2024-42105", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42105" }, { "name": "CVE-2024-42119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42119" }, { "name": "CVE-2024-42120", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42120" }, { "name": "CVE-2024-42124", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42124" }, { "name": "CVE-2024-42145", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42145" }, { "name": "CVE-2024-42161", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42161" }, { "name": "CVE-2024-42223", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42223" }, { "name": "CVE-2024-42224", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42224" }, { "name": "CVE-2024-42230", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230" }, { "name": "CVE-2022-48666", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48666" }, { "name": "CVE-2024-36484", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36484" }, { "name": "CVE-2024-41007", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41007" }, { "name": "CVE-2024-41020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41020" }, { "name": "CVE-2024-41022", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41022" }, { "name": "CVE-2024-41034", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41034" }, { "name": "CVE-2024-41035", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41035" }, { "name": "CVE-2024-41046", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41046" }, { "name": "CVE-2024-41049", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41049" }, { "name": "CVE-2024-41055", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41055" }, { "name": "CVE-2024-41065", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41065" }, { "name": "CVE-2024-41068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41068" }, { "name": "CVE-2024-41077", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41077" }, { "name": "CVE-2024-42101", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42101" }, { "name": "CVE-2024-42102", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42102" }, { "name": "CVE-2024-42104", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42104" }, { "name": "CVE-2024-42106", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42106" }, { "name": "CVE-2024-42115", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42115" }, { "name": "CVE-2024-42121", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42121" }, { "name": "CVE-2024-42127", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42127" }, { "name": "CVE-2024-42131", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42131" }, { "name": "CVE-2024-42137", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42137" }, { "name": "CVE-2024-42152", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42152" }, { "name": "CVE-2024-42153", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42153" }, { "name": "CVE-2024-42154", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42154" }, { "name": "CVE-2024-42157", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42157" }, { "name": "CVE-2024-42229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42229" }, { "name": "CVE-2024-42232", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42232" }, { "name": "CVE-2024-42236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42236" }, { "name": "CVE-2024-42244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42244" }, { "name": "CVE-2024-42247", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42247" }, { "name": "CVE-2024-42110", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42110" }, { "name": "CVE-2024-41073", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41073" }, { "name": "CVE-2024-41096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41096" }, { "name": "CVE-2024-42082", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42082" }, { "name": "CVE-2023-52887", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52887" }, { "name": "CVE-2024-41027", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41027" }, { "name": "CVE-2024-41047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41047" }, { "name": "CVE-2024-41092", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41092" }, { "name": "CVE-2024-41093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41093" }, { "name": "CVE-2024-41097", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41097" }, { "name": "CVE-2024-42068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42068" }, { "name": "CVE-2024-42076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42076" }, { "name": "CVE-2024-42077", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42077" }, { "name": "CVE-2024-42080", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42080" }, { "name": "CVE-2024-42084", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42084" }, { "name": "CVE-2024-42085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42085" }, { "name": "CVE-2024-42086", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42086" }, { "name": "CVE-2024-42087", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42087" }, { "name": "CVE-2024-42089", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42089" }, { "name": "CVE-2024-42090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42090" }, { "name": "CVE-2024-42092", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42092" }, { "name": "CVE-2024-42094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42094" }, { "name": "CVE-2024-42095", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42095" }, { "name": "CVE-2024-42097", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42097" }, { "name": "CVE-2024-42098", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42098" }, { "name": "CVE-2024-42109", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42109" }, { "name": "CVE-2024-42130", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42130" }, { "name": "CVE-2024-42140", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42140" }, { "name": "CVE-2024-42225", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42225" }, { "name": "CVE-2024-42240", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42240" }, { "name": "CVE-2024-42270", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42270" }, { "name": "CVE-2022-48938", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48938" }, { "name": "CVE-2022-48943", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48943" }, { "name": "CVE-2023-52889", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52889" }, { "name": "CVE-2024-39486", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39486" }, { "name": "CVE-2024-41010", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41010" }, { "name": "CVE-2024-41025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41025" }, { "name": "CVE-2024-41028", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41028" }, { "name": "CVE-2024-41032", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41032" }, { "name": "CVE-2024-41036", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41036" }, { "name": "CVE-2024-41037", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41037" }, { "name": "CVE-2024-41038", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41038" }, { "name": "CVE-2024-41039", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41039" }, { "name": "CVE-2024-41042", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41042" }, { "name": "CVE-2024-41045", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41045" }, { "name": "CVE-2024-41050", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41050" }, { "name": "CVE-2024-41051", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41051" }, { "name": "CVE-2024-41056", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41056" }, { "name": "CVE-2024-41061", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41061" }, { "name": "CVE-2024-41062", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41062" }, { "name": "CVE-2024-41074", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41074" }, { "name": "CVE-2024-41075", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41075" }, { "name": "CVE-2024-41079", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41079" }, { "name": "CVE-2024-41080", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41080" }, { "name": "CVE-2024-41084", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41084" }, { "name": "CVE-2024-41088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41088" }, { "name": "CVE-2024-41094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41094" }, { "name": "CVE-2024-41098", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41098" }, { "name": "CVE-2024-42064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42064" }, { "name": "CVE-2024-42069", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42069" }, { "name": "CVE-2024-42073", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42073" }, { "name": "CVE-2024-42074", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42074" }, { "name": "CVE-2024-42113", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42113" }, { "name": "CVE-2024-42114", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42114" }, { "name": "CVE-2024-42117", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42117" }, { "name": "CVE-2024-42126", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42126" }, { "name": "CVE-2024-42132", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42132" }, { "name": "CVE-2024-42133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42133" }, { "name": "CVE-2024-42136", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42136" }, { "name": "CVE-2024-42138", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42138" }, { "name": "CVE-2024-42141", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42141" }, { "name": "CVE-2024-42142", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42142" }, { "name": "CVE-2024-42144", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42144" }, { "name": "CVE-2024-42147", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42147" }, { "name": "CVE-2024-42155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42155" }, { "name": "CVE-2024-42156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42156" }, { "name": "CVE-2024-42158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42158" }, { "name": "CVE-2024-42159", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42159" }, { "name": "CVE-2024-42227", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42227" }, { "name": "CVE-2024-42228", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42228" }, { "name": "CVE-2024-42237", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42237" }, { "name": "CVE-2024-42238", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42238" }, { "name": "CVE-2024-42239", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42239" }, { "name": "CVE-2024-42241", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42241" }, { "name": "CVE-2024-42245", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42245" }, { "name": "CVE-2024-42246", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42246" }, { "name": "CVE-2024-42250", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42250" }, { "name": "CVE-2024-42253", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42253" }, { "name": "CVE-2024-42259", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42259" }, { "name": "CVE-2024-42268", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42268" }, { "name": "CVE-2024-42269", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42269" }, { "name": "CVE-2024-42271", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42271" }, { "name": "CVE-2024-42274", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42274" }, { "name": "CVE-2024-42276", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42276" }, { "name": "CVE-2024-42277", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42277" }, { "name": "CVE-2024-42278", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42278" }, { "name": "CVE-2024-42279", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42279" }, { "name": "CVE-2024-42280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42280" }, { "name": "CVE-2024-42281", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42281" }, { "name": "CVE-2024-42283", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42283" }, { "name": "CVE-2024-42284", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42284" }, { "name": "CVE-2024-42285", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42285" }, { "name": "CVE-2024-42286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42286" }, { "name": "CVE-2024-42287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42287" }, { "name": "CVE-2024-42288", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42288" }, { "name": "CVE-2024-42289", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42289" }, { "name": "CVE-2024-42290", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42290" }, { "name": "CVE-2024-42291", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42291" }, { "name": "CVE-2024-42292", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42292" }, { "name": "CVE-2024-42295", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42295" }, { "name": "CVE-2024-42298", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42298" }, { "name": "CVE-2024-42301", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42301" }, { "name": "CVE-2024-42302", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42302" }, { "name": "CVE-2024-42303", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42303" }, { "name": "CVE-2024-42309", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42309" }, { "name": "CVE-2024-42310", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42310" }, { "name": "CVE-2024-42311", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42311" }, { "name": "CVE-2024-42312", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42312" }, { "name": "CVE-2024-42313", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42313" }, { "name": "CVE-2024-42314", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42314" }, { "name": "CVE-2024-42315", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42315" }, { "name": "CVE-2024-42316", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42316" }, { "name": "CVE-2024-42318", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42318" }, { "name": "CVE-2024-42319", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42319" }, { "name": "CVE-2024-42320", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42320" }, { "name": "CVE-2024-42322", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322" }, { "name": "CVE-2024-43817", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43817" }, { "name": "CVE-2024-43818", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43818" }, { "name": "CVE-2024-43819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43819" }, { "name": "CVE-2024-43821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43821" }, { "name": "CVE-2024-43823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43823" }, { "name": "CVE-2024-43824", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43824" }, { "name": "CVE-2024-43825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43825" }, { "name": "CVE-2024-43826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43826" }, { "name": "CVE-2024-43829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43829" }, { "name": "CVE-2024-43830", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43830" }, { "name": "CVE-2024-43831", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43831" }, { "name": "CVE-2024-43833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43833" }, { "name": "CVE-2024-43834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43834" }, { "name": "CVE-2024-43837", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43837" }, { "name": "CVE-2024-43839", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43839" }, { "name": "CVE-2024-43840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43840" }, { "name": "CVE-2024-43841", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43841" }, { "name": "CVE-2024-43842", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43842" }, { "name": "CVE-2024-43846", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43846" }, { "name": "CVE-2024-43847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43847" }, { "name": "CVE-2024-43849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43849" }, { "name": "CVE-2024-43850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43850" }, { "name": "CVE-2024-43853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43853" }, { "name": "CVE-2024-43854", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43854" }, { "name": "CVE-2024-43855", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43855" }, { "name": "CVE-2024-43856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43856" }, { "name": "CVE-2024-43858", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43858" }, { "name": "CVE-2024-43860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43860" }, { "name": "CVE-2024-43861", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43861" }, { "name": "CVE-2024-43863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43863" }, { "name": "CVE-2024-43864", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43864" }, { "name": "CVE-2024-43866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43866" }, { "name": "CVE-2024-43867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43867" }, { "name": "CVE-2024-43871", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43871" }, { "name": "CVE-2024-43873", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43873" }, { "name": "CVE-2024-43875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43875" }, { "name": "CVE-2024-43876", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43876" }, { "name": "CVE-2024-43877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43877" }, { "name": "CVE-2024-43879", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43879" }, { "name": "CVE-2024-43880", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43880" }, { "name": "CVE-2024-43881", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43881" }, { "name": "CVE-2024-43882", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43882" }, { "name": "CVE-2024-43883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43883" }, { "name": "CVE-2024-43884", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43884" }, { "name": "CVE-2024-43889", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43889" }, { "name": "CVE-2024-43892", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43892" }, { "name": "CVE-2024-43893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43893" }, { "name": "CVE-2024-43894", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43894" }, { "name": "CVE-2024-43895", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43895" }, { "name": "CVE-2024-43899", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43899" }, { "name": "CVE-2024-43900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43900" }, { "name": "CVE-2024-43902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43902" }, { "name": "CVE-2024-43904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43904" }, { "name": "CVE-2024-43905", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43905" }, { "name": "CVE-2024-43906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43906" }, { "name": "CVE-2024-43907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43907" }, { "name": "CVE-2024-43908", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43908" }, { "name": "CVE-2024-43909", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43909" }, { "name": "CVE-2024-43911", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43911" }, { "name": "CVE-2024-43912", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43912" }, { "name": "CVE-2024-44931", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44931" }, { "name": "CVE-2024-44938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44938" }, { "name": "CVE-2024-44939", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44939" }, { "name": "CVE-2024-44947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44947" }, { "name": "CVE-2024-41023", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41023" }, { "name": "CVE-2024-41031", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41031" }, { "name": "CVE-2024-42243", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42243" }, { "name": "CVE-2024-42160", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42160" }, { "name": "CVE-2024-45003", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45003" }, { "name": "CVE-2024-43835", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43835" }, { "name": "CVE-2024-43859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43859" }, { "name": "CVE-2024-44940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44940" }, { "name": "CVE-2024-44946", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44946" }, { "name": "CVE-2024-44974", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44974" }, { "name": "CVE-2024-44977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44977" }, { "name": "CVE-2024-44982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44982" }, { "name": "CVE-2024-44983", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44983" }, { "name": "CVE-2024-44985", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44985" }, { "name": "CVE-2024-44986", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44986" }, { "name": "CVE-2024-44987", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44987" }, { "name": "CVE-2024-44988", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44988" }, { "name": "CVE-2024-44989", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44989" }, { "name": "CVE-2024-44990", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44990" }, { "name": "CVE-2024-44991", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44991" }, { "name": "CVE-2024-44995", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44995" }, { "name": "CVE-2024-44998", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44998" }, { "name": "CVE-2024-44999", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44999" }, { "name": "CVE-2024-45000", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45000" }, { "name": "CVE-2024-45002", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45002" }, { "name": "CVE-2024-45006", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45006" }, { "name": "CVE-2024-45007", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45007" }, { "name": "CVE-2024-45008", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45008" }, { "name": "CVE-2024-45009", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45009" }, { "name": "CVE-2024-45010", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45010" }, { "name": "CVE-2024-45011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45011" }, { "name": "CVE-2024-45016", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45016" }, { "name": "CVE-2024-45018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45018" }, { "name": "CVE-2024-45019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45019" }, { "name": "CVE-2024-45021", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45021" }, { "name": "CVE-2024-45022", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45022" }, { "name": "CVE-2024-45025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45025" }, { "name": "CVE-2024-45026", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45026" }, { "name": "CVE-2024-45028", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45028" }, { "name": "CVE-2024-45029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45029" }, { "name": "CVE-2024-46673", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46673" }, { "name": "CVE-2024-46675", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46675" }, { "name": "CVE-2024-46676", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46676" }, { "name": "CVE-2024-46677", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46677" }, { "name": "CVE-2024-46679", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46679" }, { "name": "CVE-2024-46685", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46685" }, { "name": "CVE-2024-46686", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46686" }, { "name": "CVE-2024-46689", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46689" }, { "name": "CVE-2024-46694", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46694" }, { "name": "CVE-2024-46702", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46702" }, { "name": "CVE-2024-46707", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46707" }, { "name": "CVE-2024-46711", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46711" }, { "name": "CVE-2024-46713", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46713" }, { "name": "CVE-2024-46714", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46714" }, { "name": "CVE-2024-46715", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46715" }, { "name": "CVE-2024-46716", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46716" }, { "name": "CVE-2024-46717", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46717" }, { "name": "CVE-2024-46719", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46719" }, { "name": "CVE-2024-46720", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46720" }, { "name": "CVE-2024-46721", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46721" }, { "name": "CVE-2024-46722", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46722" }, { "name": "CVE-2024-46723", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46723" }, { "name": "CVE-2024-46724", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46724" }, { "name": "CVE-2024-46725", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46725" }, { "name": "CVE-2024-46726", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46726" }, { "name": "CVE-2024-46731", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46731" }, { "name": "CVE-2024-46732", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46732" }, { "name": "CVE-2024-46735", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46735" }, { "name": "CVE-2024-46737", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46737" }, { "name": "CVE-2024-46738", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46738" }, { "name": "CVE-2024-46739", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46739" }, { "name": "CVE-2024-46740", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46740" }, { "name": "CVE-2024-46743", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46743" }, { "name": "CVE-2024-46744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46744" }, { "name": "CVE-2024-46745", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46745" }, { "name": "CVE-2024-46746", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46746" }, { "name": "CVE-2024-46747", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46747" }, { "name": "CVE-2024-46750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46750" }, { "name": "CVE-2024-46752", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46752" }, { "name": "CVE-2024-46755", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46755" }, { "name": "CVE-2024-46756", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46756" }, { "name": "CVE-2024-46757", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46757" }, { "name": "CVE-2024-46758", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46758" }, { "name": "CVE-2024-46759", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46759" }, { "name": "CVE-2024-46761", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46761" }, { "name": "CVE-2024-46763", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763" }, { "name": "CVE-2024-46770", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46770" }, { "name": "CVE-2024-46771", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46771" }, { "name": "CVE-2024-46773", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46773" }, { "name": "CVE-2024-46777", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46777" }, { "name": "CVE-2024-46780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46780" }, { "name": "CVE-2024-46781", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46781" }, { "name": "CVE-2024-46782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46782" }, { "name": "CVE-2024-46783", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46783" }, { "name": "CVE-2024-46784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46784" }, { "name": "CVE-2024-46791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46791" }, { "name": "CVE-2024-46794", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46794" }, { "name": "CVE-2024-46795", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46795" }, { "name": "CVE-2024-46798", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46798" }, { "name": "CVE-2024-46800", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46800" }, { "name": "CVE-2024-46802", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46802" }, { "name": "CVE-2024-46804", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46804" }, { "name": "CVE-2024-46805", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46805" }, { "name": "CVE-2024-46807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46807" }, { "name": "CVE-2024-46810", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46810" }, { "name": "CVE-2024-46812", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812" }, { "name": "CVE-2024-46814", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46814" }, { "name": "CVE-2024-46815", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46815" }, { "name": "CVE-2024-46817", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46817" }, { "name": "CVE-2024-46818", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46818" }, { "name": "CVE-2024-46819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46819" }, { "name": "CVE-2024-46821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821" }, { "name": "CVE-2024-46822", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46822" }, { "name": "CVE-2024-46826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46826" }, { "name": "CVE-2024-46828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46828" }, { "name": "CVE-2024-46829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46829" }, { "name": "CVE-2024-46830", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46830" }, { "name": "CVE-2024-46832", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46832" }, { "name": "CVE-2024-46835", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46835" }, { "name": "CVE-2024-46836", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46836" }, { "name": "CVE-2024-46840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46840" }, { "name": "CVE-2024-46844", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46844" }, { "name": "CVE-2024-46846", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46846" }, { "name": "CVE-2024-46848", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46848" }, { "name": "CVE-2024-46849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46849" }, { "name": "CVE-2024-46852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46852" }, { "name": "CVE-2024-46853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46853" }, { "name": "CVE-2024-46854", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46854" }, { "name": "CVE-2024-46855", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46855" }, { "name": "CVE-2024-46857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46857" }, { "name": "CVE-2024-46858", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46858" }, { "name": "CVE-2024-46859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46859" }, { "name": "CVE-2024-42272", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42272" }, { "name": "CVE-2024-42297", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42297" }, { "name": "CVE-2024-41082", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41082" }, { "name": "CVE-2024-42252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42252" }, { "name": "CVE-2024-42265", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42265" }, { "name": "CVE-2024-42294", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42294" }, { "name": "CVE-2024-42304", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42304" }, { "name": "CVE-2024-42305", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42305" }, { "name": "CVE-2024-42306", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42306" }, { "name": "CVE-2024-43828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43828" }, { "name": "CVE-2024-43832", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43832" }, { "name": "CVE-2024-43845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43845" }, { "name": "CVE-2024-43870", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43870" }, { "name": "CVE-2024-43886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43886" }, { "name": "CVE-2024-43890", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43890" }, { "name": "CVE-2024-43914", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43914" }, { "name": "CVE-2024-44935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44935" }, { "name": "CVE-2024-44944", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44944" }, { "name": "CVE-2024-44948", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44948" }, { "name": "CVE-2024-44950", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44950" }, { "name": "CVE-2024-44954", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44954" }, { "name": "CVE-2024-44960", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44960" }, { "name": "CVE-2024-44961", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44961" }, { "name": "CVE-2024-44962", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44962" }, { "name": "CVE-2024-44965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44965" }, { "name": "CVE-2024-44967", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44967" }, { "name": "CVE-2024-44969", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44969" }, { "name": "CVE-2024-44970", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44970" }, { "name": "CVE-2024-44971", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44971" }, { "name": "CVE-2024-44972", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44972" }, { "name": "CVE-2024-44984", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44984" }, { "name": "CVE-2024-45001", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45001" }, { "name": "CVE-2024-45005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45005" }, { "name": "CVE-2024-45012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45012" }, { "name": "CVE-2024-45013", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45013" }, { "name": "CVE-2024-45015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45015" }, { "name": "CVE-2024-45017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45017" }, { "name": "CVE-2024-45020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45020" }, { "name": "CVE-2024-45030", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45030" }, { "name": "CVE-2024-46672", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46672" }, { "name": "CVE-2024-46678", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46678" }, { "name": "CVE-2024-46687", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46687" }, { "name": "CVE-2024-46691", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46691" }, { "name": "CVE-2024-46692", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46692" }, { "name": "CVE-2024-46693", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46693" }, { "name": "CVE-2024-46695", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46695" }, { "name": "CVE-2024-46706", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46706" }, { "name": "CVE-2024-46709", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46709" }, { "name": "CVE-2024-46710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46710" }, { "name": "CVE-2024-46727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46727" }, { "name": "CVE-2024-46728", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46728" }, { "name": "CVE-2024-46729", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46729" }, { "name": "CVE-2024-46730", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46730" }, { "name": "CVE-2024-46741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46741" }, { "name": "CVE-2024-46749", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46749" }, { "name": "CVE-2024-46751", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751" }, { "name": "CVE-2024-46753", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753" }, { "name": "CVE-2024-46760", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46760" }, { "name": "CVE-2024-46767", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46767" }, { "name": "CVE-2024-46772", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46772" }, { "name": "CVE-2024-46774", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774" }, { "name": "CVE-2024-46775", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46775" }, { "name": "CVE-2024-46776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46776" }, { "name": "CVE-2024-46778", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46778" }, { "name": "CVE-2024-46786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46786" }, { "name": "CVE-2024-46787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787" }, { "name": "CVE-2024-46797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46797" }, { "name": "CVE-2024-47668", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47668" }, { "name": "CVE-2023-52888", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52888" }, { "name": "CVE-2023-52918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52918" }, { "name": "CVE-2024-41018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41018" }, { "name": "CVE-2024-41019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41019" }, { "name": "CVE-2024-41021", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41021" }, { "name": "CVE-2024-41029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41029" }, { "name": "CVE-2024-41030", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41030" }, { "name": "CVE-2024-41033", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41033" }, { "name": "CVE-2024-41052", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41052" }, { "name": "CVE-2024-41053", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41053" }, { "name": "CVE-2024-41054", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41054" }, { "name": "CVE-2024-41067", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41067" }, { "name": "CVE-2024-41083", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41083" }, { "name": "CVE-2024-41085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41085" }, { "name": "CVE-2024-41086", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41086" }, { "name": "CVE-2024-42063", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42063" }, { "name": "CVE-2024-42065", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42065" }, { "name": "CVE-2024-42066", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42066" }, { "name": "CVE-2024-42067", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42067" }, { "name": "CVE-2024-42088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42088" }, { "name": "CVE-2024-42091", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42091" }, { "name": "CVE-2024-42100", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42100" }, { "name": "CVE-2024-42103", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42103" }, { "name": "CVE-2024-42108", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42108" }, { "name": "CVE-2024-42111", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42111" }, { "name": "CVE-2024-42112", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42112" }, { "name": "CVE-2024-42118", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42118" }, { "name": "CVE-2024-42128", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42128" }, { "name": "CVE-2024-42129", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42129" }, { "name": "CVE-2024-42135", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42135" }, { "name": "CVE-2024-42146", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42146" }, { "name": "CVE-2024-42149", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42149" }, { "name": "CVE-2024-42150", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42150" }, { "name": "CVE-2024-42151", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42151" }, { "name": "CVE-2024-42231", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42231" }, { "name": "CVE-2024-42234", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42234" }, { "name": "CVE-2024-42235", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42235" }, { "name": "CVE-2024-42248", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42248" }, { "name": "CVE-2024-42251", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42251" }, { "name": "CVE-2024-47659", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47659" }, { "name": "CVE-2024-47663", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47663" }, { "name": "CVE-2024-47667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47667" }, { "name": "CVE-2024-47669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47669" }, { "name": "CVE-2024-42258", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42258" }, { "name": "CVE-2024-43857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43857" }, { "name": "CVE-2024-46754", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46754" }, { "name": "CVE-2024-46766", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46766" }, { "name": "CVE-2024-46803", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46803" }, { "name": "CVE-2024-46806", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46806" }, { "name": "CVE-2024-46809", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46809" }, { "name": "CVE-2024-46811", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46811" }, { "name": "CVE-2024-46813", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46813" }, { "name": "CVE-2024-46816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816" }, { "name": "CVE-2024-46825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46825" }, { "name": "CVE-2024-46827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46827" }, { "name": "CVE-2024-46831", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46831" }, { "name": "CVE-2024-46834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46834" }, { "name": "CVE-2024-46841", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46841" }, { "name": "CVE-2024-46842", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46842" }, { "name": "CVE-2024-46843", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46843" }, { "name": "CVE-2024-46851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46851" }, { "name": "CVE-2024-46860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46860" }, { "name": "CVE-2024-46861", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46861" }, { "name": "CVE-2024-46864", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46864" }, { "name": "CVE-2024-46870", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46870" }, { "name": "CVE-2024-46871", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46871" }, { "name": "CVE-2024-47658", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47658" }, { "name": "CVE-2024-47661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47661" }, { "name": "CVE-2024-42267", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42267" }, { "name": "CVE-2024-42296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42296" }, { "name": "CVE-2024-42299", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42299" }, { "name": "CVE-2024-43869", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43869" }, { "name": "CVE-2024-44934", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44934" }, { "name": "CVE-2024-44958", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44958" }, { "name": "CVE-2024-44966", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44966" }, { "name": "CVE-2024-47660", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47660" }, { "name": "CVE-2024-47665", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47665" }, { "name": "CVE-2024-47662", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47662" }, { "name": "CVE-2024-47664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47664" }, { "name": "CVE-2024-47674", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47674" }, { "name": "CVE-2024-46824", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46824" }, { "name": "CVE-2024-44942", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44942" }, { "name": "CVE-2024-43868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43868" }, { "name": "CVE-2024-42260", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42260" }, { "name": "CVE-2024-42261", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42261" }, { "name": "CVE-2024-42262", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42262" }, { "name": "CVE-2024-42263", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42263" }, { "name": "CVE-2024-42264", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42264" }, { "name": "CVE-2024-42273", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42273" }, { "name": "CVE-2024-42307", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42307" }, { "name": "CVE-2024-42317", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42317" }, { "name": "CVE-2024-42321", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42321" }, { "name": "CVE-2024-43820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43820" }, { "name": "CVE-2024-43827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43827" }, { "name": "CVE-2024-43843", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43843" }, { "name": "CVE-2024-43852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43852" }, { "name": "CVE-2024-43887", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43887" }, { "name": "CVE-2024-43888", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43888" }, { "name": "CVE-2024-43891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43891" }, { "name": "CVE-2024-43910", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43910" }, { "name": "CVE-2024-43913", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43913" }, { "name": "CVE-2024-44937", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44937" }, { "name": "CVE-2024-44941", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44941" }, { "name": "CVE-2024-44943", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44943" }, { "name": "CVE-2024-44953", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44953" }, { "name": "CVE-2024-44956", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44956" }, { "name": "CVE-2024-44957", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44957" }, { "name": "CVE-2024-44959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44959" }, { "name": "CVE-2024-44963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44963" }, { "name": "CVE-2024-44973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44973" }, { "name": "CVE-2024-44975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44975" }, { "name": "CVE-2024-44978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44978" }, { "name": "CVE-2024-44979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44979" }, { "name": "CVE-2024-44980", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44980" }, { "name": "CVE-2024-44993", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44993" }, { "name": "CVE-2024-44996", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44996" }, { "name": "CVE-2024-45027", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45027" }, { "name": "CVE-2024-46680", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46680" }, { "name": "CVE-2024-46681", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46681" }, { "name": "CVE-2024-46683", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46683" }, { "name": "CVE-2024-46697", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46697" }, { "name": "CVE-2024-46698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46698" }, { "name": "CVE-2024-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46701" }, { "name": "CVE-2024-46703", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46703" }, { "name": "CVE-2024-46705", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46705" }, { "name": "CVE-2024-46708", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46708" }, { "name": "CVE-2024-46718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46718" }, { "name": "CVE-2024-46733", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46733" }, { "name": "CVE-2024-46762", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46762" }, { "name": "CVE-2024-46765", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46765" }, { "name": "CVE-2024-46768", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46768" }, { "name": "CVE-2024-46779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46779" }, { "name": "CVE-2024-46785", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46785" }, { "name": "CVE-2024-46788", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46788" }, { "name": "CVE-2024-46792", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46792" }, { "name": "CVE-2024-46793", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46793" }, { "name": "CVE-2024-46808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46808" }, { "name": "CVE-2024-46823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46823" }, { "name": "CVE-2024-46838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46838" }, { "name": "CVE-2024-46845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46845" }, { "name": "CVE-2024-46847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46847" }, { "name": "CVE-2024-46850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46850" }, { "name": "CVE-2024-46866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46866" }, { "name": "CVE-2024-46867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46867" }, { "name": "CVE-2024-46868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46868" }, { "name": "CVE-2024-47666", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47666" }, { "name": "CVE-2024-47683", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47683" }, { "name": "CVE-2024-49984", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49984" } ], "initial_release_date": "2024-12-13T00:00:00", "last_revision_date": "2024-12-13T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-1080", "revisions": [ { "description": "Version initiale", "revision_date": "2024-12-13T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu", "vendor_advisories": [ { "published_at": "2024-12-09", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7144-1", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "published_at": "2024-12-12", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7159-1", "url": "https://ubuntu.com/security/notices/USN-7159-1" }, { "published_at": "2024-12-12", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7155-1", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "published_at": "2024-12-12", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7154-1", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "published_at": "2024-12-10", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7148-1", "url": "https://ubuntu.com/security/notices/USN-7148-1" }, { "published_at": "2024-12-12", "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7156-1", "url": "https://ubuntu.com/security/notices/USN-7156-1" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.