alsa-2024:5101
Vulnerability from osv_almalinux
Published
2024-08-08 00:00
Modified
2024-08-08 19:03
Summary
Important: kernel security update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451)
  • kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)
  • kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939)
  • kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622)
  • kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669)
  • kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802)
  • kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843)
  • kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878)
  • kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)
  • kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653)
  • kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823)
  • kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (CVE-2023-52658)
  • kernel: ext4: fix corruption during on-line resize (CVE-2024-35807)
  • kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801)
  • kernel: dyndbg: fix old BUG_ON in >control parser (CVE-2024-35947)
  • kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893)
  • kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876)
  • kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864)
  • kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845)
  • (CVE-2023-28746)
  • (CVE-2023-52847)
  • (CVE-2021-47548)
  • (CVE-2024-36921)
  • (CVE-2024-26921)
  • (CVE-2021-47579)
  • (CVE-2024-36927)
  • (CVE-2024-39276)
  • (CVE-2024-33621)
  • (CVE-2024-27010)
  • (CVE-2024-26960)
  • (CVE-2024-38596)
  • (CVE-2022-48743)
  • (CVE-2024-26733)
  • (CVE-2024-26586)
  • (CVE-2024-26698)
  • (CVE-2023-52619)

Bug Fix(es):

  • AlmaLinux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:AlmaLinux-17678)
  • [AWS][8.9]There are call traces found when booting debug-kernel for Amazon EC2 r8g.metal-24xl instance (JIRA:AlmaLinux-23841)
  • [almalinux8] gfs2: Fix glock shrinker (JIRA:AlmaLinux-32941)
  • lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:AlmaLinux-33437)
  • [Hyper-V][AlmaLinux-8.10.z] Update hv_netvsc driver to TOT (JIRA:AlmaLinux-39074)
  • Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:AlmaLinux-40167)
  • blk-cgroup: Properly propagate the iostat update up the hierarchy [almalinux-8.10.z] (JIRA:AlmaLinux-40939)
  • (JIRA:AlmaLinux-31798)
  • (JIRA:AlmaLinux-10263)
  • (JIRA:AlmaLinux-40901)
  • (JIRA:AlmaLinux-43547)
  • (JIRA:AlmaLinux-34876)

Enhancement(s):

  • [RFE] Add module parameters 'soft_reboot_cmd' and 'soft_active_on_boot' for customizing softdog configuration (JIRA:AlmaLinux-19723)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.

References
https://access.redhat.com/errata/RHSA-2024:5101 ADVISORY
https://access.redhat.com/security/cve/CVE-2021-46939 REPORT
https://access.redhat.com/security/cve/CVE-2021-47018 REPORT
https://access.redhat.com/security/cve/CVE-2021-47257 REPORT
https://access.redhat.com/security/cve/CVE-2021-47284 REPORT
https://access.redhat.com/security/cve/CVE-2021-47304 REPORT
https://access.redhat.com/security/cve/CVE-2021-47373 REPORT
https://access.redhat.com/security/cve/CVE-2021-47408 REPORT
https://access.redhat.com/security/cve/CVE-2021-47461 REPORT
https://access.redhat.com/security/cve/CVE-2021-47468 REPORT
https://access.redhat.com/security/cve/CVE-2021-47491 REPORT
https://access.redhat.com/security/cve/CVE-2021-47548 REPORT
https://access.redhat.com/security/cve/CVE-2021-47579 REPORT
https://access.redhat.com/security/cve/CVE-2021-47624 REPORT
https://access.redhat.com/security/cve/CVE-2022-48632 REPORT
https://access.redhat.com/security/cve/CVE-2022-48743 REPORT
https://access.redhat.com/security/cve/CVE-2022-48747 REPORT
https://access.redhat.com/security/cve/CVE-2022-48757 REPORT
https://access.redhat.com/security/cve/CVE-2023-28746 REPORT
https://access.redhat.com/security/cve/CVE-2023-52451 REPORT
https://access.redhat.com/security/cve/CVE-2023-52463 REPORT
https://access.redhat.com/security/cve/CVE-2023-52469 REPORT
https://access.redhat.com/security/cve/CVE-2023-52471 REPORT
https://access.redhat.com/security/cve/CVE-2023-52486 REPORT
https://access.redhat.com/security/cve/CVE-2023-52530 REPORT
https://access.redhat.com/security/cve/CVE-2023-52619 REPORT
https://access.redhat.com/security/cve/CVE-2023-52622 REPORT
https://access.redhat.com/security/cve/CVE-2023-52623 REPORT
https://access.redhat.com/security/cve/CVE-2023-52648 REPORT
https://access.redhat.com/security/cve/CVE-2023-52653 REPORT
https://access.redhat.com/security/cve/CVE-2023-52658 REPORT
https://access.redhat.com/security/cve/CVE-2023-52662 REPORT
https://access.redhat.com/security/cve/CVE-2023-52679 REPORT
https://access.redhat.com/security/cve/CVE-2023-52707 REPORT
https://access.redhat.com/security/cve/CVE-2023-52730 REPORT
https://access.redhat.com/security/cve/CVE-2023-52756 REPORT
https://access.redhat.com/security/cve/CVE-2023-52762 REPORT
https://access.redhat.com/security/cve/CVE-2023-52764 REPORT
https://access.redhat.com/security/cve/CVE-2023-52775 REPORT
https://access.redhat.com/security/cve/CVE-2023-52777 REPORT
https://access.redhat.com/security/cve/CVE-2023-52784 REPORT
https://access.redhat.com/security/cve/CVE-2023-52791 REPORT
https://access.redhat.com/security/cve/CVE-2023-52796 REPORT
https://access.redhat.com/security/cve/CVE-2023-52803 REPORT
https://access.redhat.com/security/cve/CVE-2023-52811 REPORT
https://access.redhat.com/security/cve/CVE-2023-52832 REPORT
https://access.redhat.com/security/cve/CVE-2023-52834 REPORT
https://access.redhat.com/security/cve/CVE-2023-52845 REPORT
https://access.redhat.com/security/cve/CVE-2023-52847 REPORT
https://access.redhat.com/security/cve/CVE-2023-52864 REPORT
https://access.redhat.com/security/cve/CVE-2024-21823 REPORT
https://access.redhat.com/security/cve/CVE-2024-2201 REPORT
https://access.redhat.com/security/cve/CVE-2024-25739 REPORT
https://access.redhat.com/security/cve/CVE-2024-26586 REPORT
https://access.redhat.com/security/cve/CVE-2024-26614 REPORT
https://access.redhat.com/security/cve/CVE-2024-26640 REPORT
https://access.redhat.com/security/cve/CVE-2024-26660 REPORT
https://access.redhat.com/security/cve/CVE-2024-26669 REPORT
https://access.redhat.com/security/cve/CVE-2024-26686 REPORT
https://access.redhat.com/security/cve/CVE-2024-26698 REPORT
https://access.redhat.com/security/cve/CVE-2024-26704 REPORT
https://access.redhat.com/security/cve/CVE-2024-26733 REPORT
https://access.redhat.com/security/cve/CVE-2024-26740 REPORT
https://access.redhat.com/security/cve/CVE-2024-26772 REPORT
https://access.redhat.com/security/cve/CVE-2024-26773 REPORT
https://access.redhat.com/security/cve/CVE-2024-26802 REPORT
https://access.redhat.com/security/cve/CVE-2024-26810 REPORT
https://access.redhat.com/security/cve/CVE-2024-26837 REPORT
https://access.redhat.com/security/cve/CVE-2024-26840 REPORT
https://access.redhat.com/security/cve/CVE-2024-26843 REPORT
https://access.redhat.com/security/cve/CVE-2024-26852 REPORT
https://access.redhat.com/security/cve/CVE-2024-26853 REPORT
https://access.redhat.com/security/cve/CVE-2024-26870 REPORT
https://access.redhat.com/security/cve/CVE-2024-26878 REPORT
https://access.redhat.com/security/cve/CVE-2024-26908 REPORT
https://access.redhat.com/security/cve/CVE-2024-26921 REPORT
https://access.redhat.com/security/cve/CVE-2024-26925 REPORT
https://access.redhat.com/security/cve/CVE-2024-26940 REPORT
https://access.redhat.com/security/cve/CVE-2024-26958 REPORT
https://access.redhat.com/security/cve/CVE-2024-26960 REPORT
https://access.redhat.com/security/cve/CVE-2024-26961 REPORT
https://access.redhat.com/security/cve/CVE-2024-27010 REPORT
https://access.redhat.com/security/cve/CVE-2024-27011 REPORT
https://access.redhat.com/security/cve/CVE-2024-27019 REPORT
https://access.redhat.com/security/cve/CVE-2024-27020 REPORT
https://access.redhat.com/security/cve/CVE-2024-27025 REPORT
https://access.redhat.com/security/cve/CVE-2024-27065 REPORT
https://access.redhat.com/security/cve/CVE-2024-27388 REPORT
https://access.redhat.com/security/cve/CVE-2024-27395 REPORT
https://access.redhat.com/security/cve/CVE-2024-27434 REPORT
https://access.redhat.com/security/cve/CVE-2024-31076 REPORT
https://access.redhat.com/security/cve/CVE-2024-33621 REPORT
https://access.redhat.com/security/cve/CVE-2024-35790 REPORT
https://access.redhat.com/security/cve/CVE-2024-35801 REPORT
https://access.redhat.com/security/cve/CVE-2024-35807 REPORT
https://access.redhat.com/security/cve/CVE-2024-35810 REPORT
https://access.redhat.com/security/cve/CVE-2024-35814 REPORT
https://access.redhat.com/security/cve/CVE-2024-35823 REPORT
https://access.redhat.com/security/cve/CVE-2024-35824 REPORT
https://access.redhat.com/security/cve/CVE-2024-35847 REPORT
https://access.redhat.com/security/cve/CVE-2024-35876 REPORT
https://access.redhat.com/security/cve/CVE-2024-35893 REPORT
https://access.redhat.com/security/cve/CVE-2024-35896 REPORT
https://access.redhat.com/security/cve/CVE-2024-35897 REPORT
https://access.redhat.com/security/cve/CVE-2024-35899 REPORT
https://access.redhat.com/security/cve/CVE-2024-35900 REPORT
https://access.redhat.com/security/cve/CVE-2024-35910 REPORT
https://access.redhat.com/security/cve/CVE-2024-35912 REPORT
https://access.redhat.com/security/cve/CVE-2024-35924 REPORT
https://access.redhat.com/security/cve/CVE-2024-35925 REPORT
https://access.redhat.com/security/cve/CVE-2024-35930 REPORT
https://access.redhat.com/security/cve/CVE-2024-35937 REPORT
https://access.redhat.com/security/cve/CVE-2024-35938 REPORT
https://access.redhat.com/security/cve/CVE-2024-35946 REPORT
https://access.redhat.com/security/cve/CVE-2024-35947 REPORT
https://access.redhat.com/security/cve/CVE-2024-35952 REPORT
https://access.redhat.com/security/cve/CVE-2024-36000 REPORT
https://access.redhat.com/security/cve/CVE-2024-36005 REPORT
https://access.redhat.com/security/cve/CVE-2024-36006 REPORT
https://access.redhat.com/security/cve/CVE-2024-36010 REPORT
https://access.redhat.com/security/cve/CVE-2024-36016 REPORT
https://access.redhat.com/security/cve/CVE-2024-36017 REPORT
https://access.redhat.com/security/cve/CVE-2024-36020 REPORT
https://access.redhat.com/security/cve/CVE-2024-36025 REPORT
https://access.redhat.com/security/cve/CVE-2024-36270 REPORT
https://access.redhat.com/security/cve/CVE-2024-36286 REPORT
https://access.redhat.com/security/cve/CVE-2024-36489 REPORT
https://access.redhat.com/security/cve/CVE-2024-36886 REPORT
https://access.redhat.com/security/cve/CVE-2024-36889 REPORT
https://access.redhat.com/security/cve/CVE-2024-36896 REPORT
https://access.redhat.com/security/cve/CVE-2024-36904 REPORT
https://access.redhat.com/security/cve/CVE-2024-36905 REPORT
https://access.redhat.com/security/cve/CVE-2024-36917 REPORT
https://access.redhat.com/security/cve/CVE-2024-36921 REPORT
https://access.redhat.com/security/cve/CVE-2024-36927 REPORT
https://access.redhat.com/security/cve/CVE-2024-36929 REPORT
https://access.redhat.com/security/cve/CVE-2024-36933 REPORT
https://access.redhat.com/security/cve/CVE-2024-36940 REPORT
https://access.redhat.com/security/cve/CVE-2024-36941 REPORT
https://access.redhat.com/security/cve/CVE-2024-36945 REPORT
https://access.redhat.com/security/cve/CVE-2024-36950 REPORT
https://access.redhat.com/security/cve/CVE-2024-36954 REPORT
https://access.redhat.com/security/cve/CVE-2024-36960 REPORT
https://access.redhat.com/security/cve/CVE-2024-36971 REPORT
https://access.redhat.com/security/cve/CVE-2024-36978 REPORT
https://access.redhat.com/security/cve/CVE-2024-36979 REPORT
https://access.redhat.com/security/cve/CVE-2024-38538 REPORT
https://access.redhat.com/security/cve/CVE-2024-38555 REPORT
https://access.redhat.com/security/cve/CVE-2024-38573 REPORT
https://access.redhat.com/security/cve/CVE-2024-38575 REPORT
https://access.redhat.com/security/cve/CVE-2024-38596 REPORT
https://access.redhat.com/security/cve/CVE-2024-38598 REPORT
https://access.redhat.com/security/cve/CVE-2024-38615 REPORT
https://access.redhat.com/security/cve/CVE-2024-38627 REPORT
https://access.redhat.com/security/cve/CVE-2024-39276 REPORT
https://access.redhat.com/security/cve/CVE-2024-39472 REPORT
https://access.redhat.com/security/cve/CVE-2024-39476 REPORT
https://access.redhat.com/security/cve/CVE-2024-39487 REPORT
https://access.redhat.com/security/cve/CVE-2024-39502 REPORT
https://access.redhat.com/security/cve/CVE-2024-40927 REPORT
https://access.redhat.com/security/cve/CVE-2024-40974 REPORT
https://bugzilla.redhat.com/2263879 REPORT
https://bugzilla.redhat.com/2265645 REPORT
https://bugzilla.redhat.com/2265650 REPORT
https://bugzilla.redhat.com/2265797 REPORT
https://bugzilla.redhat.com/2266341 REPORT
https://bugzilla.redhat.com/2266347 REPORT
https://bugzilla.redhat.com/2266497 REPORT
https://bugzilla.redhat.com/2266594 REPORT
https://bugzilla.redhat.com/2267787 REPORT
https://bugzilla.redhat.com/2268118 REPORT
https://bugzilla.redhat.com/2269070 REPORT
https://bugzilla.redhat.com/2269211 REPORT
https://bugzilla.redhat.com/2270084 REPORT
https://bugzilla.redhat.com/2270100 REPORT
https://bugzilla.redhat.com/2270700 REPORT
https://bugzilla.redhat.com/2271686 REPORT
https://bugzilla.redhat.com/2271688 REPORT
https://bugzilla.redhat.com/2272782 REPORT
https://bugzilla.redhat.com/2272795 REPORT
https://bugzilla.redhat.com/2273109 REPORT
https://bugzilla.redhat.com/2273117 REPORT
https://bugzilla.redhat.com/2273174 REPORT
https://bugzilla.redhat.com/2273236 REPORT
https://bugzilla.redhat.com/2273242 REPORT
https://bugzilla.redhat.com/2273247 REPORT
https://bugzilla.redhat.com/2273268 REPORT
https://bugzilla.redhat.com/2273427 REPORT
https://bugzilla.redhat.com/2273654 REPORT
https://bugzilla.redhat.com/2275565 REPORT
https://bugzilla.redhat.com/2275573 REPORT
https://bugzilla.redhat.com/2275580 REPORT
https://bugzilla.redhat.com/2275694 REPORT
https://bugzilla.redhat.com/2275711 REPORT
https://bugzilla.redhat.com/2275744 REPORT
https://bugzilla.redhat.com/2275748 REPORT
https://bugzilla.redhat.com/2275761 REPORT
https://bugzilla.redhat.com/2275928 REPORT
https://bugzilla.redhat.com/2277166 REPORT
https://bugzilla.redhat.com/2277238 REPORT
https://bugzilla.redhat.com/2277840 REPORT
https://bugzilla.redhat.com/2278176 REPORT
https://bugzilla.redhat.com/2278178 REPORT
https://bugzilla.redhat.com/2278182 REPORT
https://bugzilla.redhat.com/2278218 REPORT
https://bugzilla.redhat.com/2278256 REPORT
https://bugzilla.redhat.com/2278258 REPORT
https://bugzilla.redhat.com/2278277 REPORT
https://bugzilla.redhat.com/2278279 REPORT
https://bugzilla.redhat.com/2278380 REPORT
https://bugzilla.redhat.com/2278484 REPORT
https://bugzilla.redhat.com/2278515 REPORT
https://bugzilla.redhat.com/2278535 REPORT
https://bugzilla.redhat.com/2278539 REPORT
https://bugzilla.redhat.com/2278989 REPORT
https://bugzilla.redhat.com/2280440 REPORT
https://bugzilla.redhat.com/2281054 REPORT
https://bugzilla.redhat.com/2281133 REPORT
https://bugzilla.redhat.com/2281149 REPORT
https://bugzilla.redhat.com/2281189 REPORT
https://bugzilla.redhat.com/2281190 REPORT
https://bugzilla.redhat.com/2281207 REPORT
https://bugzilla.redhat.com/2281215 REPORT
https://bugzilla.redhat.com/2281221 REPORT
https://bugzilla.redhat.com/2281235 REPORT
https://bugzilla.redhat.com/2281268 REPORT
https://bugzilla.redhat.com/2281326 REPORT
https://bugzilla.redhat.com/2281360 REPORT
https://bugzilla.redhat.com/2281510 REPORT
https://bugzilla.redhat.com/2281519 REPORT
https://bugzilla.redhat.com/2281636 REPORT
https://bugzilla.redhat.com/2281641 REPORT
https://bugzilla.redhat.com/2281664 REPORT
https://bugzilla.redhat.com/2281667 REPORT
https://bugzilla.redhat.com/2281672 REPORT
https://bugzilla.redhat.com/2281675 REPORT
https://bugzilla.redhat.com/2281682 REPORT
https://bugzilla.redhat.com/2281725 REPORT
https://bugzilla.redhat.com/2281752 REPORT
https://bugzilla.redhat.com/2281758 REPORT
https://bugzilla.redhat.com/2281819 REPORT
https://bugzilla.redhat.com/2281821 REPORT
https://bugzilla.redhat.com/2281833 REPORT
https://bugzilla.redhat.com/2281938 REPORT
https://bugzilla.redhat.com/2281949 REPORT
https://bugzilla.redhat.com/2281968 REPORT
https://bugzilla.redhat.com/2281989 REPORT
https://bugzilla.redhat.com/2282328 REPORT
https://bugzilla.redhat.com/2282373 REPORT
https://bugzilla.redhat.com/2282479 REPORT
https://bugzilla.redhat.com/2282553 REPORT
https://bugzilla.redhat.com/2282615 REPORT
https://bugzilla.redhat.com/2282623 REPORT
https://bugzilla.redhat.com/2282640 REPORT
https://bugzilla.redhat.com/2282642 REPORT
https://bugzilla.redhat.com/2282645 REPORT
https://bugzilla.redhat.com/2282690 REPORT
https://bugzilla.redhat.com/2282717 REPORT
https://bugzilla.redhat.com/2282719 REPORT
https://bugzilla.redhat.com/2282727 REPORT
https://bugzilla.redhat.com/2282742 REPORT
https://bugzilla.redhat.com/2282743 REPORT
https://bugzilla.redhat.com/2282744 REPORT
https://bugzilla.redhat.com/2282759 REPORT
https://bugzilla.redhat.com/2282763 REPORT
https://bugzilla.redhat.com/2282766 REPORT
https://bugzilla.redhat.com/2282772 REPORT
https://bugzilla.redhat.com/2282780 REPORT
https://bugzilla.redhat.com/2282887 REPORT
https://bugzilla.redhat.com/2282896 REPORT
https://bugzilla.redhat.com/2282923 REPORT
https://bugzilla.redhat.com/2282925 REPORT
https://bugzilla.redhat.com/2282950 REPORT
https://bugzilla.redhat.com/2283401 REPORT
https://bugzilla.redhat.com/2283894 REPORT
https://bugzilla.redhat.com/2284400 REPORT
https://bugzilla.redhat.com/2284417 REPORT
https://bugzilla.redhat.com/2284421 REPORT
https://bugzilla.redhat.com/2284465 REPORT
https://bugzilla.redhat.com/2284474 REPORT
https://bugzilla.redhat.com/2284477 REPORT
https://bugzilla.redhat.com/2284488 REPORT
https://bugzilla.redhat.com/2284496 REPORT
https://bugzilla.redhat.com/2284500 REPORT
https://bugzilla.redhat.com/2284513 REPORT
https://bugzilla.redhat.com/2284519 REPORT
https://bugzilla.redhat.com/2284539 REPORT
https://bugzilla.redhat.com/2284541 REPORT
https://bugzilla.redhat.com/2284556 REPORT
https://bugzilla.redhat.com/2284571 REPORT
https://bugzilla.redhat.com/2284590 REPORT
https://bugzilla.redhat.com/2284625 REPORT
https://bugzilla.redhat.com/2290408 REPORT
https://bugzilla.redhat.com/2292331 REPORT
https://bugzilla.redhat.com/2293078 REPORT
https://bugzilla.redhat.com/2293250 REPORT
https://bugzilla.redhat.com/2293276 REPORT
https://bugzilla.redhat.com/2293312 REPORT
https://bugzilla.redhat.com/2293316 REPORT
https://bugzilla.redhat.com/2293348 REPORT
https://bugzilla.redhat.com/2293367 REPORT
https://bugzilla.redhat.com/2293371 REPORT
https://bugzilla.redhat.com/2293383 REPORT
https://bugzilla.redhat.com/2293418 REPORT
https://bugzilla.redhat.com/2293420 REPORT
https://bugzilla.redhat.com/2293444 REPORT
https://bugzilla.redhat.com/2293461 REPORT
https://bugzilla.redhat.com/2293653 REPORT
https://bugzilla.redhat.com/2293657 REPORT
https://bugzilla.redhat.com/2293684 REPORT
https://bugzilla.redhat.com/2293687 REPORT
https://bugzilla.redhat.com/2293700 REPORT
https://bugzilla.redhat.com/2293711 REPORT
https://bugzilla.redhat.com/2294274 REPORT
https://bugzilla.redhat.com/2295914 REPORT
https://bugzilla.redhat.com/2296067 REPORT
https://bugzilla.redhat.com/2297056 REPORT
https://bugzilla.redhat.com/2297474 REPORT
https://bugzilla.redhat.com/2297511 REPORT
https://bugzilla.redhat.com/2297558 REPORT
https://bugzilla.redhat.com/2298108 REPORT
https://errata.almalinux.org/8/ALSA-2024-5101.html ADVISORY

{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "bpftool"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-abi-stablelists"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-cross-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-doc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools-libs-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "python3-perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.16.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451)\n* kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)\n* kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939)\n* kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622)\n* kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669)\n* kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802)\n* kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843)\n* kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878)\n* kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)\n* kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653)\n* kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823)\n* kernel: Revert \u0026#34;net/mlx5: Block entering switchdev mode with ns inconsistency\u0026#34; (CVE-2023-52658)\n* kernel: ext4: fix corruption during on-line resize (CVE-2024-35807)\n* kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801)\n* kernel: dyndbg: fix old BUG_ON in \u0026gt;control parser (CVE-2024-35947)\n* kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893)\n* kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876)\n* kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864)\n* kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845)\n* (CVE-2023-28746)\n* (CVE-2023-52847)\n* (CVE-2021-47548)\n* (CVE-2024-36921)\n* (CVE-2024-26921)\n* (CVE-2021-47579)\n* (CVE-2024-36927)\n* (CVE-2024-39276)\n* (CVE-2024-33621)\n* (CVE-2024-27010)\n* (CVE-2024-26960)\n* (CVE-2024-38596)\n* (CVE-2022-48743)\n* (CVE-2024-26733)\n* (CVE-2024-26586)\n* (CVE-2024-26698)\n* (CVE-2023-52619)\n\nBug Fix(es):\n\n* AlmaLinux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:AlmaLinux-17678)\n* [AWS][8.9]There are call traces found when booting debug-kernel  for Amazon EC2 r8g.metal-24xl instance (JIRA:AlmaLinux-23841)\n* [almalinux8] gfs2: Fix glock shrinker (JIRA:AlmaLinux-32941)\n* lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:AlmaLinux-33437)\n* [Hyper-V][AlmaLinux-8.10.z] Update hv_netvsc driver to TOT (JIRA:AlmaLinux-39074)\n* Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:AlmaLinux-40167)\n* blk-cgroup: Properly propagate the iostat update up the hierarchy [almalinux-8.10.z] (JIRA:AlmaLinux-40939)\n* (JIRA:AlmaLinux-31798)\n* (JIRA:AlmaLinux-10263)\n* (JIRA:AlmaLinux-40901)\n* (JIRA:AlmaLinux-43547)\n* (JIRA:AlmaLinux-34876)\n\nEnhancement(s):\n\n* [RFE] Add module parameters \u0027soft_reboot_cmd\u0027 and \u0027soft_active_on_boot\u0027 for customizing softdog configuration (JIRA:AlmaLinux-19723)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.",
  "id": "ALSA-2024:5101",
  "modified": "2024-08-08T19:03:05Z",
  "published": "2024-08-08T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2024:5101"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-46939"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47018"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47257"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47284"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47304"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47373"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47408"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47461"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47468"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47491"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47548"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47579"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47624"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-48632"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-48743"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-48747"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-48757"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-28746"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52451"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52463"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52469"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52471"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52486"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52530"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52619"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52622"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52623"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52648"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52653"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52658"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52662"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52679"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52707"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52730"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52756"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52762"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52764"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52775"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52777"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52784"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52791"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52796"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52803"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52811"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52832"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52834"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52845"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52847"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52864"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21823"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-2201"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-25739"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26586"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26614"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26640"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26660"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26669"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26686"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26698"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26704"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26733"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26740"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26772"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26773"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26802"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26810"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26837"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26840"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26843"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26852"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26853"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26870"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26878"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26908"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26921"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26925"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26940"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26958"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26960"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26961"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27010"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27011"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27019"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27020"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27025"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27065"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27388"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27395"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27434"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-31076"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-33621"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35790"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35801"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35807"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35810"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35814"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35823"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35824"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35847"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35876"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35893"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35896"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35897"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35899"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35900"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35910"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35912"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35924"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35925"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35930"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35937"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35938"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35946"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35947"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35952"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36000"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36005"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36006"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36010"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36016"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36017"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36020"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36025"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36270"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36286"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36489"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36886"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36889"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36896"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36904"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36905"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36917"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36921"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36927"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36929"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36933"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36940"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36941"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36945"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36950"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36954"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36960"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36971"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36978"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36979"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38538"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38555"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38573"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38575"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38596"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38598"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38615"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38627"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-39276"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-39472"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-39476"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-39487"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-39502"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40927"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40974"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2263879"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265645"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265650"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265797"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2266341"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2266347"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2266497"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2266594"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267787"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2268118"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2269070"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2269211"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2270084"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2270100"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2270700"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2271686"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2271688"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2272782"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2272795"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273109"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273117"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273174"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273236"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273242"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273247"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273268"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273427"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273654"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275565"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275573"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275580"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275694"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275711"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275744"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275748"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275761"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275928"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2277166"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2277238"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2277840"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278176"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278178"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278182"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278218"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278256"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278258"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278277"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278279"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278380"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278484"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278515"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278535"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278539"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278989"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2280440"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281054"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281133"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281149"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281189"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281190"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281207"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281215"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281221"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281235"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281268"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281326"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281360"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281510"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281519"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281636"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281641"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281664"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281667"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281672"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281675"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281682"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281725"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281752"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281758"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281819"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281821"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281833"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281938"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281949"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281968"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281989"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282328"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282373"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282479"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282553"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282615"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282623"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282640"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282642"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282645"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282690"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282717"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282719"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282727"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282742"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282743"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282744"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282759"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282763"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282766"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282772"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282780"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282887"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282896"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282923"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282925"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282950"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2283401"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2283894"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284400"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284417"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284421"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284465"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284474"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284477"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284488"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284496"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284500"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284513"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284519"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284539"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284541"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284556"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284571"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284590"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284625"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2290408"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2292331"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293078"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293250"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293276"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293312"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293316"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293348"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293367"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293371"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293383"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293418"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293420"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293444"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293461"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293653"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293657"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293684"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293687"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293700"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293711"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2294274"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2295914"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2296067"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297056"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297474"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297511"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297558"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2298108"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/8/ALSA-2024-5101.html"
    }
  ],
  "related": [
    "CVE-2023-52451",
    "CVE-2023-52463",
    "CVE-2021-46939",
    "CVE-2023-52622",
    "CVE-2024-26669",
    "CVE-2024-26802",
    "CVE-2024-26843",
    "CVE-2024-26878",
    "CVE-2024-36886",
    "CVE-2023-52653",
    "CVE-2024-21823",
    "CVE-2023-52658",
    "CVE-2024-35807",
    "CVE-2024-35801",
    "CVE-2024-35947",
    "CVE-2024-35893",
    "CVE-2024-35876",
    "CVE-2023-52864",
    "CVE-2023-52845",
    "CVE-2023-28746",
    "CVE-2023-52847",
    "CVE-2021-47548",
    "CVE-2024-36921",
    "CVE-2024-26921",
    "CVE-2021-47579",
    "CVE-2024-36927",
    "CVE-2024-39276",
    "CVE-2024-33621",
    "CVE-2024-27010",
    "CVE-2024-26960",
    "CVE-2024-38596",
    "CVE-2022-48743",
    "CVE-2024-26733",
    "CVE-2024-26586",
    "CVE-2024-26698",
    "CVE-2023-52619"
  ],
  "summary": "Important: kernel security update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…