Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.18.2.2024.0910.1
Categoría:openSUSE Local Security Checks
Título:openSUSE Security Advisory (SUSE-SU-2024:0910-1)
Resumen:The remote host is missing an update for the 'the Linux Kernel' package(s) announced via the SUSE-SU-2024:0910-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'the Linux Kernel' package(s) announced via the SUSE-SU-2024:0910-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-25162: Fixed a potential use after free (bsc#1220409).
- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).
- CVE-2021-46924: Fixed fix memory leak in device probe and remove (bsc#1220459)
- CVE-2021-46932: Fixed missing work initialization before device registration (bsc#1220444)
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).
- CVE-2023-52340: Fixed ICMPv6 'Packet Too Big' packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).
- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).
- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
- CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).
- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251).
- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).
- CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).
- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).
- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).
- CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get() failed (bsc#1220350).
- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)
- CVE-2023-52475: Fixed use-after-free in powermate_config_complete (bsc#1220649)
- CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796)
- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
- CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915).
- CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835).
- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).
- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).
- CVE-2024-25744: Fixed Security issue with int 80 interrupt vector (bsc#1217927).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2024-26586: Fixed stack corruption (bsc#1220243).
- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).
- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach (bsc#1220254).
- ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'the Linux Kernel' package(s) on openSUSE Leap 15.5.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2019-25162
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
Common Vulnerability Exposure (CVE) ID: CVE-2021-46923
https://git.kernel.org/stable/c/012e332286e2bb9f6ac77d195f17e74b2963d663
https://git.kernel.org/stable/c/47b5d0a7532d39e42a938f81e3904268145c341d
Common Vulnerability Exposure (CVE) ID: CVE-2021-46924
https://git.kernel.org/stable/c/1b9dadba502234eea7244879b8d5d126bfaf9f0c
https://git.kernel.org/stable/c/1cd4063dbc91cf7965d73a6a3855e2028cd4613b
https://git.kernel.org/stable/c/238920381b8925d070d32d73cd9ce52ab29896fe
https://git.kernel.org/stable/c/38c3e320e7ff46f2dc67bc5045333e63d9f8918d
https://git.kernel.org/stable/c/a1e0080a35a16ce3808f7040fe0c3a8fdb052349
https://git.kernel.org/stable/c/e553265ea56482da5700f56319fda9ff53e7dcb4
Common Vulnerability Exposure (CVE) ID: CVE-2021-46932
https://git.kernel.org/stable/c/292d2ac61fb0d9276a0f7b7ce4f50426f2a1c99f
https://git.kernel.org/stable/c/975774ea7528b489930b76a77ffc4d5379b95ff2
https://git.kernel.org/stable/c/9f329d0d6c91142cf0ad08d23c72dd195db2633c
https://git.kernel.org/stable/c/9f3ccdc3f6ef10084ceb3a47df0961bec6196fd0
https://git.kernel.org/stable/c/a02e1404e27855089d2b0a0acc4652c2ce65fe46
https://git.kernel.org/stable/c/d1962f263a176f493400b8f91bfbf2bfedce951e
https://git.kernel.org/stable/c/d2cb2bf39a6d17ef4bdc0e59c1a35cf5751ad8f4
https://git.kernel.org/stable/c/e79ff8c68acb1eddf709d3ac84716868f2a91012
Common Vulnerability Exposure (CVE) ID: CVE-2023-28746
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
http://www.openwall.com/lists/oss-security/2024/03/12/13
Common Vulnerability Exposure (CVE) ID: CVE-2023-5197
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f15f29fd4779be8a418b66e9d52979bb6d6c2325
https://kernel.dance/f15f29fd4779be8a418b66e9d52979bb6d6c2325
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-52340
Common Vulnerability Exposure (CVE) ID: CVE-2023-52429
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd504bcfec41a503b32054da5472904b404341a4
https://www.spinics.net/lists/dm-devel/msg56625.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-52439
https://git.kernel.org/stable/c/0c9ae0b8605078eafc3bea053cc78791e97ba2e2
https://git.kernel.org/stable/c/17a8519cb359c3b483fb5c7367efa9a8a508bdea
https://git.kernel.org/stable/c/3174e0f7de1ba392dc191625da83df02d695b60c
https://git.kernel.org/stable/c/35f102607054faafe78d2a6994b18d5d9d6e92ad
https://git.kernel.org/stable/c/5cf604ee538ed0c467abe3b4cda5308a6398f0f7
https://git.kernel.org/stable/c/5e0be1229ae199ebb90b33102f74a0f22d152570
https://git.kernel.org/stable/c/913205930da6213305616ac539447702eaa85e41
https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50
Common Vulnerability Exposure (CVE) ID: CVE-2023-52443
https://git.kernel.org/stable/c/0a12db736edbb4933e4274932aeea594b5876fa4
https://git.kernel.org/stable/c/1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf
https://git.kernel.org/stable/c/55a8210c9e7d21ff2644809699765796d4bfb200
https://git.kernel.org/stable/c/5c0392fdafb0a2321311900be83ffa572bef8203
https://git.kernel.org/stable/c/5ff00408e5029d3550ee77f62dc15f1e15c47f87
https://git.kernel.org/stable/c/77ab09b92f16c8439a948d1af489196953dc4a0e
https://git.kernel.org/stable/c/9286ee97aa4803d99185768735011d0d65827c9e
https://git.kernel.org/stable/c/9d4fa5fe2b1d56662afd14915a73b4d0783ffa45
Common Vulnerability Exposure (CVE) ID: CVE-2023-52445
https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795
https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e
https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb
https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c
https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d
https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1
https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08
https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab
Common Vulnerability Exposure (CVE) ID: CVE-2023-52447
https://git.kernel.org/stable/c/37d98fb9c3144c0fddf7f6e99aece9927ac8dce6
https://git.kernel.org/stable/c/62fca83303d608ad4fec3f7428c8685680bb01b0
https://git.kernel.org/stable/c/876673364161da50eed6b472d746ef88242b2368
https://git.kernel.org/stable/c/90c445799fd1dc214d7c6279c144e33a35e29ef2
https://git.kernel.org/stable/c/bfd9b20c4862f41d4590fde11d70a5eeae53dcc5
https://git.kernel.org/stable/c/f91cd728b10c51f6d4a39957ccd56d1e802fc8ee
Common Vulnerability Exposure (CVE) ID: CVE-2023-52448
https://git.kernel.org/stable/c/067a7c48c2c70f05f9460d6f0e8423e234729f05
https://git.kernel.org/stable/c/5c28478af371a1c3fdb570ca67f110e1ae60fc37
https://git.kernel.org/stable/c/8877243beafa7c6bfc42022cbfdf9e39b25bd4fa
https://git.kernel.org/stable/c/c323efd620c741168c8e0cc6fc0be04ab57e331a
https://git.kernel.org/stable/c/d69d7804cf9e2ba171a27e5f98bc266f13d0414a
https://git.kernel.org/stable/c/ee0586d73cbaf0e7058bc640d62a9daf2dfa9178
https://git.kernel.org/stable/c/efc8ef87ab9185a23d5676f2f7d986022d91bcde
Common Vulnerability Exposure (CVE) ID: CVE-2023-52449
https://git.kernel.org/stable/c/001a3f59d8c914ef8273461d4bf495df384cc5f8
https://git.kernel.org/stable/c/1bf4fe14e97cda621522eb2f28b0a4e87c5b0745
https://git.kernel.org/stable/c/5389407bba1eab1266c6d83e226fb0840cb98dd5
https://git.kernel.org/stable/c/a43bdc376deab5fff1ceb93dca55bcab8dbdc1d6
https://git.kernel.org/stable/c/aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022
https://git.kernel.org/stable/c/b36aaa64d58aaa2f2cbc8275e89bae76a2b6c3dc
https://git.kernel.org/stable/c/cfd7c9d260dc0a3baaea05a122a19ab91e193c65
https://git.kernel.org/stable/c/d8ac2537763b54d278b80b2b080e1652523c7d4c
Common Vulnerability Exposure (CVE) ID: CVE-2023-52451
https://git.kernel.org/stable/c/026fd977dc50ff4a5e09bfb0603557f104d3f3a0
https://git.kernel.org/stable/c/708a4b59baad96c4718dc0bd3a3427d3ab22fedc
https://git.kernel.org/stable/c/999a27b3ce9a69d54ccd5db000ec3a447bc43e6d
https://git.kernel.org/stable/c/9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7
https://git.kernel.org/stable/c/b582aa1f66411d4adcc1aa55b8c575683fb4687e
https://git.kernel.org/stable/c/bb79613a9a704469ddb8d6c6029d532a5cea384c
https://git.kernel.org/stable/c/bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5
https://git.kernel.org/stable/c/df16afba2378d985359812c865a15c05c70a967e
Common Vulnerability Exposure (CVE) ID: CVE-2023-52452
https://git.kernel.org/stable/c/0954982db8283016bf38e9db2da5adf47a102e19
https://git.kernel.org/stable/c/6b4a64bafd107e521c01eec3453ce94a3fb38529
https://git.kernel.org/stable/c/fbcf372c8eda2290470268e0afb5ab5d5f5d5fde
Common Vulnerability Exposure (CVE) ID: CVE-2023-52456
https://git.kernel.org/stable/c/63ee7be01a3f7d28b1ea8b8d7944f12bb7b0ed06
https://git.kernel.org/stable/c/6e04a9d30509fb53ba6df5d655ed61d607a7cfda
https://git.kernel.org/stable/c/763cd68746317b5d746dc2649a3295c1efb41181
https://git.kernel.org/stable/c/78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0
https://git.kernel.org/stable/c/9a662d06c22ddfa371958c2071dc350436be802b
https://git.kernel.org/stable/c/ff168d4fdb0e1ba35fb413a749b3d6cce918ec19
Common Vulnerability Exposure (CVE) ID: CVE-2023-52457
https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690
https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b
https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee
https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e
https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93
https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0
https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494
Common Vulnerability Exposure (CVE) ID: CVE-2023-52463
https://git.kernel.org/stable/c/0049fe7e4a85849bdd778cdb72e51a791ff3d737
https://git.kernel.org/stable/c/0e8d2444168dd519fea501599d150e62718ed2fe
https://git.kernel.org/stable/c/2aa141f8bc580f8f9811dfe4e0e6009812b73826
https://git.kernel.org/stable/c/94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8
https://git.kernel.org/stable/c/d4a714873db0866cc471521114eeac4a5072d548
https://git.kernel.org/stable/c/d4a9aa7db574a0da64307729cc031fb68597aa8b
Common Vulnerability Exposure (CVE) ID: CVE-2023-52464
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
Common Vulnerability Exposure (CVE) ID: CVE-2023-52475
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
Common Vulnerability Exposure (CVE) ID: CVE-2023-52478
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
Common Vulnerability Exposure (CVE) ID: CVE-2023-6817
http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a
https://kernel.dance/317eb9685095678f2c9f5a8189de698c5354316a
http://www.openwall.com/lists/oss-security/2023/12/22/6
http://www.openwall.com/lists/oss-security/2023/12/22/13
Common Vulnerability Exposure (CVE) ID: CVE-2024-0607
RHBZ#2258635
https://bugzilla.redhat.com/show_bug.cgi?id=2258635
https://access.redhat.com/security/cve/CVE-2024-0607
https://github.com/torvalds/linux/commit/c301f0981fdd3fd1ffac6836b423c4d7a8e0eb63
Common Vulnerability Exposure (CVE) ID: CVE-2024-1151
RHBZ#2262241
https://bugzilla.redhat.com/show_bug.cgi?id=2262241
https://access.redhat.com/security/cve/CVE-2024-1151
https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/
Common Vulnerability Exposure (CVE) ID: CVE-2024-23849
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LBVHM4LGMFIHBN4UBESYRFMYX3WUICV5/
https://bugzilla.suse.com/show_bug.cgi?id=1219127
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=13e788deb7348cc88df34bed736c3b3b9927ea52
https://lore.kernel.org/netdev/1705715319-19199-1-git-send-email-sharath.srinivasan@oracle.com/
https://lore.kernel.org/netdev/CALGdzuoVdq-wtQ4Az9iottBqC5cv9ZhcE5q8N7LfYFvkRsOVcw@mail.gmail.com
Common Vulnerability Exposure (CVE) ID: CVE-2024-23850
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://lore.kernel.org/all/6a80cb4b32af89787dadee728310e5e2ca85343f.1705741883.git.wqu@suse.com/
https://lore.kernel.org/lkml/CALGdzuo6awWdau3X=8XK547x2vX_-VoFmH1aPsqosRTQ5WzJVA@mail.gmail.com/
Common Vulnerability Exposure (CVE) ID: CVE-2024-23851
https://www.spinics.net/lists/dm-devel/msg56574.html
https://www.spinics.net/lists/dm-devel/msg56694.html
Common Vulnerability Exposure (CVE) ID: CVE-2024-25744
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30
Common Vulnerability Exposure (CVE) ID: CVE-2024-26585
https://git.kernel.org/stable/c/196f198ca6fce04ba6ce262f5a0e4d567d7d219d
https://git.kernel.org/stable/c/6db22d6c7a6dc914b12c0469b94eb639b6a8a146
https://git.kernel.org/stable/c/e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb
https://git.kernel.org/stable/c/e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57
Common Vulnerability Exposure (CVE) ID: CVE-2024-26586
https://git.kernel.org/stable/c/2f5e1565740490706332c06f36211d4ce0f88e62
https://git.kernel.org/stable/c/348112522a35527c5bcba933b9fefb40a4f44f15
https://git.kernel.org/stable/c/483ae90d8f976f8339cf81066312e1329f2d3706
https://git.kernel.org/stable/c/56750ea5d15426b5f307554e7699e8b5f76c3182
https://git.kernel.org/stable/c/6fd24675188d354b1cad47462969afa2ab09d819
https://git.kernel.org/stable/c/a361c2c1da5dbb13ca67601cf961ab3ad68af383
Common Vulnerability Exposure (CVE) ID: CVE-2024-26589
https://git.kernel.org/stable/c/1b500d5d6cecf98dd6ca88bc9e7ae1783c83e6d3
https://git.kernel.org/stable/c/22c7fa171a02d310e3a3f6ed46a698ca8a0060ed
https://git.kernel.org/stable/c/29ffa63f21bcdcef3e36b03cccf9d0cd031f6ab0
https://git.kernel.org/stable/c/4108b86e324da42f7ed425bd71632fd844300dc8
https://git.kernel.org/stable/c/e8d3872b617c21100c5ee4f64e513997a68c2e3d
Common Vulnerability Exposure (CVE) ID: CVE-2024-26591
https://git.kernel.org/stable/c/50ae82f080cf87e84828f066c31723b781d68f5b
https://git.kernel.org/stable/c/6cc9c0af0aa06f781fa515a1734b1a4239dfd2c0
https://git.kernel.org/stable/c/715d82ba636cb3629a6e18a33bb9dbe53f9936ee
https://git.kernel.org/stable/c/8c8bcd45e9b10eef12321f08d2e5be33d615509c
https://git.kernel.org/stable/c/a7b98aa10f895e2569403896f2d19b73b6c95653
Common Vulnerability Exposure (CVE) ID: CVE-2024-26593
https://git.kernel.org/stable/c/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a
https://git.kernel.org/stable/c/491528935c9c48bf341d8b40eabc6c4fc5df6f2c
https://git.kernel.org/stable/c/609c7c1cc976e740d0fed4dbeec688b3ecb5dce2
https://git.kernel.org/stable/c/6be99c51829b24c914cef5bff6164877178e84d9
https://git.kernel.org/stable/c/7a14b8a477b88607d157c24aeb23e7389ec3319f
https://git.kernel.org/stable/c/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21
https://git.kernel.org/stable/c/d074d5ff5ae77b18300e5079c6bda6342a4d44b7
Common Vulnerability Exposure (CVE) ID: CVE-2024-26595
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
Common Vulnerability Exposure (CVE) ID: CVE-2024-26598
https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4
https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1
https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f
https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703
https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88
https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6
https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80
Common Vulnerability Exposure (CVE) ID: CVE-2024-26602
https://git.kernel.org/stable/c/2441a64070b85c14eecc3728cc87e883f953f265
https://git.kernel.org/stable/c/24ec7504a08a67247fbe798d1de995208a8c128a
https://git.kernel.org/stable/c/3cd139875e9a7688b3fc715264032620812a5fa3
https://git.kernel.org/stable/c/50fb4e17df319bb33be6f14e2a856950c1577dee
https://git.kernel.org/stable/c/944d5fe50f3f03daacfea16300e656a1691c4a23
https://git.kernel.org/stable/c/b6a2a9cbb67545c825ec95f06adb7ff300a2ad71
https://git.kernel.org/stable/c/c5b2063c65d05e79fad8029324581d86cfba7eea
https://git.kernel.org/stable/c/db896bbe4a9c67cee377e5f6a743350d3ae4acf6
Common Vulnerability Exposure (CVE) ID: CVE-2024-26603
https://git.kernel.org/stable/c/627339cccdc9166792ecf96bc3c9f711a60ce996
https://git.kernel.org/stable/c/627e28cbb65564e55008315d9e02fbb90478beda
https://git.kernel.org/stable/c/8bd3eee7720c14b59a206bd05b98d7586bccf99a
https://git.kernel.org/stable/c/b2479ab426cef7ab79a13005650eff956223ced2
https://git.kernel.org/stable/c/d877550eaf2dc9090d782864c96939397a3c6835
Common Vulnerability Exposure (CVE) ID: CVE-2024-26622
https://git.kernel.org/stable/c/2caa605079488da9601099fbda460cfc1702839f
https://git.kernel.org/stable/c/2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815
https://git.kernel.org/stable/c/3bfe04c1273d30b866f4c7c238331ed3b08e5824
https://git.kernel.org/stable/c/6edefe1b6c29a9932f558a898968a9fcbeec5711
https://git.kernel.org/stable/c/7d930a4da17958f869ef679ee0e4a8729337affc
https://git.kernel.org/stable/c/a23ac1788e2c828c097119e9a3178f0b7e503fee
CopyrightCopyright (C) 2025 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.