Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20505 ...
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42472 ...
Plattformen: Slackware -current, Slackware x86_64 -current, Slackware 15.0, Slackware x86_64 15.0 ...
Referenzen: https://access.redhat.com/security/cve/CVE-2024-30261 Following the Red Hat Product Security standards this update is rated as having a security impact of ...
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7592 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088 https://cve.mitre.org/cgi-bin ...
Plattformen: Red Hat Enterprise Linux BaseOS E4S (v.8.4) An update for kpatch-patch-4_18_0-305_120_1 and kpatch-patch-4_18_0-305_138_1 is now available for Red Hat Enterprise Linux 8.4 Update Services ...
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more ...
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. This ...
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43796 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8639 https://cve.mitre.org/cgi-bin ...
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491 ...
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45506 ...