{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.237.1","kernel-default-kgraft-devel":"4.12.14-122.237.1","kgraft-patch-4_12_14-122_237-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.237.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.237.1","kernel-default-kgraft-devel":"4.12.14-122.237.1","kgraft-patch-4_12_14-122_237-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_63","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_63&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-48853: swiotlb: fix info leak with DMA_FROM_DEVICE (bsc#1228015).\n- CVE-2024-26801: Bluetooth: Avoid potential use-after-free in hci_error_reset (bsc#1222413).\n- CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057).\n- CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044).\n- CVE-2024-27051: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value (bsc#1223769).\n- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).\n- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).\n- CVE-2024-42098: crypto: ecdh - explicitly zeroize private_key (bsc#1228779).\n- CVE-2024-42229: crypto: aead,cipher - zeroize key buffer after use (bsc#1228708).\n- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).\n- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).\n- CVE-2024-46771: can: bcm: Remove proc entry when dev is unregistered (bsc#1230766).\n- CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).\n- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).\n- CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).\n- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930).\n- CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920).\n- CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (bsc#1232251).\n- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).\n- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).\n- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)\n- CVE-2024-49938: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (bsc#1232552).\n- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).\n- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).\n- CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157).\n- CVE-2024-50044: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (bsc#1231904).\n- CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329).\n- CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).\n- CVE-2024-50074: parport: Proper fix for array out-of-bounds access (bsc#1232507).\n- CVE-2024-50095: RDMA/mad: Improve handling of timed out WRs of mad agent (bsc#1232873).\n- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).\n- CVE-2024-50117: drm/amd: Guard against bad data for ATIF ACPI method (bsc#1232897).\n- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).\n- CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).\n- CVE-2024-50148: Bluetooth: bnep: fix wild-memory-access in proto_unregister (bsc#1233063).\n- CVE-2024-50150: usb: typec: altmode should keep reference to parent (bsc#1233051).\n- CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070).\n- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).\n- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).\n- CVE-2024-50183: scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1233130).\n- CVE-2024-50187: drm/vc4: Stop the active perfmon before being destroyed (bsc#1233108).\n- CVE-2024-50195: posix-clock: Fix missing timespec64 check in pc_clock_settime() (bsc#1233103).\n- CVE-2024-50218: ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (bsc#1233191).\n- CVE-2024-50234: wifi: iwlegacy: Clear stale interrupts before resuming device (bsc#1233211).\n- CVE-2024-50236: wifi: ath10k: Fix memory leak in management tx (bsc#1233212).\n- CVE-2024-50237: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (bsc#1233216).\n- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453).\n- CVE-2024-50265: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (bsc#1233454).\n- CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).\n- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).\n- CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).\n- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).\n- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).\n- CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479).\n- CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485).\n- CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490).\n- CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).\n- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).\n- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).\n- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).\n- CVE-2024-53066: nfs: Fix KMSAN warning in decode_getfattr_attrs() (bsc#1233560).\n- CVE-2024-53085: tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 bsc#1233577).\n- CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).\n- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).\n- CVE-2024-53114: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1234072).\n\nThe following non-security bugs were fixed:\n\n- drm/vc4: Warn if some v3d code is run on BCM2711 (bsc#1233108).\n- initramfs: avoid filename buffer overrun (bsc#1232436).\n- kernel-binary: Enable livepatch package only when livepatch is enabled (bsc#1218644).\n- lpfc: size cpu map by last cpu id set (bsc#1157160).\n- net: relax socket state check at accept time (git-fixes).\n- ocfs2: uncache inode which has failed entering the group (bsc#1234087).\n","id":"SUSE-SU-2024:4367-1","modified":"2024-12-17T17:59:49Z","published":"2024-12-17T17:59:49Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221977"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222364"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223044"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223057"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228015"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228779"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230231"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230766"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231184"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231439"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232157"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232159"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232165"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232272"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232329"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232371"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232552"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232873"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232928"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233049"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233057"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233063"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233097"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233103"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233130"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233211"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233212"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233216"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233467"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233468"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233491"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233552"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26801"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26852"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35937"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46771"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46800"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47660"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47701"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49858"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49868"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49921"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49952"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50044"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50055"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50117"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50150"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50167"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50171"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50187"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50194"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50195"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50210"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50218"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50234"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50265"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50267"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50273"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50278"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50279"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50290"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50296"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53061"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53114"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53142"}],"related":["CVE-2021-47162","CVE-2022-48853","CVE-2024-26801","CVE-2024-26852","CVE-2024-26886","CVE-2024-27051","CVE-2024-35937","CVE-2024-36886","CVE-2024-36905","CVE-2024-36954","CVE-2024-42098","CVE-2024-42131","CVE-2024-42229","CVE-2024-44995","CVE-2024-45016","CVE-2024-46771","CVE-2024-46777","CVE-2024-46800","CVE-2024-47660","CVE-2024-47679","CVE-2024-47701","CVE-2024-49858","CVE-2024-49868","CVE-2024-49884","CVE-2024-49921","CVE-2024-49925","CVE-2024-49938","CVE-2024-49945","CVE-2024-49950","CVE-2024-49952","CVE-2024-50044","CVE-2024-50055","CVE-2024-50073","CVE-2024-50074","CVE-2024-50095","CVE-2024-50099","CVE-2024-50115","CVE-2024-50117","CVE-2024-50125","CVE-2024-50135","CVE-2024-50148","CVE-2024-50150","CVE-2024-50154","CVE-2024-50167","CVE-2024-50171","CVE-2024-50179","CVE-2024-50183","CVE-2024-50187","CVE-2024-50194","CVE-2024-50195","CVE-2024-50210","CVE-2024-50218","CVE-2024-50234","CVE-2024-50236","CVE-2024-50237","CVE-2024-50264","CVE-2024-50265","CVE-2024-50267","CVE-2024-50273","CVE-2024-50278","CVE-2024-50279","CVE-2024-50289","CVE-2024-50290","CVE-2024-50296","CVE-2024-50301","CVE-2024-50302","CVE-2024-53058","CVE-2024-53061","CVE-2024-53063","CVE-2024-53066","CVE-2024-53085","CVE-2024-53088","CVE-2024-53104","CVE-2024-53114","CVE-2024-53142"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-47162","CVE-2022-48853","CVE-2024-26801","CVE-2024-26852","CVE-2024-26886","CVE-2024-27051","CVE-2024-35937","CVE-2024-36886","CVE-2024-36905","CVE-2024-36954","CVE-2024-42098","CVE-2024-42131","CVE-2024-42229","CVE-2024-44995","CVE-2024-45016","CVE-2024-46771","CVE-2024-46777","CVE-2024-46800","CVE-2024-47660","CVE-2024-47679","CVE-2024-47701","CVE-2024-49858","CVE-2024-49868","CVE-2024-49884","CVE-2024-49921","CVE-2024-49925","CVE-2024-49938","CVE-2024-49945","CVE-2024-49950","CVE-2024-49952","CVE-2024-50044","CVE-2024-50055","CVE-2024-50073","CVE-2024-50074","CVE-2024-50095","CVE-2024-50099","CVE-2024-50115","CVE-2024-50117","CVE-2024-50125","CVE-2024-50135","CVE-2024-50148","CVE-2024-50150","CVE-2024-50154","CVE-2024-50167","CVE-2024-50171","CVE-2024-50179","CVE-2024-50183","CVE-2024-50187","CVE-2024-50194","CVE-2024-50195","CVE-2024-50210","CVE-2024-50218","CVE-2024-50234","CVE-2024-50236","CVE-2024-50237","CVE-2024-50264","CVE-2024-50265","CVE-2024-50267","CVE-2024-50273","CVE-2024-50278","CVE-2024-50279","CVE-2024-50289","CVE-2024-50290","CVE-2024-50296","CVE-2024-50301","CVE-2024-50302","CVE-2024-53058","CVE-2024-53061","CVE-2024-53063","CVE-2024-53066","CVE-2024-53085","CVE-2024-53088","CVE-2024-53104","CVE-2024-53114","CVE-2024-53142"]}