Skip to content

Commit b6a7d69

Browse files
authored
Merge pull request #2557 from flatcar/buildbot/monthly-glsa-metadata-updates-2025-01-01
Monthly GLSA metadata 2025-01-01
2 parents 437f6ef + 9d552ed commit b6a7d69

24 files changed

+1324
-17
lines changed
Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
-----BEGIN PGP SIGNED MESSAGE-----
22
Hash: SHA512
33

4-
MANIFEST Manifest.files.gz 591718 BLAKE2B cd53ee1575b57b03315f3e2b15f89a06fbc6711259ee7a82e1ca6f8970d8fdd183ea1f95f313b15f9f7f905c2c8641fa9ae9f0d8a12e8fedc6851ee3f7c15bbd SHA512 1cf337d112115a521c08a9fa208a2c60a1ef9651426b5a20b7ff05709eda7e21b384c627f1dedd2abb84476daf5fadea280b479585390abd903daec89814b24f
5-
TIMESTAMP 2024-12-01T06:40:23Z
4+
MANIFEST Manifest.files.gz 594915 BLAKE2B 220d9175cb1796cb5045abb4a1dd895efa478aa604a6eb3dde800553a73ce6b12ecf630b6574e1fc834659bac119417be17231464d8355e60ed5ed18f51b8044 SHA512 db425e75cb49a2ea05358c8e7f4e366d86628930a1e26279cb8287fe250565842ac004358a56986eb2aa4342ed7217cf30c8f78d97a02ed24483cca80fd1b2eb
5+
TIMESTAMP 2025-01-01T06:40:41Z
66
-----BEGIN PGP SIGNATURE-----
77

8-
iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmdMBNdfFIAAAAAALgAo
8+
iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmd042lfFIAAAAAALgAo
99
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx
1010
RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY
11-
klANZw/+KSWqV2sDOVWslomj90wmI4kWrUE4ZC46YZtvjGz4Faf9D8i9RzkuV9nB
12-
Lt6HhwNbrTFYYyFv0wAYLBUbNzQUDKl0KwOXs7SjRD+hV2lNRakA/dM1FbHsN0wF
13-
qUd+S3Slmis3NGaIQ5UstxqdG5wjZ04q6BnjdrA5Yaqxj+S8bS04D3HUr5jhKU8A
14-
vR9e7h6fkiABZW52mXVcBvqkSTmqrZcxGss3LpTiWU1VDcbFoVXcjsNQKYUEj9dt
15-
IgWaVX/LwVj3yPSI2TPF2PO8lenyiroADclFwXPHHyuDm6qxXb0v0nie3h4PuG5O
16-
yFVWmpLPkgdO2oCnJhh1W2sh+vu5iV4xnfoxT5U0BMp24s2wt2oKzPieJUhslk4s
17-
lINvCPAVF8VFwgvop3rdwvwQWE7yZCAZuKxD0Y6m8WORExR/MB33Qmc0gm7b6ksC
18-
yFG7AjN6y0qUd2yL1vpl9lvy4Rv0izZnVmuhd0+Jsq/8lgzY8+oiiZMzTxEc8Y/e
19-
8BcxWkB64/Sta0U+GYEYypxS2nPtPAb7BvPu1f2dyBEqO+vDRN5M+0LuhfucKDTo
20-
fuNw7Ri6zyv4thIvUJI7f54AHcGvAGmxQ+ObXHoHrBHtKacSXG6VF/P48rAwX165
21-
WblhbkW1T4kqLrUiFl/pt9BHP2zCXFkphVMrw4GJyp6KquSqfFA=
22-
=l52K
11+
klBoyg//VQm7GsyyuffSjKJO3H/YJF558ygX0IxnZPwgQweC9ERRd3NlONm2mlph
12+
TzmZhAC+PnRGN+QTZh3M/kNuxPytaf6bg9vSNs2v221CHcSqErbzbMAiDO8ZRPoj
13+
ToTfCC1jH2AoEAAmCWd120MK7nA1dzKx0DSvWhuTv02ssdS9Plj+SJ0SY6stjE3w
14+
vfyYTvVjsz90UppvVl9zdKPQa5st2ojC9/tJxCFEjTxV1ubGJDI/7TdArgyTTSDg
15+
rx4Bbc5su4ANjXbYHofhar2X0/YYF6l/bglDMhCJIn8OwOyzWqXufgrmhmnCrCgt
16+
V6FLxXqWimOmIiIL1YUwUgc3p0JYNuYAwGt5I6Tf/gX2h/4aHOxUvgDdvRf+hoUl
17+
9USr4sw5qovn+pFdDNwYrZ2+Uat83IYET85Mnlc8sqf3wH8I17lPKOzLtcgtkRND
18+
i062wD9kU6gCen6fM80vuW4k40UphiAkrLhy8nMaWjBBVbRdXpGddGdOuPk0yX+b
19+
g+qjOXnkY/rZPek+u0lpS1MPU661IFJgXQs9wFaV9++VXpcpVCyFoyUNhhaIxEH9
20+
KEQwa8bz2DkoBCeJMYjH3xigcXMavQ9KTrRqkl2lUk1tLf/dBwY3d7Ao8rpCkirO
21+
AF2w3sJ5hbD7PXm4OEDG3EYt1uQftsnV/UcNB26SVu8UT1tfmR0=
22+
=IQdp
2323
-----END PGP SIGNATURE-----
Binary file not shown.
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202412-01">
4+
<title>R: Arbitrary Code Execution</title>
5+
<synopsis>A vulnerability has been discovered in R, which can lead to arbitrary code execution.</synopsis>
6+
<product type="ebuild">R</product>
7+
<announced>2024-12-07</announced>
8+
<revised count="1">2024-12-07</revised>
9+
<bug>930936</bug>
10+
<access>local</access>
11+
<affected>
12+
<package name="dev-lang/R" auto="yes" arch="*">
13+
<unaffected range="ge">4.4.1</unaffected>
14+
<vulnerable range="lt">4.4.1</vulnerable>
15+
</package>
16+
</affected>
17+
<background>
18+
<p>R is a language and environment for statistical computing and graphics.</p>
19+
</background>
20+
<description>
21+
<p>Deserialization of untrusted data can occur in the R statistical programming language, enabling a maliciously crafted RDS (R Data Serialization) formatted file or R package to run arbitrary code on an end user’s system when interacted with.</p>
22+
</description>
23+
<impact type="high">
24+
<p>Arbitrary code may be run when deserializing untrusted data.</p>
25+
</impact>
26+
<workaround>
27+
<p>There is no known workaround at this time.</p>
28+
</workaround>
29+
<resolution>
30+
<p>All R users should upgrade to the latest version:</p>
31+
32+
<code>
33+
# emerge --sync
34+
# emerge --ask --oneshot --verbose ">=dev-lang/R-4.4.1"
35+
</code>
36+
</resolution>
37+
<references>
38+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-27322">CVE-2024-27322</uri>
39+
</references>
40+
<metadata tag="requester" timestamp="2024-12-07T08:53:34.596478Z">graaff</metadata>
41+
<metadata tag="submitter" timestamp="2024-12-07T08:53:34.602412Z">graaff</metadata>
42+
</glsa>
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202412-02">
4+
<title>Cacti: Multiple Vulnerabilities</title>
5+
<synopsis>Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.</synopsis>
6+
<product type="ebuild">cacti</product>
7+
<announced>2024-12-07</announced>
8+
<revised count="1">2024-12-07</revised>
9+
<bug>823788</bug>
10+
<bug>834597</bug>
11+
<bug>884799</bug>
12+
<access>remote</access>
13+
<affected>
14+
<package name="net-analyzer/cacti" auto="yes" arch="*">
15+
<unaffected range="ge">1.2.26</unaffected>
16+
<vulnerable range="lt">1.2.26</vulnerable>
17+
</package>
18+
</affected>
19+
<background>
20+
<p>Cacti is a web-based network graphing and reporting tool.</p>
21+
</background>
22+
<description>
23+
<p>Multiple vulnerabilities have been discovered in Cacti. Please review the CVE identifiers referenced below for details.</p>
24+
</description>
25+
<impact type="high">
26+
<p>Please review the referenced CVE identifiers for details.</p>
27+
</impact>
28+
<workaround>
29+
<p>There is no known workaround at this time.</p>
30+
</workaround>
31+
<resolution>
32+
<p>All Cacti users should upgrade to the latest version:</p>
33+
34+
<code>
35+
# emerge --sync
36+
# emerge --ask --oneshot --verbose ">=net-analyzer/cacti-1.2.26"
37+
</code>
38+
</resolution>
39+
<references>
40+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14424">CVE-2020-14424</uri>
41+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-0730">CVE-2022-0730</uri>
42+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-46169">CVE-2022-46169</uri>
43+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-48547">CVE-2022-48547</uri>
44+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-30534">CVE-2023-30534</uri>
45+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-31132">CVE-2023-31132</uri>
46+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39357">CVE-2023-39357</uri>
47+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39358">CVE-2023-39358</uri>
48+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39359">CVE-2023-39359</uri>
49+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39360">CVE-2023-39360</uri>
50+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39361">CVE-2023-39361</uri>
51+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39362">CVE-2023-39362</uri>
52+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39365">CVE-2023-39365</uri>
53+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39510">CVE-2023-39510</uri>
54+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39511">CVE-2023-39511</uri>
55+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39512">CVE-2023-39512</uri>
56+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39513">CVE-2023-39513</uri>
57+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39514">CVE-2023-39514</uri>
58+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39515">CVE-2023-39515</uri>
59+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39516">CVE-2023-39516</uri>
60+
</references>
61+
<metadata tag="requester" timestamp="2024-12-07T08:56:20.459772Z">graaff</metadata>
62+
<metadata tag="submitter" timestamp="2024-12-07T08:56:20.462893Z">graaff</metadata>
63+
</glsa>
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202412-03">
4+
<title>Asterisk: Multiple Vulnerabilities</title>
5+
<synopsis>Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.</synopsis>
6+
<product type="ebuild">asterisk</product>
7+
<announced>2024-12-07</announced>
8+
<revised count="1">2024-12-07</revised>
9+
<bug>771318</bug>
10+
<bug>803440</bug>
11+
<bug>838391</bug>
12+
<bug>884797</bug>
13+
<bug>920026</bug>
14+
<bug>937844</bug>
15+
<bug>939159</bug>
16+
<access>remote</access>
17+
<affected>
18+
<package name="net-misc/asterisk" auto="yes" arch="*">
19+
<unaffected range="ge">18.24.3</unaffected>
20+
<vulnerable range="lt">18.24.3</vulnerable>
21+
</package>
22+
</affected>
23+
<background>
24+
<p>Asterisk is an open source telephony engine and toolkit.</p>
25+
</background>
26+
<description>
27+
<p>Multiple vulnerabilities have been discovered in Asterisk. Please review the CVE identifiers referenced below for details.</p>
28+
</description>
29+
<impact type="high">
30+
<p>Please review the referenced CVE identifiers for details.</p>
31+
</impact>
32+
<workaround>
33+
<p>There is no known workaround at this time.</p>
34+
</workaround>
35+
<resolution>
36+
<p>All Asterisk users should upgrade to the latest version:</p>
37+
38+
<code>
39+
# emerge --sync
40+
# emerge --ask --oneshot --verbose ">=net-misc/asterisk-18.24.3"
41+
</code>
42+
</resolution>
43+
<references>
44+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-35776">CVE-2020-35776</uri>
45+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-26712">CVE-2021-26712</uri>
46+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-26713">CVE-2021-26713</uri>
47+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-26714">CVE-2021-26714</uri>
48+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-26717">CVE-2021-26717</uri>
49+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-26906">CVE-2021-26906</uri>
50+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-31878">CVE-2021-31878</uri>
51+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-32558">CVE-2021-32558</uri>
52+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-26498">CVE-2022-26498</uri>
53+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-26499">CVE-2022-26499</uri>
54+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-26651">CVE-2022-26651</uri>
55+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-37325">CVE-2022-37325</uri>
56+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-42705">CVE-2022-42705</uri>
57+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-42706">CVE-2022-42706</uri>
58+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-37457">CVE-2023-37457</uri>
59+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-49294">CVE-2023-49294</uri>
60+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-49786">CVE-2023-49786</uri>
61+
</references>
62+
<metadata tag="requester" timestamp="2024-12-07T08:58:41.628301Z">graaff</metadata>
63+
<metadata tag="submitter" timestamp="2024-12-07T08:58:41.632180Z">graaff</metadata>
64+
</glsa>
Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202412-04">
4+
<title>Mozilla Firefox: Multiple Vulnerabilities</title>
5+
<synopsis>Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.</synopsis>
6+
<product type="ebuild">firefox,firefox-bin</product>
7+
<announced>2024-12-07</announced>
8+
<revised count="1">2024-12-07</revised>
9+
<bug>936215</bug>
10+
<bug>937467</bug>
11+
<bug>941169</bug>
12+
<bug>941174</bug>
13+
<bug>941224</bug>
14+
<access>remote</access>
15+
<affected>
16+
<package name="www-client/firefox" auto="yes" arch="*">
17+
<unaffected range="ge" slot="rapid">131.0.2</unaffected>
18+
<unaffected range="ge" slot="esr">123.3.1</unaffected>
19+
<vulnerable range="lt" slot="rapid">131.0.2</vulnerable>
20+
<vulnerable range="lt" slot="esr">128.3.1</vulnerable>
21+
</package>
22+
<package name="www-client/firefox-bin" auto="yes" arch="*">
23+
<unaffected range="ge" slot="rapid">131.0.2</unaffected>
24+
<unaffected range="ge" slot="esr">128.3.1</unaffected>
25+
<vulnerable range="lt" slot="rapid">131.0.2</vulnerable>
26+
<vulnerable range="lt" slot="esr">128.3.1</vulnerable>
27+
</package>
28+
</affected>
29+
<background>
30+
<p>Mozilla Firefox is a popular open-source web browser from the Mozilla project.</p>
31+
</background>
32+
<description>
33+
<p>Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.</p>
34+
</description>
35+
<impact type="high">
36+
<p>Please review the referenced CVE identifiers for details.</p>
37+
</impact>
38+
<workaround>
39+
<p>There is no known workaround at this time.</p>
40+
</workaround>
41+
<resolution>
42+
<p>All Mozilla Firefox users should upgrade to the latest version in their release channel:</p>
43+
44+
<code>
45+
# emerge --sync
46+
# emerge --ask --oneshot --verbose ">=www-client/firefox-bin-131.0.2:rapid"
47+
# emerge --ask --oneshot --verbose ">=www-client/firefox-bin-128.3.1:esr"
48+
</code>
49+
50+
<p>All Mozilla Firefox users should upgrade to the latest version:</p>
51+
52+
<code>
53+
# emerge --sync
54+
# emerge --ask --oneshot --verbose ">=www-client/firefox-131.0.2:rapid"
55+
# emerge --ask --oneshot --verbose ">=www-client/firefox-128.3.1:esr"
56+
</code>
57+
</resolution>
58+
<references>
59+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601</uri>
60+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6602">CVE-2024-6602</uri>
61+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603</uri>
62+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604</uri>
63+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6606">CVE-2024-6606</uri>
64+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6607">CVE-2024-6607</uri>
65+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6608">CVE-2024-6608</uri>
66+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6609">CVE-2024-6609</uri>
67+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6610">CVE-2024-6610</uri>
68+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6611">CVE-2024-6611</uri>
69+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6612">CVE-2024-6612</uri>
70+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6613">CVE-2024-6613</uri>
71+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6614">CVE-2024-6614</uri>
72+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6615">CVE-2024-6615</uri>
73+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518</uri>
74+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519</uri>
75+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520</uri>
76+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521</uri>
77+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522</uri>
78+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7523">CVE-2024-7523</uri>
79+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7524">CVE-2024-7524</uri>
80+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525</uri>
81+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526</uri>
82+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527</uri>
83+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528</uri>
84+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529</uri>
85+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7530">CVE-2024-7530</uri>
86+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7531">CVE-2024-7531</uri>
87+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381</uri>
88+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382</uri>
89+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8383">CVE-2024-8383</uri>
90+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384</uri>
91+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385</uri>
92+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386</uri>
93+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387</uri>
94+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8389">CVE-2024-8389</uri>
95+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8394">CVE-2024-8394</uri>
96+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8900">CVE-2024-8900</uri>
97+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-9391">CVE-2024-9391</uri>
98+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392</uri>
99+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-9395">CVE-2024-9395</uri>
100+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396</uri>
101+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397</uri>
102+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399</uri>
103+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400</uri>
104+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401</uri>
105+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402</uri>
106+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-9403">CVE-2024-9403</uri>
107+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680</uri>
108+
<uri>MFSA2024-29</uri>
109+
<uri>MFSA2024-30</uri>
110+
<uri>MFSA2024-31</uri>
111+
<uri>MFSA2024-33</uri>
112+
<uri>MFSA2024-34</uri>
113+
<uri>MFSA2024-35</uri>
114+
<uri>MFSA2024-38</uri>
115+
<uri>MFSA2024-39</uri>
116+
<uri>MFSA2024-40</uri>
117+
<uri>MFSA2024-41</uri>
118+
<uri>MFSA2024-43</uri>
119+
<uri>MFSA2024-44</uri>
120+
<uri>MFSA2024-46</uri>
121+
<uri>MFSA2024-47</uri>
122+
<uri>MFSA2024-48</uri>
123+
<uri>MFSA2024-49</uri>
124+
<uri>MFSA2024-50</uri>
125+
<uri>MFSA2024-51</uri>
126+
</references>
127+
<metadata tag="requester" timestamp="2024-12-07T10:09:25.027501Z">graaff</metadata>
128+
<metadata tag="submitter" timestamp="2024-12-07T10:09:25.030768Z">graaff</metadata>
129+
</glsa>

0 commit comments

Comments
 (0)