CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
43.7%
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: phy: (CVE-2024-26600)
kernel: netfilter: multiple flaws (CVE-2024-26808, CVE-2024-27065, CVE-2024-35899, CVE-2024-36005)
kernel: cifs: (CVE-2024-26828)
kernel: wifi: multiple flaws (CVE-2024-26897, CVE-2024-27052, CVE-2024-27049, CVE-2023-52651, CVE-2024-35789, CVE-2024-27434, CVE-2024-35845, CVE-2024-35937, CVE-2024-36941, CVE-2024-36922, CVE-2024-36921, CVE-2024-38575)
kernel: nfs: (CVE-2024-26868)
kernel: igc: (CVE-2024-26853)
kernel: dmaengine/idxd: (CVE-2024-21823)
kernel: ipv6: multiple flaws (CVE-2024-27417, CVE-2024-35969, CVE-2024-36903, CVE-2024-40961)
kernel: vt: (CVE-2024-35823)
kernel: efi: (CVE-2024-35800)
kernel: mlxsw: (CVE-2024-35852)
kernel: eeprom: (CVE-2024-35848)
kernel: ice: (CVE-2024-35911)
kernel: platform/x86: (CVE-2023-52864)
kernel: i40e: (CVE-2024-36020)
kernel: rtnetlink: (CVE-2024-36017)
kernel: net: multiple flaws (CVE-2024-36929, CVE-2024-36971, CVE-2021-47606, CVE-2024-38558, CVE-2024-40928, CVE-2024-40954)
kernel: ipvlan: (CVE-2024-33621)
kernel: tcp: (CVE-2024-37356)
kernel: virtio: (CVE-2024-37353)
kernel: tls: (CVE-2024-36489)
kernel: cxl/region: (CVE-2024-38391)
kernel: bonding: (CVE-2024-39487)
kernel: netns: (CVE-2024-40958)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.