chromium-129.0.6668.58-1.fc40

Read Time:22 Second

FEDORA-2024-d273b23c67

Packages in this update:

chromium-129.0.6668.58-1.fc40

Update description:

update to 129.0.6668.58

* High CVE-2024-8904: Type Confusion in V8
* Medium CVE-2024-8905: Inappropriate implementation in V8
* Medium CVE-2024-8906: Incorrect security UI in Downloads
* Medium CVE-2024-8907: Insufficient data validation in Omnibox
* Low CVE-2024-8908: Inappropriate implementation in Autofill
* Low CVE-2024-8909: Inappropriate implementation in UI

Read More

USN-7021-1: Linux kernel vulnerabilities

Read Time:22 Second

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– GPU drivers;
– BTRFS file system;
– F2FS file system;
– GFS2 file system;
– BPF subsystem;
– Netfilter;
– RxRPC session sockets;
– Integrity Measurement Architecture(IMA) framework;
(CVE-2024-39496, CVE-2024-41009, CVE-2024-26677, CVE-2024-42160,
CVE-2024-27012, CVE-2024-42228, CVE-2024-39494, CVE-2024-38570)

Read More

USN-7020-1: Linux kernel vulnerabilities

Read Time:18 Second

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– GPU drivers;
– Network drivers;
– SCSI drivers;
– F2FS file system;
– BPF subsystem;
– IPv4 networking;
(CVE-2024-42160, CVE-2024-42159, CVE-2024-42154, CVE-2024-41009,
CVE-2024-42228, CVE-2024-42224)

Read More

webkitgtk-2.46.0-1.fc40

Read Time:25 Second

FEDORA-2024-00448ce92b

Packages in this update:

webkitgtk-2.46.0-1.fc40

Update description:

Use Skia instead of cairo for 2D rendering and enable GPU rendering by default.
Enable offscreen canvas by default.
Add support for system tracing with Sysprof.
Implement printing using the Print portal.
Add new API to load settings from a config file.
Add a new setting to enable or disable the 2D canvas acceleration (enabled by default).
Undeprecate console messages API and make it available in 6.0 API.

Read More

webkitgtk-2.46.0-2.fc41

Read Time:25 Second

FEDORA-2024-711db299ed

Packages in this update:

webkitgtk-2.46.0-2.fc41

Update description:

Use Skia instead of cairo for 2D rendering and enable GPU rendering by default.
Enable offscreen canvas by default.
Add support for system tracing with Sysprof.
Implement printing using the Print portal.
Add new API to load settings from a config file.
Add a new setting to enable or disable the 2D canvas acceleration (enabled by default).
Undeprecate console messages API and make it available in 6.0 API.

Read More

Scam ‘Funeral Streaming’ Groups Thrive on Facebook

Read Time:6 Minute, 4 Second

Scammers are flooding Facebook with groups that purport to offer video streaming of funeral services for the recently deceased. Friends and family who follow the links for the streaming services are then asked to cough up their credit card information. Recently, these scammers have branched out into offering fake streaming services for nearly any kind of event advertised on Facebook. Here’s a closer look at the size of this scheme, and some findings about who may be responsible.

One of the many scam funeral group pages on Facebook. Clicking to view the “live stream” of the funeral takes one to a newly registered website that requests credit card information.

KrebsOnSecurity recently heard from a reader named George who said a friend had just passed away, and he noticed that a Facebook group had been created in that friend’s memory. The page listed the correct time and date of the funeral service, which it claimed could be streamed over the Internet by following a link that led to a page requesting credit card information.

“After I posted about the site, a buddy of mine indicated [the same thing] happened to her when her friend passed away two weeks ago,” George said.

Searching Facebook/Meta for a few simple keywords like “funeral” and “stream” reveals countless funeral group pages on Facebook, some of them for services in the past and others erected for an upcoming funeral.

All of these groups include images of the deceased as their profile photo, and seek to funnel users to a handful of newly-registered video streaming websites that require a credit card payment before one can continue. Even more galling, some of these pages request donations in the name of the deceased.

It’s not clear how many Facebook users fall for this scam, but it’s worth noting that many of these fake funeral groups attract subscribers from at least some of the deceased’s followers, suggesting those users have subscribed to the groups in anticipation of the service being streamed. It’s also unclear how many people end up missing a friend or loved one’s funeral because they mistakenly thought it was being streamed online.

One of many look-alike landing pages for video streaming services linked to scam Facebook funeral groups.

George said their friend’s funeral service page on Facebook included a link to the supposed live-streamed service at livestreamnow[.]xyz, a domain registered in November 2023.

According to DomainTools.com, the organization that registered this domain is called “apkdownloadweb,” is based in Rajshahi, Bangladesh, and uses the DNS servers of a Web hosting company in Bangladesh called webhostbd[.]net.

A search on “apkdownloadweb” in DomainTools shows three domains registered to this entity, including live24sports[.]xyz and onlinestreaming[.]xyz. Both of those domains also used webhostbd[.]net for DNS. Apkdownloadweb has a Facebook page, which shows a number of “live video” teasers for sports events that have already happened, and says its domain is apkdownloadweb[.]com.

Livestreamnow[.]xyz is currently hosted at a Bangladeshi web hosting provider named cloudswebserver[.]com, but historical DNS records show this website also used DNS servers from webhostbd[.]net.

The Internet address of livestreamnow[.]xyz is 148.251.54.196, at the hosting giant Hetzner in Germany. DomainTools shows this same Internet address is home to nearly 6,000 other domains (.CSV), including hundreds that reference video streaming terms, like watchliveon24[.]com and foxsportsplus[.]com.

There are thousands of domains at this IP address that include or end in the letters “bd,” the country code top-level domain for Bangladesh. Although many domains correspond to websites for electronics stores or blogs about IT topics, just as many contain a fair amount of placeholder content (think “lorem ipsum” text on the “contact” page). In other words, the sites appear legitimate at first glance, but upon closer inspection it is clear they are not currently used by active businesses.

The passive DNS records for 148.251.54.196 show a surprising number of results that are basically two domain names mushed together. For example, there is watchliveon24[.]com.playehq4ks[.]com, which displays links to multiple funeral service streaming groups on Facebook.

Another combined domain on the same Internet address — livestreaming24[.]xyz.allsportslivenow[.]com — lists dozens of links to Facebook groups for funerals, but also for virtually all types of events that are announced or posted about by Facebook users, including graduations, concerts, award ceremonies, weddings, and rodeos.

Even community events promoted by state and local police departments on Facebook are fair game for these scammers. A Facebook page maintained by the police force in Plympton, Mass. for a town social event this summer called Plympton Night Out was quickly made into two different Facebook groups that informed visitors they could stream the festivities at either espnstreamlive[.]co or skysports[.]live.

WHO’S BEHIND THE FAKEBOOK FUNERALS?

Recall that the registrant of livestreamnow[.]xyz — the bogus streaming site linked in the Facebook group for George’s late friend — was an organization called “Apkdownloadweb.” That entity’s domain — apkdownloadweb[.]com — is registered to a Mazidul Islam in Rajshahi, Bangladesh (this domain is also using Webhostbd[.]net DNS servers).

Mazidul Islam’s LinkedIn page says he is the organizer of a now defunct IT blog called gadgetsbiz[.]com, which DomainTools finds was registered to a Mehedi Hasan from Rajshahi, Bangladesh.

To bring this full circle, DomainTools finds the domain name for the DNS provider on all of the above-mentioned sites  — webhostbd[.]net — was originally registered to a Md Mehedi, and to the email address webhostbd.net@gmail.com (“MD” is a common abbreviation for Muhammad/Mohammod/Muhammed).

A search on that email address at Constella finds a breached record from the data broker Apollo.io saying its owner’s full name is Mohammod Mehedi Hasan. Unfortunately, this is not a particularly unique name in that region of the world.

But as luck would have it, sometime last year the administrator of apkdownloadweb.com managed to infect their Windows PC with password-stealing malware. We know this because the raw logs of data stolen from this administrator’s PC were indexed by the breach tracking service Constella Intelligence [full disclosure: As of this month, Constella is an advertiser on this website].

These so-called “stealer logs” are mostly generated by opportunistic infections from information-stealing trojans that are sold on cybercrime markets. A typical set of logs for a compromised PC will include any usernames and passwords stored in any browser on the system, as well as a list of recent URLs visited and files downloaded.

Malware purveyors will often deploy infostealer malware by bundling it with “cracked” or pirated software titles. Indeed, the stealer logs for the administrator of apkdownloadweb[.]com show this user’s PC became infected immediately after they downloaded a booby-trapped mobile application development toolkit.

Those stolen credentials indicate Apkdownloadweb[.]com is maintained by a 20-something native of Dhaka, Bangladesh named Mohammod Abdullah Khondokar.

The “browser history” folder from the admin of Apkdownloadweb shows Khondokar recently left a comment on the Facebook page of Mohammod Mehedi Hasan, and Khondokar’s Facebook profile says the two are friends.

Neither MD Hasan nor MD Abdullah Khondokar responded to requests for comment. KrebsOnSecurity also sought comment from Meta.

Read More

USN-7019-1: Linux kernel vulnerabilities

Read Time:10 Minute, 10 Second

Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not
properly handle certain error conditions, leading to a NULL pointer
dereference. A local attacker could possibly trigger this vulnerability to
cause a denial of service. (CVE-2022-38096)

Gui-Dong Han discovered that the software RAID driver in the Linux kernel
contained a race condition, leading to an integer overflow vulnerability. A
privileged attacker could possibly use this to cause a denial of service
(system crash). (CVE-2024-23307)

Chenyuan Yang discovered that the CEC driver driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2024-23848)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel when modifying certain settings values through debugfs.
A privileged local attacker could use this to cause a denial of service.
(CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)

Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in
the Linux kernel contained a race condition, leading to an integer overflow
vulnerability. An attacker could possibly use this to cause a denial of
service (system crash). (CVE-2024-24861)

Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device
volume management subsystem did not properly validate logical eraseblock
sizes in certain situations. An attacker could possibly use this to cause a
denial of service (system crash). (CVE-2024-25739)

Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel
did not properly check for the device to be enabled before writing. A local
attacker could possibly use this to cause a denial of service.
(CVE-2024-25741)

Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde
discovered that an untrusted hypervisor could inject malicious #VC
interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw
is known as WeSee. A local attacker in control of the hypervisor could use
this to expose sensitive information or possibly execute arbitrary code in
the trusted execution environment. (CVE-2024-25742)

It was discovered that the JFS file system contained an out-of-bounds read
vulnerability when printing xattr debug information. A local attacker could
use this to cause a denial of service (system crash). (CVE-2024-40902)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM32 architecture;
– ARM64 architecture;
– M68K architecture;
– MIPS architecture;
– PowerPC architecture;
– RISC-V architecture;
– SuperH RISC architecture;
– User-Mode Linux (UML);
– x86 architecture;
– Block layer subsystem;
– Cryptographic API;
– Accessibility subsystem;
– ACPI drivers;
– Android drivers;
– Serial ATA and Parallel ATA drivers;
– Drivers core;
– Bluetooth drivers;
– Character device driver;
– Clock framework and drivers;
– Data acquisition framework and drivers;
– CPU frequency scaling framework;
– Hardware crypto device drivers;
– Buffer Sharing and Synchronization framework;
– DMA engine subsystem;
– FireWire subsystem;
– FPGA Framework;
– GPIO subsystem;
– GPU drivers;
– Greybus drivers;
– HID subsystem;
– HW tracing;
– I2C subsystem;
– IIO subsystem;
– InfiniBand drivers;
– Input Device (Mouse) drivers;
– IRQ chip drivers;
– Macintosh device drivers;
– Multiple devices driver;
– Media drivers;
– EEPROM drivers;
– VMware VMCI Driver;
– MMC subsystem;
– Network drivers;
– Near Field Communication (NFC) drivers;
– NVME drivers;
– Device tree and open firmware driver;
– PCI subsystem;
– Pin controllers subsystem;
– PTP clock framework;
– Remote Processor subsystem;
– S/390 drivers;
– SCSI drivers;
– Freescale SoC drivers;
– SoundWire subsystem;
– Greybus lights staging drivers;
– Media staging drivers;
– Trusted Execution Environment drivers;
– Thermal drivers;
– TTY drivers;
– USB subsystem;
– DesignWare USB3 driver;
– VFIO drivers;
– Framebuffer layer;
– ACRN Hypervisor Service Module driver;
– Xen hypervisor drivers;
– 9P distributed file system;
– File systems infrastructure;
– BTRFS file system;
– eCrypt file system;
– Ext4 file system;
– F2FS file system;
– FAT file system;
– GFS2 file system;
– JFFS2 file system;
– JFS file system;
– Network file system client;
– Network file system server daemon;
– NILFS2 file system;
– NTFS3 file system;
– Pstore file system;
– SMB network file system;
– UBI file system;
– IOMMU subsystem;
– Memory management;
– Socket messages infrastructure;
– Netfilter;
– BPF subsystem;
– Kernel debugger infrastructure;
– DMA mapping infrastructure;
– IRQ subsystem;
– Core kernel;
– Tracing infrastructure;
– Dynamic debug library;
– PCI iomap interfaces;
– 9P file system network protocol;
– B.A.T.M.A.N. meshing protocol;
– Bluetooth subsystem;
– Ethernet bridge;
– CAN network layer;
– Ceph Core library;
– Networking core;
– Distributed Switch Architecture;
– IPv4 networking;
– IPv6 networking;
– IUCV driver;
– MAC80211 subsystem;
– IEEE 802.15.4 subsystem;
– Multipath TCP;
– NET/ROM layer;
– NFC subsystem;
– NSH protocol;
– Open vSwitch;
– Phonet protocol;
– RDS protocol;
– Network traffic control;
– SMC sockets;
– TIPC protocol;
– TLS protocol;
– Unix domain sockets;
– Wireless networking;
– eXpress Data Path;
– XFRM subsystem;
– Key management;
– ALSA framework;
– HD-audio driver;
– ALSA SH drivers;
– SoC Audio for Freescale CPUs drivers;
– Kirkwood ASoC drivers;
– KVM core;
(CVE-2024-42085, CVE-2024-42154, CVE-2024-42229, CVE-2024-38548,
CVE-2024-42120, CVE-2024-38555, CVE-2024-38598, CVE-2024-40954,
CVE-2024-38571, CVE-2024-36020, CVE-2024-36270, CVE-2024-39482,
CVE-2024-39468, CVE-2024-38607, CVE-2024-26923, CVE-2024-42145,
CVE-2024-41040, CVE-2024-35852, CVE-2024-35805, CVE-2024-35890,
CVE-2024-36965, CVE-2024-42077, CVE-2024-26958, CVE-2024-35823,
CVE-2024-42124, CVE-2024-26680, CVE-2024-38549, CVE-2024-36286,
CVE-2024-27398, CVE-2024-35990, CVE-2024-36975, CVE-2024-27437,
CVE-2024-35848, CVE-2024-26900, CVE-2024-26654, CVE-2024-40971,
CVE-2024-35847, CVE-2024-35982, CVE-2024-42232, CVE-2022-48808,
CVE-2024-35822, CVE-2024-36950, CVE-2024-33621, CVE-2024-39276,
CVE-2024-40968, CVE-2024-35857, CVE-2024-40905, CVE-2023-52880,
CVE-2024-35819, CVE-2024-35791, CVE-2024-42076, CVE-2024-40904,
CVE-2024-35976, CVE-2024-35854, CVE-2024-26642, CVE-2024-27393,
CVE-2024-26934, CVE-2024-26960, CVE-2024-42137, CVE-2024-38588,
CVE-2024-40970, CVE-2024-36972, CVE-2024-26977, CVE-2024-38546,
CVE-2024-41095, CVE-2024-39292, CVE-2024-41087, CVE-2024-33847,
CVE-2024-40978, CVE-2024-41049, CVE-2024-35895, CVE-2024-35804,
CVE-2024-42093, CVE-2024-36017, CVE-2024-38591, CVE-2024-42080,
CVE-2024-41089, CVE-2024-38613, CVE-2024-39466, CVE-2024-40931,
CVE-2024-35907, CVE-2024-36919, CVE-2024-36934, CVE-2024-42240,
CVE-2024-35940, CVE-2024-36938, CVE-2024-42121, CVE-2024-39490,
CVE-2024-40961, CVE-2024-42223, CVE-2024-41041, CVE-2024-41093,
CVE-2024-42068, CVE-2024-41044, CVE-2024-42086, CVE-2024-42105,
CVE-2024-36954, CVE-2024-35796, CVE-2024-38610, CVE-2024-36929,
CVE-2024-35893, CVE-2024-38601, CVE-2024-40981, CVE-2024-36889,
CVE-2024-27015, CVE-2024-35897, CVE-2024-39469, CVE-2024-35825,
CVE-2024-26922, CVE-2024-38573, CVE-2024-42130, CVE-2024-38580,
CVE-2024-26814, CVE-2024-36955, CVE-2024-26813, CVE-2024-27396,
CVE-2024-36937, CVE-2024-36928, CVE-2024-42224, CVE-2024-27004,
CVE-2024-42104, CVE-2024-42225, CVE-2024-38659, CVE-2024-35955,
CVE-2024-42106, CVE-2024-39489, CVE-2024-31076, CVE-2024-26817,
CVE-2024-35884, CVE-2024-42095, CVE-2024-42131, CVE-2024-40956,
CVE-2024-40941, CVE-2024-36007, CVE-2024-27009, CVE-2024-40959,
CVE-2024-42089, CVE-2024-37078, CVE-2024-35960, CVE-2024-41002,
CVE-2024-39301, CVE-2024-35988, CVE-2023-52887, CVE-2024-35885,
CVE-2024-39484, CVE-2024-35872, CVE-2024-40974, CVE-2024-35851,
CVE-2024-26957, CVE-2024-38623, CVE-2024-35944, CVE-2024-41005,
CVE-2024-42152, CVE-2024-35888, CVE-2024-38621, CVE-2024-26989,
CVE-2024-42148, CVE-2024-27401, CVE-2024-36883, CVE-2024-35855,
CVE-2024-26936, CVE-2024-26935, CVE-2022-48772, CVE-2024-35853,
CVE-2024-35997, CVE-2024-27059, CVE-2024-36953, CVE-2024-35969,
CVE-2024-42094, CVE-2024-38661, CVE-2024-35925, CVE-2024-40914,
CVE-2024-36940, CVE-2024-27016, CVE-2024-26828, CVE-2024-40911,
CVE-2024-38634, CVE-2024-38558, CVE-2024-38582, CVE-2023-52629,
CVE-2024-27020, CVE-2024-35247, CVE-2024-26999, CVE-2024-26687,
CVE-2024-38565, CVE-2024-38612, CVE-2024-39495, CVE-2024-26974,
CVE-2024-42101, CVE-2024-38597, CVE-2024-26929, CVE-2024-40927,
CVE-2024-26830, CVE-2024-26973, CVE-2024-40980, CVE-2024-38560,
CVE-2024-41047, CVE-2024-42098, CVE-2024-39507, CVE-2024-38599,
CVE-2024-35789, CVE-2024-27395, CVE-2024-41092, CVE-2024-42161,
CVE-2024-41006, CVE-2024-36931, CVE-2024-38619, CVE-2024-35813,
CVE-2024-35898, CVE-2024-41027, CVE-2024-40932, CVE-2024-40960,
CVE-2024-26925, CVE-2024-41048, CVE-2024-36886, CVE-2024-35877,
CVE-2024-40963, CVE-2024-36960, CVE-2024-38590, CVE-2024-40902,
CVE-2024-35871, CVE-2024-38579, CVE-2024-40987, CVE-2024-36025,
CVE-2024-35806, CVE-2024-35899, CVE-2024-26993, CVE-2024-41097,
CVE-2024-39488, CVE-2024-42115, CVE-2024-42127, CVE-2024-37356,
CVE-2024-26812, CVE-2024-36939, CVE-2024-35807, CVE-2024-26886,
CVE-2024-35809, CVE-2024-40937, CVE-2024-35970, CVE-2024-35817,
CVE-2024-35973, CVE-2024-40945, CVE-2024-42153, CVE-2024-36964,
CVE-2024-42090, CVE-2024-38552, CVE-2024-39467, CVE-2024-26961,
CVE-2024-38615, CVE-2024-38618, CVE-2024-40988, CVE-2024-38605,
CVE-2024-41004, CVE-2024-26966, CVE-2024-42096, CVE-2024-26996,
CVE-2024-36969, CVE-2024-36489, CVE-2024-40957, CVE-2024-36974,
CVE-2024-39502, CVE-2024-26976, CVE-2024-27399, CVE-2024-36905,
CVE-2024-35958, CVE-2024-35927, CVE-2024-27001, CVE-2024-39487,
CVE-2024-41034, CVE-2024-36904, CVE-2024-41055, CVE-2024-38550,
CVE-2024-38567, CVE-2024-38586, CVE-2024-40916, CVE-2024-38589,
CVE-2023-52884, CVE-2024-26810, CVE-2024-35989, CVE-2024-36894,
CVE-2024-39471, CVE-2024-35900, CVE-2024-42097, CVE-2024-36959,
CVE-2024-26931, CVE-2024-40934, CVE-2024-36947, CVE-2024-34777,
CVE-2024-27018, CVE-2024-39499, CVE-2024-36906, CVE-2024-35984,
CVE-2024-39500, CVE-2024-26965, CVE-2024-26921, CVE-2024-27013,
CVE-2024-39509, CVE-2024-27008, CVE-2024-36916, CVE-2024-40942,
CVE-2024-35978, CVE-2024-26969, CVE-2024-26964, CVE-2024-35879,
CVE-2024-36016, CVE-2024-26629, CVE-2024-42236, CVE-2024-40943,
CVE-2024-36902, CVE-2024-42247, CVE-2024-36006, CVE-2024-36014,
CVE-2024-26955, CVE-2024-39277, CVE-2024-39506, CVE-2024-35936,
CVE-2024-26950, CVE-2024-35938, CVE-2024-41035, CVE-2024-42140,
CVE-2024-36971, CVE-2024-35910, CVE-2024-34027, CVE-2024-35933,
CVE-2024-35886, CVE-2024-39501, CVE-2024-42109, CVE-2024-42157,
CVE-2024-35905, CVE-2024-41007, CVE-2024-40912, CVE-2024-26984,
CVE-2024-35915, CVE-2024-35934, CVE-2024-38633, CVE-2024-26952,
CVE-2024-27017, CVE-2024-38627, CVE-2024-42070, CVE-2024-41046,
CVE-2024-35821, CVE-2024-35815, CVE-2024-36978, CVE-2024-36967,
CVE-2023-52752, CVE-2024-38583, CVE-2024-38578, CVE-2024-26926,
CVE-2023-52699, CVE-2024-36952, CVE-2024-38600, CVE-2024-42102,
CVE-2024-38559, CVE-2024-38637, CVE-2024-42082, CVE-2023-52488,
CVE-2024-36032, CVE-2024-35950, CVE-2024-35930, CVE-2024-38780,
CVE-2024-40995, CVE-2024-36004, CVE-2024-26956, CVE-2024-35896,
CVE-2024-26994, CVE-2024-38624, CVE-2024-39480, CVE-2023-52882,
CVE-2024-35912, CVE-2024-36015, CVE-2024-27019, CVE-2024-40983,
CVE-2023-52760, CVE-2024-39503, CVE-2024-36957, CVE-2024-26980,
CVE-2024-40908, CVE-2024-40958, CVE-2024-35902, CVE-2024-42087,
CVE-2024-36933, CVE-2024-38635, CVE-2024-26988, CVE-2024-36941,
CVE-2024-26970, CVE-2024-36005, CVE-2024-36029, CVE-2024-36008,
CVE-2024-42244, CVE-2024-40967, CVE-2023-52585, CVE-2024-26951,
CVE-2024-39475, CVE-2024-35922, CVE-2024-36901, CVE-2024-40901,
CVE-2024-36031, CVE-2024-41000, CVE-2024-40929, CVE-2024-40994,
CVE-2024-42084, CVE-2024-38547, CVE-2024-26937, CVE-2024-40984,
CVE-2024-27000, CVE-2024-35785, CVE-2024-35849, CVE-2024-42119,
CVE-2024-35947, CVE-2024-39505, CVE-2024-42092, CVE-2024-26811,
CVE-2024-35935, CVE-2024-36946, CVE-2024-40990, CVE-2024-26981,
CVE-2024-38596, CVE-2024-40976, CVE-2024-36880)

Read More