CVE-2024-41991
Mié, 07/08/2024 – 15:15
CVE-2024-41991
CVE-2024-41991
Mié, 07/08/2024 – 15:15
CVE-2024-41991
CVE-2024-41990
Mié, 07/08/2024 – 15:15
CVE-2024-41990
CVE-2024-41989
Mié, 07/08/2024 – 15:15
CVE-2024-41989
CVE-2024-42222
Mié, 07/08/2024 – 08:16
CVE-2024-42222
Affected users are advised to upgrade to version 4.19.1.1 to address this issue. Users on older versions of CloudStack considering to upgrade, can skip 4.19.1.0 and upgrade directly to 4.19.1.1.
CVE-2024-42062
Mié, 07/08/2024 – 08:16
CVE-2024-42062
Users are recommended to upgrade to Apache CloudStack 4.18.2.3 or 4.19.1.1, or later, which addresses this issue. Additionally, all account-user API and secret keys should be regenerated.
CVE-2024-5290
Mié, 07/08/2024 – 09:16
CVE-2024-5290
Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
CVE-2024-7553
Mié, 07/08/2024 – 10:15
CVE-2024-7553
Required Configuration:
Only environments with Windows as the underlying operating system is affected by this issue
CVE-2024-36130
Mié, 07/08/2024 – 04:17
CVE-2024-36130
CVE-2024-34788
Mié, 07/08/2024 – 04:17
CVE-2024-34788
CVE-2024-37403
Mié, 07/08/2024 – 04:17
CVE-2024-37403