Maintained with ☕️ by
IcePanel logo

Google Distributed Cloud (software only) for VMware 1.31.0-gke.889 is now

Share

Services

## Announcement Google Distributed Cloud (software only) for VMware 1.31.0-gke.889 is now available for[download](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/downloads). To upgrade, see [Upgrade a cluster or a node pool](https://cloud.google.com/anthos/clusters/docs/on-prem/latest/how-to/upgrading). Google Distributed Cloud 1.31.0-gke.889 runs on Kubernetes v1.31.3-gke.100. If you are using a third-party storage vendor, check the [GDC Ready storage partners](https://cloud.google.com/anthos/docs/resources/partner-storage)document to make sure the storage vendor has already passed the qualification for this release. After a release, it takes approximately 7 to 14 days for the version to become available for use with [GKE On-Prem API clients](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/cluster-lifecycle-management-tools): the Google Cloud console, the gcloud CLI, and Terraform. ## Feature Announcing an early look at two preview features: * A new architecture called [advanced clusters](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/concepts/advanced-clusters). When advanced cluster is enabled, the underlying Google Distributed Cloud software deploys controllers that allow for a more extensible architecture. Enabling advanced clusters gives you access to new features and capabilities, such as topology domains. * A [topology domain](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/topology-domains-set-up) is a pool of cluster nodes that are considered to be part of the same logical or physical grouping. Topology domains correspond to some underlying hardware or software that has the possibility of correlated failure, like networking equipment in a rack. As part of setting up a topology domain, you create a topology label that is set on all the nodes in the topology domain during cluster creation. This label lets you set up [Pod Topology Spread Constraints](https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/). Note the following limitations of the preview: * You can enable the features only on new 1.31 clusters. * You won't be able to upgrade the clusters to 1.32, so only enable the features in a test environment. * To test topology domains, we recommend that you configure the[cluster-wide built-in default spread constraints](https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/#internal-default-constraints) because configuring your own [cluster-wide spread constraints](https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/#cluster-level-default-constraints) isn't available. ## Change Upgrade changes: * Dataplane V2 is required for all user clusters. Before upgrading a user cluster to 1.31, follow the steps in [Enable Dataplane V2](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/upgrading#enable-dataplane-v2). * To upgrade clusters to 1.31, you must upgrade your admin cluster first and then user clusters. For more information, see [Version rules](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/how-to/upgrading#verson%5Frules). Version changes: * COS was upgraded to [milestone 113](https://cloud.google.com/container-optimized-os/docs/release-notes/m113). Other changes: * Added support for configuring the GKE Identity Service to enforce a minimum transport layer security (TLS) version of 1.2 for HTTPS connections. By default, the GKE Identity Service allows TLS 1.1 and higher connections. If you require enforcement for a minimum of TLS 1.2, reach out to [Cloud Customer Care](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/getting-support)for assistance. * Removed TLS/SSL weak message authentication code cipher suites in the vSphere cloud controller manager. ## Fix The following issues are fixed in 1.31.0-gke.889: * Fixed the issue that additional manual steps are needed after disabling always-on secrets encryption with `gkectl update cluster`. * Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#migrating-a-user-cluster-to-controlplane-v2-fails-if-secrets-encryption-has-ever-been-enabled)that caused migrating a user cluster to Controlplane V2 to fail if secrets encryption has ever been enabled on the user cluster, even if it's already disabled. * Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#gkectl-returns-false-error-on-netapp-storageclass)where the `gkectl upgrade` command returned an incorrect error about the netapp storageclass. * Fixed the [known issue](https://cloud.google.com/kubernetes-engine/distributed-cloud/vmware/docs/troubleshooting/known-issues#updating-dataplanev2-forwardmode-doesnt-automatically-trigger-anetd-daemonset-restart)where updating DataplaneV2 ForwardMode doesn't automatically trigger anetd DaemonSet restart. ## Fix The following high-severity container vulnerabilities are fixed in 1.31.0-gke.889: * [CVE-2023-47108](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47108) * [CVE-2023-28642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28642) * [CVE-2021-39293](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39293) * [CVE-2022-30580](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30580) * [CVE-2022-30633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30633) * [CVE-2022-30631](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30631) * [CVE-2022-2879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879) * [CVE-2022-30632](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30632) * [CVE-2022-28131](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28131) * [CVE-2022-24675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24675) * [CVE-2022-2880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880) * [CVE-2021-44716](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44716) * [CVE-2022-30630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30630) * [CVE-2024-1975](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975) * [CVE-2022-24921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24921) * [CVE-2024-1737](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737) * [CVE-2021-29923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29923) * [CVE-2022-41715](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715) * [CVE-2021-41772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41772) * [CVE-2023-27561](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27561) * [CVE-2022-23772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23772) * [CVE-2024-6345](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345) * [CVE-2022-32189](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32189) * [CVE-2022-23773](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23773) * [CVE-2021-41771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41771) * [CVE-2022-30635](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30635) * [CVE-2022-28327](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28327) * [CVE-2024-6232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232) * [CVE-2024-0793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0793) * [CVE-2024-7348](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348) * [CVE-2023-3676](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3676) * [CVE-2023-5528](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5528) * [CVE-2023-3955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3955) * [GHSA-87m9-rv8p-rgmg](https://github.com/advisories/GHSA-87m9-rv8p-rgmg) * [CVE-2024-0567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567) * [CVE-2020-22218](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22218) ## Fix The following Container-Optimized OS vulnerabilities are fixed in 1.31.0-gke.889: * [CVE-2024-41073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073) * [CVE-2024-36979](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36979) * [CVE-2024-49889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49889) * [CVE-2024-38577](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38577) * [CVE-2024-41087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087) * [CVE-2024-49882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49882) * [CVE-2024-38538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38538) * [CVE-2024-44940](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44940) * [CVE-2024-53057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057) * [CVE-2024-39487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487) * [CVE-2024-48958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48958) * [CVE-2024-41049](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049) * [CVE-2024-50035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50035) * [CVE-2024-49883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49883) * [CVE-2024-41058](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058) * [CVE-2024-47685](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47685) * [CVE-2024-46743](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743) * [CVE-2024-38555](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555) * [CVE-2024-45490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490) * [CVE-2024-46800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800) * [CVE-2024-42285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42285) * [CVE-2024-44934](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44934) * [CVE-2024-37407](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37407) * [CVE-2024-47727](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47727) * [CVE-2024-49936](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49936) * [CVE-2024-38588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38588) * [CVE-2024-36978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978) * [CVE-2024-41057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057) * [CVE-2024-42136](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42136) * [CVE-2024-50033](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50033) * [CVE-2024-44983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44983) * [CVE-2024-37371](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371) * [CVE-2024-49967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49967) * [CVE-2024-41000](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000) * [CVE-2024-43873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873) * [CVE-2024-37370](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370) * [CVE-2024-47742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47742) * [CVE-2024-39494](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494) * [CVE-2024-26256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26256) * [CVE-2024-39463](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39463) * [CVE-2024-44985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44985) * [CVE-2024-6119](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6119) * [CVE-2024-40994](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994) * [CVE-2024-44987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44987) * [CVE-2024-45491](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491) * [CVE-2024-46744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744) * [CVE-2024-42302](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302) * [CVE-2024-50083](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50083) * [CVE-2024-40906](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40906) * [CVE-2024-46738](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738) * [CVE-2024-40954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954) * [CVE-2024-6232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232) * [CVE-2024-44986](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44986) * [CVE-2024-49884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49884) * [CVE-2024-40958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958) * [CVE-2024-49860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49860) * [CVE-2024-49983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49983) * [CVE-2024-45492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492) * [CVE-2024-47701](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47701) * [CVE-2024-43882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882) * [CVE-2024-48957](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48957) * [CVE-2024-47682](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47682) ## Fix The following Ubuntu vulnerabilities: are fixed in 1.31.0-gke.889: * [CVE-2022-48666](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48666) * [CVE-2023-52889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52889) * [CVE-2023-52918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52918) * [CVE-2024-25744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25744) * [CVE-2024-26607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607) * [CVE-2024-26661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26661) * [CVE-2024-26669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669) * [CVE-2024-26800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26800) * [CVE-2024-26893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26893) * [CVE-2024-36484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484) * [CVE-2024-38577](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38577) * [CVE-2024-38602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38602) * [CVE-2024-38611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38611) * [CVE-2024-39472](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472) * [CVE-2024-40915](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40915) * [CVE-2024-41011](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011) * [CVE-2024-41012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012) * [CVE-2024-41015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015) * [CVE-2024-41017](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017) * [CVE-2024-41019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41019) * [CVE-2024-41020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020) * [CVE-2024-41022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022) * [CVE-2024-41042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41042) * [CVE-2024-41059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059) * [CVE-2024-41060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060) * [CVE-2024-41063](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063) * [CVE-2024-41064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064) * [CVE-2024-41065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065) * [CVE-2024-41068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068) * [CVE-2024-41070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070) * [CVE-2024-41071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071) * [CVE-2024-41072](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072) * [CVE-2024-41073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073) * [CVE-2024-41077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077) * [CVE-2024-41078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078) * [CVE-2024-41081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081) * [CVE-2024-41090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090) * [CVE-2024-41091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091) * [CVE-2024-41098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098) * [CVE-2024-42114](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42114) * [CVE-2024-42126](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126) * [CVE-2024-42246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42246) * [CVE-2024-42259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259) * [CVE-2024-42265](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42265) * [CVE-2024-42267](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42267) * [CVE-2024-42269](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42269) * [CVE-2024-42270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42270) * [CVE-2024-42271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42271) * [CVE-2024-42272](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42272) * [CVE-2024-42274](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42274) * [CVE-2024-42276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42276) * [CVE-2024-42277](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42277) * [CVE-2024-42280](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42280) * [CVE-2024-42281](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42281) * [CVE-2024-42283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42283) * [CVE-2024-42284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284) * [CVE-2024-42285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42285) * [CVE-2024-42286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42286) * [CVE-2024-42287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42287) * [CVE-2024-42288](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42288) * [CVE-2024-42289](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42289) * [CVE-2024-42290](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42290) * [CVE-2024-42292](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42292) * [CVE-2024-42295](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42295) * [CVE-2024-42296](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42296) * [CVE-2024-42297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42297) * [CVE-2024-42299](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42299) * [CVE-2024-42301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301) * [CVE-2024-42302](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302) * [CVE-2024-42304](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42304) * [CVE-2024-42305](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42305) * [CVE-2024-42306](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42306) * [CVE-2024-42309](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309) * [CVE-2024-42310](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310) * [CVE-2024-42311](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42311) * [CVE-2024-42312](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312) * [CVE-2024-42313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42313) * [CVE-2024-42318](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42318) * [CVE-2024-43817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43817) * [CVE-2024-43828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43828) * [CVE-2024-43829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43829) * [CVE-2024-43830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43830) * [CVE-2024-43834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43834) * [CVE-2024-43835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43835) * [CVE-2024-43839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43839) * [CVE-2024-43841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43841) * [CVE-2024-43846](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43846) * [CVE-2024-43849](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43849) * [CVE-2024-43853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43853) * [CVE-2024-43854](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43854) * [CVE-2024-43856](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43856) * [CVE-2024-43858](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43858) * [CVE-2024-43860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43860) * [CVE-2024-43861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43861) * [CVE-2024-43863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43863) * [CVE-2024-43867](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43867) * [CVE-2024-43869](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43869) * [CVE-2024-43870](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43870) * [CVE-2024-43871](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871) * [CVE-2024-43873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873) * [CVE-2024-43875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43875) * [CVE-2024-43879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43879) * [CVE-2024-43880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43880) * [CVE-2024-43882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882) * [CVE-2024-43883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43883) * [CVE-2024-43884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43884) * [CVE-2024-43889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43889) * [CVE-2024-43890](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43890) * [CVE-2024-43892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892) * [CVE-2024-43893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43893) * [CVE-2024-43894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43894) * [CVE-2024-43902](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43902) * [CVE-2024-43905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43905) * [CVE-2024-43907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43907) * [CVE-2024-43908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43908) * [CVE-2024-43909](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43909) * [CVE-2024-43914](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43914) * [CVE-2024-44934](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44934) * [CVE-2024-44935](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44935) * [CVE-2024-44944](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44944) * [CVE-2024-44946](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44946) * [CVE-2024-44947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44947) * [CVE-2024-44948](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44948) * [CVE-2024-44954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44954) * [CVE-2024-44958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44958) * [CVE-2024-44960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44960) * [CVE-2024-44965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44965) * [CVE-2024-44966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44966) * [CVE-2024-44969](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44969) * [CVE-2024-44971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44971) * [CVE-2024-44974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44974) * [CVE-2024-44982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44982) * [CVE-2024-44983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44983) * [CVE-2024-44985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44985) * [CVE-2024-44986](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44986) * [CVE-2024-44987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44987) * [CVE-2024-44988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44988) * [CVE-2024-44989](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44989) * [CVE-2024-44990](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44990) * [CVE-2024-44995](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44995) * [CVE-2024-44998](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44998) * [CVE-2024-44999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44999) * [CVE-2024-45003](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45003) * [CVE-2024-45006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45006) * [CVE-2024-45007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45007) * [CVE-2024-45008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45008) * [CVE-2024-45009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45009) * [CVE-2024-45011](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45011) * [CVE-2024-45018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45018) * [CVE-2024-45021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45021) * [CVE-2024-45025](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45025) * [CVE-2024-45026](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45026) * [CVE-2024-45028](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45028) * [CVE-2024-46673](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46673) * [CVE-2024-46675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46675) * [CVE-2024-46676](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46676) * [CVE-2024-46677](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46677) * [CVE-2024-46679](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46679) * [CVE-2024-46685](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46685) * [CVE-2024-46689](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46689) * [CVE-2024-46702](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46702) * [CVE-2024-46707](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46707) * [CVE-2024-46713](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46713) * [CVE-2024-46714](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46714) * [CVE-2024-46719](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46719) * [CVE-2024-46721](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46721) * [CVE-2024-46722](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46722) * [CVE-2024-46723](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46723) * [CVE-2024-46724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724) * [CVE-2024-46725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46725) * [CVE-2024-46731](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46731) * [CVE-2024-46732](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46732) * [CVE-2024-46737](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737) * [CVE-2024-46738](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738) * [CVE-2024-46739](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739) * [CVE-2024-46740](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740) * [CVE-2024-46743](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743) * [CVE-2024-46744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744) * [CVE-2024-46745](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745) * [CVE-2024-46746](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746) * [CVE-2024-46747](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747) * [CVE-2024-46750](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750) * [CVE-2024-46752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752) * [CVE-2024-46755](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755) * [CVE-2024-46756](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756) * [CVE-2024-46757](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46757) * [CVE-2024-46758](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758) * [CVE-2024-46759](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759) * [CVE-2024-46761](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761) * [CVE-2024-46763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46763) * [CVE-2024-46771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771) * [CVE-2024-46777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777) * [CVE-2024-46780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780) * [CVE-2024-46781](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781) * [CVE-2024-46782](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46782) * [CVE-2024-46783](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783) * [CVE-2024-46791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791) * [CVE-2024-46795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795) * [CVE-2024-46798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798) * [CVE-2024-46800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800) * [CVE-2024-46804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46804) * [CVE-2024-46805](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46805) * [CVE-2024-46807](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46807) * [CVE-2024-46810](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46810) * [CVE-2024-46814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46814) * [CVE-2024-46815](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46815) * [CVE-2024-46817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46817) * [CVE-2024-46818](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46818) * [CVE-2024-46819](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46819) * [CVE-2024-46822](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46822) * [CVE-2024-46828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46828) * [CVE-2024-46829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46829) * [CVE-2024-46832](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46832) * [CVE-2024-46840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46840) * [CVE-2024-46844](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46844) * [CVE-2024-47659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47659) * [CVE-2024-47660](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47660) * [CVE-2024-47663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47663) * [CVE-2024-47665](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47665) * [CVE-2024-47667](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47667) * [CVE-2024-47668](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47668) * [CVE-2024-47669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47669) * [CVE-2024-27397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397) * [CVE-2024-38630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38630) * [CVE-2024-45016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45016) * [CVE-2022-48772](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772) * [CVE-2023-52884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52884) * [CVE-2023-52887](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52887) * [CVE-2024-23848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23848) * [CVE-2024-25741](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741) * [CVE-2024-31076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076) * [CVE-2024-33621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33621) * [CVE-2024-33847](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33847) * [CVE-2024-34027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34027) * [CVE-2024-34777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34777) * [CVE-2024-35247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247) * [CVE-2024-35927](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35927) * [CVE-2024-36014](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014) * [CVE-2024-36015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015) * [CVE-2024-36032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36032) * [CVE-2024-36270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270) * [CVE-2024-36286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286) * [CVE-2024-36489](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489) * [CVE-2024-36894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894) * [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971) * [CVE-2024-36972](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36972) * [CVE-2024-36974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974) * [CVE-2024-36978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978) * [CVE-2024-37078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078) * [CVE-2024-37356](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37356) * [CVE-2024-38381](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381) * [CVE-2024-38546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546) * [CVE-2024-38547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547) * [CVE-2024-38548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548) * [CVE-2024-38549](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549) * [CVE-2024-38550](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38550) * [CVE-2024-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552) * [CVE-2024-38555](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555) * [CVE-2024-38558](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558) * [CVE-2024-38559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559) * [CVE-2024-38560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560) * [CVE-2024-38565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565) * [CVE-2024-38567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567) * [CVE-2024-38571](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38571) * [CVE-2024-38573](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38573) * [CVE-2024-38578](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578) * [CVE-2024-38579](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579) * [CVE-2024-38580](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38580) * [CVE-2024-38582](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582) * [CVE-2024-38583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583) * [CVE-2024-38586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586) * [CVE-2024-38587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587) * [CVE-2024-38588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38588) * [CVE-2024-38589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589) * [CVE-2024-38590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590) * [CVE-2024-38591](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38591) * [CVE-2024-38596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596) * [CVE-2024-38597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597) * [CVE-2024-38598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598) * [CVE-2024-38599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599) * [CVE-2024-38601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601) * [CVE-2024-38605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605) * [CVE-2024-38607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38607) * [CVE-2024-38610](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38610) * [CVE-2024-38612](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38612) * [CVE-2024-38613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38613) * [CVE-2024-38615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615) * [CVE-2024-38618](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618) * [CVE-2024-38619](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619) * [CVE-2024-38621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621) * [CVE-2024-38623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38623) * [CVE-2024-38624](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38624) * [CVE-2024-38627](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627) * [CVE-2024-38633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633) * [CVE-2024-38634](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634) * [CVE-2024-38635](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635) * [CVE-2024-38637](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38637) * [CVE-2024-38659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659) * [CVE-2024-38661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661) * [CVE-2024-38662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662) * [CVE-2024-38780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780) * [CVE-2024-39276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276) * [CVE-2024-39277](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39277) * [CVE-2024-39301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301) * [CVE-2024-39466](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39466) * [CVE-2024-39467](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39467) * [CVE-2024-39468](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468) * [CVE-2024-39469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469) * [CVE-2024-39471](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471) * [CVE-2024-39475](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475) * [CVE-2024-39480](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39480) * [CVE-2024-39482](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482) * [CVE-2024-39487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487) * [CVE-2024-39488](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488) * [CVE-2024-39489](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489) * [CVE-2024-39490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490) * [CVE-2024-39493](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493) * [CVE-2024-39495](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39495) * [CVE-2024-39499](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499) * [CVE-2024-39500](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500) * [CVE-2024-39501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501) * [CVE-2024-39502](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502) * [CVE-2024-39503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39503) * [CVE-2024-39505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505) * [CVE-2024-39506](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506) * [CVE-2024-39507](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507) ## Fix Additional Ubuntu vulnerabilities fixed in 1.31.0-gke.889: * [CVE-2024-39509](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509) * [CVE-2024-40901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901) * [CVE-2024-40902](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902) * [CVE-2024-40904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904) * [CVE-2024-40905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905) * [CVE-2024-40908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40908) * [CVE-2024-40911](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911) * [CVE-2024-40912](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912) * [CVE-2024-40914](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40914) * [CVE-2024-40916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916) * [CVE-2024-40927](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927) * [CVE-2024-40929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929) * [CVE-2024-40931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931) * [CVE-2024-40932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932) * [CVE-2024-40934](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934) * [CVE-2024-40937](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937) * [CVE-2024-40941](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941) * [CVE-2024-40942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942) * [CVE-2024-40943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943) * [CVE-2024-40945](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945) * [CVE-2024-40954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954) * [CVE-2024-40956](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956) * [CVE-2024-40957](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40957) * [CVE-2024-40958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958) * [CVE-2024-40959](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959) * [CVE-2024-40960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960) * [CVE-2024-40961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961) * [CVE-2024-40963](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40963) * [CVE-2024-40967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967) * [CVE-2024-40968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40968) * [CVE-2024-40970](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40970) * [CVE-2024-40971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40971) * [CVE-2024-40974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40974) * [CVE-2024-40976](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976) * [CVE-2024-40978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978) * [CVE-2024-40980](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980) * [CVE-2024-40981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981) * [CVE-2024-40983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983) * [CVE-2024-40984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984) * [CVE-2024-40987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987) * [CVE-2024-40988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988) * [CVE-2024-40990](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990) * [CVE-2024-40994](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994) * [CVE-2024-40995](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995) * [CVE-2024-41000](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000) * [CVE-2024-41002](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41002) * [CVE-2024-41004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004) * [CVE-2024-41005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41005) * [CVE-2024-41006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006) * [CVE-2024-41007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007) * [CVE-2024-41027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41027) * [CVE-2024-41034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034) * [CVE-2024-41035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035) * [CVE-2024-41040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040) * [CVE-2024-41041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041) * [CVE-2024-41044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044) * [CVE-2024-41046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046) * [CVE-2024-41047](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41047) * [CVE-2024-41048](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048) * [CVE-2024-41049](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049) * [CVE-2024-41055](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055) * [CVE-2024-41087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087) * [CVE-2024-41089](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41089) * [CVE-2024-41092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41092) * [CVE-2024-41093](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41093) * [CVE-2024-41095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41095) * [CVE-2024-41097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41097) * [CVE-2024-42068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068) * [CVE-2024-42070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070) * [CVE-2024-42076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42076) * [CVE-2024-42077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077) * [CVE-2024-42080](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42080) * [CVE-2024-42082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42082) * [CVE-2024-42084](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42084) * [CVE-2024-42085](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42085) * [CVE-2024-42086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42086) * [CVE-2024-42087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42087) * [CVE-2024-42089](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42089) * [CVE-2024-42090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42090) * [CVE-2024-42092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42092) * [CVE-2024-42093](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093) * [CVE-2024-42094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42094) * [CVE-2024-42095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42095) * [CVE-2024-42096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096) * [CVE-2024-42097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42097) * [CVE-2024-42098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42098) * [CVE-2024-42101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101) * [CVE-2024-42102](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102) * [CVE-2024-42104](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104) * [CVE-2024-42105](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105) * [CVE-2024-42106](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106) * [CVE-2024-42109](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109) * [CVE-2024-42115](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115) * [CVE-2024-42119](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119) * [CVE-2024-42120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120) * [CVE-2024-42121](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121) * [CVE-2024-42124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124) * [CVE-2024-42127](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127) * [CVE-2024-42130](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130) * [CVE-2024-42131](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131) * [CVE-2024-42137](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137) * [CVE-2024-42140](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42140) * [CVE-2024-42145](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145) * [CVE-2024-42148](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148) * [CVE-2024-42152](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152) * [CVE-2024-42153](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153) * [CVE-2024-42154](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154) * [CVE-2024-42157](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157) * [CVE-2024-42161](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161) * [CVE-2024-42223](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223) * [CVE-2024-42224](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224) * [CVE-2024-42225](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225) * [CVE-2024-42229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229) * [CVE-2024-42232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232) * [CVE-2024-42236](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236) * [CVE-2024-42240](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240) * [CVE-2024-42244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244) * [CVE-2024-42247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247) * [CVE-2023-52629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52629) * [CVE-2023-52760](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52760) * [CVE-2024-26680](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26680) * [CVE-2024-26830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830) * [CVE-2024-26921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26921) * [CVE-2024-36901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901) * [CVE-2024-39292](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39292) * [CVE-2024-39484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484) * [CVE-2023-52585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52585) * [CVE-2023-52882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52882) * [CVE-2024-26900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26900) * [CVE-2024-26936](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26936) * [CVE-2024-26980](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26980) * [CVE-2024-27398](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398) * [CVE-2024-27399](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27399) * [CVE-2024-27401](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27401) * [CVE-2024-35848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848) * [CVE-2024-35947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35947) * [CVE-2024-36017](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36017) * [CVE-2024-36031](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36031) * [CVE-2024-36880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36880) * [CVE-2024-36883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883) * [CVE-2024-36886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886) * [CVE-2024-36889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889) * [CVE-2024-36897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36897) * [CVE-2024-36902](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902) * [CVE-2024-36904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904) * [CVE-2024-36905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36905) * [CVE-2024-36906](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36906) * [CVE-2024-36916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36916) * [CVE-2024-36919](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919) * [CVE-2024-36928](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36928) * [CVE-2024-36929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36929) * [CVE-2024-36931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36931) * [CVE-2024-36933](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36933) * [CVE-2024-36934](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36934) * [CVE-2024-36937](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36937) * [CVE-2024-36938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938) * [CVE-2024-36939](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939) * [CVE-2024-36940](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36940) * [CVE-2024-36941](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941) * [CVE-2024-36944](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36944) * [CVE-2024-36946](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946) * [CVE-2024-36947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36947) * [CVE-2024-36950](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950) * [CVE-2024-36952](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952) * [CVE-2024-36953](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953) * [CVE-2024-36954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954) * [CVE-2024-36955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36955) * [CVE-2024-36957](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36957) * [CVE-2024-36959](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959) * [CVE-2024-36960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36960) * [CVE-2024-36964](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36964) * [CVE-2024-36965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36965) * [CVE-2024-36967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36967) * [CVE-2024-36969](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36969) * [CVE-2024-36975](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36975) * [CVE-2024-38600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38600) * [CVE-2023-52752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52752) * [CVE-2024-25742](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742) * [CVE-2024-26886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26886) * [CVE-2024-26952](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26952) * [CVE-2024-27017](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27017) * [CVE-2024-36016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016) * [CVE-2022-38096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096) * [CVE-2023-52488](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488) * [CVE-2023-52699](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52699) * [CVE-2023-52880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52880) * [CVE-2024-23307](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307) * [CVE-2024-24857](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857) * [CVE-2024-24858](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858) * [CVE-2024-24859](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24859) * [CVE-2024-24861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861) * [CVE-2024-25739](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25739) * [CVE-2024-26629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629) * [CVE-2024-26642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642) * [CVE-2024-26654](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654) * [CVE-2024-26687](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687) * [CVE-2024-26810](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810) * [CVE-2024-26811](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26811) * [CVE-2024-26812](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812) * [CVE-2024-26813](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813) * [CVE-2024-26814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814) * [CVE-2024-26817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817) * [CVE-2024-26828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828) * [CVE-2024-26922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922) * [CVE-2024-26923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923) * [CVE-2024-26925](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925) * [CVE-2024-26926](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926) * [CVE-2024-26929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929) * [CVE-2024-26931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931) * [CVE-2024-26934](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934) * [CVE-2024-26935](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935) * [CVE-2024-26937](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937) * [CVE-2024-26950](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950) * [CVE-2024-26951](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951) * [CVE-2024-26955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955) * [CVE-2024-26956](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956) * [CVE-2024-26957](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957) * [CVE-2024-26958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958) * [CVE-2024-26960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960) * [CVE-2024-26961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961) * [CVE-2024-26964](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26964) * [CVE-2024-26965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965) * [CVE-2024-26966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966) * [CVE-2024-26969](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969) * [CVE-2024-26970](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970) * [CVE-2024-26973](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973) * [CVE-2024-26974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974) * [CVE-2024-26976](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976) * [CVE-2024-26977](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26977) * [CVE-2024-26981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981) * [CVE-2024-26984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984) * [CVE-2024-26988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988) * [CVE-2024-26989](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26989) * [CVE-2024-26993](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993) * [CVE-2024-26994](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994) * [CVE-2024-26996](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26996) * [CVE-2024-26999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999) * [CVE-2024-27000](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000) * [CVE-2024-27001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001) * [CVE-2024-27004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004) * [CVE-2024-27008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008) * [CVE-2024-27009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27009) * [CVE-2024-27013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013) * [CVE-2024-27015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27015) * [CVE-2024-27016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27016) * [CVE-2024-27018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27018) * [CVE-2024-27019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019) * [CVE-2024-27020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020) * [CVE-2024-27059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059) * [CVE-2024-27393](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27393) * [CVE-2024-27395](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27395) * [CVE-2024-27396](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27396) * [CVE-2024-27437](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437) * [CVE-2024-35785](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35785) * [CVE-2024-35789](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789) * [CVE-2024-35791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35791) * [CVE-2024-35796](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35796) * [CVE-2024-35804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35804) * [CVE-2024-35805](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35805) * [CVE-2024-35806](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35806) * [CVE-2024-35807](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35807) * [CVE-2024-35809](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35809) * [CVE-2024-35813](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35813) * [CVE-2024-35815](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35815) * [CVE-2024-35817](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35817) * [CVE-2024-35819](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35819) * [CVE-2024-35821](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35821) * [CVE-2024-35822](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35822) * [CVE-2024-35823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35823) * [CVE-2024-35825](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35825) * [CVE-2024-35847](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35847) * [CVE-2024-35849](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35849) * [CVE-2024-35851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35851) * [CVE-2024-35852](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35852) * [CVE-2024-35853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853) * [CVE-2024-35854](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854) * [CVE-2024-35855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855) * [CVE-2024-35857](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35857) * [CVE-2024-35871](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35871) * [CVE-2024-35872](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35872) * [CVE-2024-35877](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35877) * [CVE-2024-35879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35879) * [CVE-2024-35884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35884) * [CVE-2024-35885](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35885) * [CVE-2024-35886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35886) * [CVE-2024-35888](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888) * [CVE-2024-35890](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890) * [CVE-2024-35893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893) * [CVE-2024-35895](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35895) * [CVE-2024-35896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35896) * [CVE-2024-35897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35897) * [CVE-2024-35898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35898) * [CVE-2024-35899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899) * [CVE-2024-35900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35900) * [CVE-2024-35902](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35902) * [CVE-2024-35905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35905) * [CVE-2024-35907](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35907) * [CVE-2024-35910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35910) * [CVE-2024-35912](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35912) * [CVE-2024-35915](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35915) * [CVE-2024-35922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35922) * [CVE-2024-35925](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35925) * [CVE-2024-35930](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35930) * [CVE-2024-35933](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35933) * [CVE-2024-35934](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934) * [CVE-2024-35935](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35935) * [CVE-2024-35936](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35936) * [CVE-2024-35938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35938) * [CVE-2024-35940](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35940) * [CVE-2024-35944](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35944) * [CVE-2024-35950](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35950) * [CVE-2024-35955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35955) * [CVE-2024-35958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958) * [CVE-2024-35960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960) * [CVE-2024-35969](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35969) * [CVE-2024-35970](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35970) * [CVE-2024-35973](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35973) * [CVE-2024-35976](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35976) * [CVE-2024-35978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35978) * [CVE-2024-35982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35982) * [CVE-2024-35984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35984) * [CVE-2024-35988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35988) * [CVE-2024-35989](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35989) * [CVE-2024-35990](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35990) * [CVE-2024-35997](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35997) * [CVE-2024-36004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004) * [CVE-2024-36005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36005) * [CVE-2024-36006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36006) * [CVE-2024-36007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36007) * [CVE-2024-36008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36008) * [CVE-2024-36020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36020) * [CVE-2024-36025](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36025) * [CVE-2024-36029](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36029)