Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3840-1 | linux security update |
Debian DLA |
DLA-3842-1 | linux-5.10 security update |
Debian DSA |
DSA-5658-1 | linux security update |
Debian DSA |
DSA-5681-1 | linux security update |
EUVD |
EUVD-2024-16136 | A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file. |
Ubuntu USN |
USN-6681-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6681-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6681-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6681-4 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6686-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6686-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6686-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6686-4 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-6686-5 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6688-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6705-1 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6716-1 | Linux kernel (Azure) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_eus:9.4 |
Wed, 14 May 2025 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Eus
|
|
| CPEs | cpe:/a:redhat:rhel_eus:9.4::appstream cpe:/a:redhat:rhel_eus:9.4::crb cpe:/a:redhat:rhel_eus:9.4::nfv cpe:/a:redhat:rhel_eus:9.4::realtime cpe:/o:redhat:rhel_eus:9.4::baseos |
|
| Vendors & Products |
Redhat rhel Eus
|
|
| References |
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 13 Nov 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 |
Tue, 12 Nov 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9::appstream cpe:/a:redhat:enterprise_linux:9::crb cpe:/a:redhat:enterprise_linux:9::nfv cpe:/a:redhat:enterprise_linux:9::realtime cpe:/o:redhat:enterprise_linux:9::baseos |
|
| References |
|
Sat, 14 Sep 2024 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-07T17:06:21.545Z
Reserved: 2024-01-09T12:08:22.012Z
Link: CVE-2024-0340
Updated: 2024-08-01T18:04:49.242Z
Status : Modified
Published: 2024-01-09T18:15:47.503
Modified: 2025-05-14T04:16:07.260
Link: CVE-2024-0340
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN