ALSA-2024:4352

See a problem?
Source
https://errata.almalinux.org/8/ALSA-2024-4352.html
Import Source
https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4352.json
JSON Data
https://api.osv.dev/v1/vulns/ALSA-2024:4352
Related
  • CVE-2020-26555
  • CVE-2021-46909
  • CVE-2021-46972
  • CVE-2021-47069
  • CVE-2021-47073
  • CVE-2021-47236
  • CVE-2021-47310
  • CVE-2021-47311
  • CVE-2021-47353
  • CVE-2021-47356
  • CVE-2021-47456
  • CVE-2021-47495
  • CVE-2023-5090
  • CVE-2023-52464
  • CVE-2023-52560
  • CVE-2023-52615
  • CVE-2023-52626
  • CVE-2023-52667
  • CVE-2023-52700
  • CVE-2023-52703
  • CVE-2023-52781
  • CVE-2023-52813
  • CVE-2023-52835
  • CVE-2023-52877
  • CVE-2023-52878
  • CVE-2023-52881
  • CVE-2024-26583
  • CVE-2024-26584
  • CVE-2024-26585
  • CVE-2024-26656
  • CVE-2024-26675
  • CVE-2024-26735
  • CVE-2024-26759
  • CVE-2024-26801
  • CVE-2024-26804
  • CVE-2024-26826
  • CVE-2024-26859
  • CVE-2024-26906
  • CVE-2024-26907
  • CVE-2024-26974
  • CVE-2024-26982
  • CVE-2024-27397
  • CVE-2024-27410
  • CVE-2024-35789
  • CVE-2024-35835
  • CVE-2024-35838
  • CVE-2024-35845
  • CVE-2024-35852
  • CVE-2024-35853
  • CVE-2024-35854
  • CVE-2024-35855
  • CVE-2024-35888
  • CVE-2024-35890
  • CVE-2024-35958
  • CVE-2024-35959
  • CVE-2024-35960
  • CVE-2024-36004
  • CVE-2024-36007
Published
2024-07-08T00:00:00Z
Modified
2024-07-08T18:07:21Z
Summary
Important: kernel-rt security and bug fix update
Details

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: tls (CVE-2024-26585,CVE-2024-26584, CVE-2024-26583
  • kernel-rt: kernel: PCI interrupt mapping cause oops [almalinux-8] (CVE-2021-46909)
  • kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069)
  • kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng (CVE-2023-52615)
  • kernel-rt: kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656)
  • kernel: Bluetooth: Avoid potential use-after-free in hcierrorreset CVE-2024-26801)
  • kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)
  • kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)
  • kernel: wifi: mac80211: (CVE-2024-35789, CVE-2024-35838, CVE-2024-35845)
  • kernel: wifi: nl80211: reject iftype change with mesh ID change (CVE-2024-27410)
  • kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835)
  • kernel:TCP-spoofed ghost ACKs and leak initial sequence number (CVE-2023-52881)
  • kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)
  • kernel: ovl: fix leaked dentry (CVE-2021-46972)
  • kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073)
  • kernel: mm/damon/vaddr-test: memory leak in damondotestapplythree_regions() (CVE-2023-52560)
  • kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)
  • kernel: mm/swap: fix race when skipping swapcache (CVE-2024-26759)
  • kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)
  • kernel: x86/mm: Disallow vsyscall page read for copyfromkernel_nofault() (CVE-2024-26906)
  • kernel: net: ip_tunnel: prevent perpetual headroom growth (CVE-2024-26804)
  • kernel: net/usb: kalmia: avoid printing uninitialized value on error path (CVE-2023-52703)
  • kernel: KVM: SVM: improper check in svmsetx2apicmsrinterception allows direct access to host x2apic msrs (CVE-2023-5090)
  • kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464)
  • kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)
  • kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)
  • kernel: net/bnx2x: Prevent access to a freed page in page_pool (CVE-2024-26859)
  • kernel: crypto: (CVE-2024-26974, CVE-2023-52813)
  • kernel: can: (CVE-2023-52878, CVE-2021-47456)
  • kernel: usb: (CVE-2023-52781, CVE-2023-52877)
  • kernel: net/mlx5e: fix a potential double-free in fsanycreate_groups (CVE-2023-52667)
  • kernel: usbnet: sanity check for maxpacket (CVE-2021-47495)
  • kernel: gro: fix ownership transfer (CVE-2024-35890)
  • kernel: erspan: make sure erspanbasehdr is present in skb->head (CVE-2024-35888)
  • kernel: tipc: fix kernel warning when sending SYN message (CVE-2023-52700)
  • kernel: net/mlx5/mlxsw: (CVE-2024-35960, CVE-2024-36007, CVE-2024-35855)
  • kernel: net/mlx5e: (CVE-2024-35959, CVE-2023-52626, CVE-2024-35835)
  • kernel: mlxsw: (CVE-2024-35854, CVE-2024-35853, CVE-2024-35852)
  • kernel: net: (CVE-2024-35958, CVE-2021-47311, CVE-2021-47236, CVE-2021-47310)
  • kernel: i40e: Do not use WQMEMRECLAIM flag for workqueue (CVE-2024-36004)
  • kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)
  • kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353)

Bug Fix(es):

  • kernel-rt: update RT source tree to the latest AlmaLinux-8.10.z kernel (JIRA:AlmaLinux-40882)
  • [almalinux8.9][cxgb4]BUG: using smpprocessorid() in preemptible [00000000] code: ethtool/54735 (JIRA:AlmaLinux-8779)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References

Affected packages

AlmaLinux:8 / kernel-rt

Package

Name
kernel-rt

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10

AlmaLinux:8 / kernel-rt-core

Package

Name
kernel-rt-core

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10

AlmaLinux:8 / kernel-rt-debug

Package

Name
kernel-rt-debug

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10

AlmaLinux:8 / kernel-rt-debug-core

Package

Name
kernel-rt-debug-core

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10

AlmaLinux:8 / kernel-rt-debug-devel

Package

Name
kernel-rt-debug-devel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10

AlmaLinux:8 / kernel-rt-debug-kvm

Package

Name
kernel-rt-debug-kvm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10

AlmaLinux:8 / kernel-rt-debug-modules

Package

Name
kernel-rt-debug-modules

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10

AlmaLinux:8 / kernel-rt-debug-modules-extra

Package

Name
kernel-rt-debug-modules-extra

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10

AlmaLinux:8 / kernel-rt-devel

Package

Name
kernel-rt-devel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10

AlmaLinux:8 / kernel-rt-kvm

Package

Name
kernel-rt-kvm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10

AlmaLinux:8 / kernel-rt-modules

Package

Name
kernel-rt-modules

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10

AlmaLinux:8 / kernel-rt-modules-extra

Package

Name
kernel-rt-modules-extra

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.18.0-553.8.1.rt7.349.el8_10