RLSA-2024:4583

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:4583.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:4583
Related
Published
2024-07-26T12:33:50.717957Z
Modified
2024-07-26T12:35:20.082125Z
Summary
Important: kernel security update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)

  • kernel: ethernet: hisilicon: hns: hnsdsafmisc: fix a possible array overflow in hnsdsafgesrstby_port() (CVE-2021-47548)

  • kernel: net: hns3: fix use-after-free bug in hclgevfsendmbx_msg (CVE-2021-47596)

  • kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627)

  • kernel: can: j1939: prevent deadlock by changing j1939sockslock to rwlock (CVE-2023-52638)

  • kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index (CVE-2024-26783)

  • kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (CVE-2024-26858)

  • kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)

  • kernel: nvme: fix reconnection fail due to reserved tag allocation (CVE-2024-27435)

  • kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958)

  • kernel: tcp: Use refcountincnotzero() in tcptwsk_unique(). (CVE-2024-36904)

  • kernel: lib/testhmm.c: handle srcpfns and dst_pfns allocation failure (CVE-2024-38543)

  • kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586)

  • kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 (CVE-2024-38593)

  • kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270)

  • kernel: octeontx2-af: avoid off-by-one read from userspace (CVE-2024-36957)

  • kernel: blk-cgroup: fix list corruption from resetting io stat (CVE-2024-38663)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / kernel

Package

Name
kernel
Purl
pkg:rpm/rocky-linux/kernel?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:5.14.0-427.26.1.el9_4