The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: Local information disclosure on Intel(R) Atom(R) processors (CVE-2023-28746)
- kernel: netfilter: nftflowoffload: reset dst in route object after setting up flow (CVE-2024-27403)
- kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (CVE-2023-52658)
- kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (CVE-2024-35989)
- kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47385)
- kernel: mptcp: ensure snd_nxt is properly initialized on connect (CVE-2024-36889)
- kernel: net: sched: schmultiq: fix possible OOB write in multiqtune() (CVE-2024-36978)
- kernel: net/mlx5: Add a timeout to acquire the command queue semaphore (CVE-2024-38556)
- kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (CVE-2024-39483)
- kernel: ionic: fix use after netifnapidel() (CVE-2024-39502)
- kernel: xfrm6: check ip6dstidev() return value in xfrm6getsaddr() (CVE-2024-40959)
- kernel: gfs2: Fix NULL pointer dereference in gfs2logflush (CVE-2024-42079)
- kernel: sched: actct: take care of padding in struct zonesht_key (CVE-2024-42272)
- kernel: tipc: Return non-zero value from tipcudpaddr2str() on error (CVE-2024-42284)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.