RLSA-2024:8617

Source
https://errata.rockylinux.org/RLSA-2024:8617
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:8617.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:8617
Related
Published
2024-11-08T15:57:49.260064Z
Modified
2024-11-08T15:59:32.848646Z
Summary
Moderate: kernel security update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • hw: cpu: intel: Native Branch History Injection (BHI) (CVE-2024-2201)

  • kernel: tcp: add sanity checks to rx zerocopy (CVE-2024-26640)

  • kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)

  • kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923)

  • kernel: mac802154: fix llsec key resources release in mac802154llseckey_del (CVE-2024-26961)

  • kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935)

  • kernel: tty: Fix out-of-bound vmalloc access in imageblit (CVE-2021-47383)

  • kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too (CVE-2024-36244)

  • kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup (CVE-2024-39472)

  • kernel: netfilter: nft_inner: validate mandatory meta and payload (CVE-2024-39504)

  • kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CVE-2024-40904)

  • kernel: mptcp: ensure snd_una is properly initialized on connect (CVE-2024-40931)

  • kernel: ipv6: prevent possible NULL dereference in rt6_probe() (CVE-2024-40960)

  • kernel: ext4: do not create EA inode under buffer lock (CVE-2024-40972)

  • kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CVE-2024-40977)

  • kernel: net/sched: actapi: fix possible infinite loop in tcfidrcheckalloc() (CVE-2024-40995)

  • kernel: ext4: fix uninitialized ratelimitstate->lock access in _ext4fillsuper() (CVE-2024-40998)

  • kernel: netpoll: Fix race condition in netpollowneractive (CVE-2024-41005)

  • kernel: xfs: don't walk off the end of a directory data block (CVE-2024-41013)

  • kernel: xfs: add bounds checking to xlogrecoverprocess_data (CVE-2024-41014)

  • kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854)

  • kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / kernel

Package

Name
kernel
Purl
pkg:rpm/rocky-linux/kernel?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:5.14.0-427.42.1.el9_4