Lucene search

K
redhatRedHatRHSA-2024:5673
HistoryAug 21, 2024 - 12:10 a.m.

(RHSA-2024:5673) Important: kernel-rt security update

2024-08-2100:10:13
access.redhat.com
9
real time linux kernel
security update
cves
bug fixes
kernel-rt
fine-tuning
determinism requirements
efivarfs
igc
mm/hugetlb
bpf
sockmap
net
mlx5e
virtio-net
nfsv4
ice
rhel-9.2
jira:rhel-54222

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

9.3

Confidence

High

EPSS

0

Percentile

16.4%

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)

  • kernel: igc: avoid returning frame twice in XDP_REDIRECT (CVE-2024-26853)

  • kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000)

  • kernel: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (CVE-2023-52735)

  • kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883)

  • kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608)

  • kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995)

  • kernel: virtio-net: tap: mlx5_core short frame denial of service (CVE-2024-41090)

  • kernel: virtio-net: tun: mlx5_core short frame denial of service (CVE-2024-41091)

  • kernel: NFSv4: Fix memory leak in nfs4_set_security_label (CVE-2024-41076)

  • kernel: ice: Don't process extts if PTP is disabled (CVE-2024-42107)

Bug Fix(es):

  • kernel-rt: update RT source tree to the latest RHEL-9.2 ad hoc schedule build (JIRA:RHEL-54222)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

9.3

Confidence

High

EPSS

0

Percentile

16.4%