Lucene search

K
redhatRedHatRHSA-2024:6567
HistorySep 11, 2024 - 12:05 a.m.

(RHSA-2024:6567) Moderate: kernel security update

2024-09-1100:05:08
access.redhat.com
9
linux kernel
cve fixes
security update
moderate
efivarfs
nfsd
cachestat
bluetooth
kprobes
kvm
mm
x86
net
regmap
usb-storage
scsi
xhci
cxl
ppp
pci/msi
xdp
nvme

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

AI Score

7.6

Confidence

Low

EPSS

0.001

Percentile

17.8%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)

  • kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629)

  • kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630)

  • kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720)

  • kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886)

  • kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946)

  • kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (CVE-2024-35791)

  • kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797)

  • kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875)

  • kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000)

  • kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801)

  • kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883)

  • kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019)

  • kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619)

  • kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979)

  • kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559)

  • kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927)

  • kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936)

  • kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040)

  • kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044)

  • kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055)

  • kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096)

  • kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082)

  • kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096)

  • kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (CVE-2024-42102)

  • kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131)

  • kernel: nvme: avoid double free special payload (CVE-2024-41073)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

AI Score

7.6

Confidence

Low

EPSS

0.001

Percentile

17.8%