INFSA-2024:3618: kernel update (Moderate)

Information about definition

Identificator: INFSA-2024:3618

Type: security

Release date: 2024-10-10 10:33:49 UTC

Information about package

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Vulnerabilities description

  • CVE-2019-25162

    In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free.

  • CVE-2020-36777

    In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: Fix memory leak in dvb_media_device_free().

  • CVE-2021-46934

    In the Linux kernel, the following vulnerability has been resolved: i2c: validate user data in compat ioctl.

  • CVE-2021-47013

    In the Linux kernel, the following vulnerability has been resolved: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send.

  • CVE-2021-47055

    In the Linux kernel, the following vulnerability has been resolved: mtd: require write permissions for locking and badblock ioctls.

  • CVE-2021-47118

    In the Linux kernel, the following vulnerability has been resolved: pid: take a reference when initializing `cad_pid`.

  • CVE-2021-47153

    In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Don't generate an interrupt on bus reset.

  • CVE-2021-47171

    In the Linux kernel, the following vulnerability has been resolved: net: usb: fix memory leak in smsc75xx_bind.

  • CVE-2021-47185

    In the Linux kernel, the following vulnerability has been resolved: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc.

  • CVE-2022-48627

    In the Linux kernel, the following vulnerability has been resolved: vt: fix memory overlapping when deleting chars in the buffer.

  • CVE-2023-52439

    In the Linux kernel, the following vulnerability has been resolved: uio: Fix use-after-free in uio_open.

  • CVE-2023-52445

    In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix use after free on context disconnection.

  • CVE-2023-52477

    In the Linux kernel, the following vulnerability has been resolved: usb: hub: Guard against accesses to uninitialized BOS descriptors.

  • CVE-2023-52513

    In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix connection failure handling.

  • CVE-2023-52520

    In the Linux kernel, the following vulnerability has been resolved: platform/x86: think-lmi: Fix reference leak.

  • CVE-2023-52528

    In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg.

  • CVE-2023-52565

    In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix OOB read.

  • CVE-2023-52578

    In the Linux kernel, the following vulnerability has been resolved: net: bridge: use DEV_STATS_INC().

  • CVE-2023-52594

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus().

  • CVE-2023-52595

    In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset.

  • CVE-2023-52610

    In the Linux kernel, the following vulnerability has been resolved: net/sched: act_ct: fix skb leak and crash on ooo frags.

  • CVE-2023-6240

    A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. This issue may allow a network attacker to decrypt ciphertexts or forge signatures, limiting the services that use that private key.

  • CVE-2024-0340

    A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.

  • CVE-2024-23307

    Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.

  • CVE-2024-25744

    In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.

  • CVE-2024-26593

    In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Fix block process call transactions.

  • CVE-2024-26603

    In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Stop relying on userspace for info to fault in xsave buffer.

  • CVE-2024-26610

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix a memory corruption.

  • CVE-2024-26615

    In the Linux kernel, the following vulnerability has been resolved: net/smc: fix illegal rmb_desc access in SMC-D connection dump.

  • CVE-2024-26642

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag.

  • CVE-2024-26643

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout.

  • CVE-2024-26659

    In the Linux kernel, the following vulnerability has been resolved: xhci: handle isoc Babble and Buffer Overrun events properly.

  • CVE-2024-26664

    In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Fix out-of-bounds memory access.

  • CVE-2024-26693

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix a crash when we run out of stations.

  • CVE-2024-26694

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix double-free bug.

  • CVE-2024-26743

    In the Linux kernel, the following vulnerability has been resolved: RDMA/qedr: Fix qedr_create_user_qp error flow.

  • CVE-2024-26744

    In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Support specifying the srpt_service_guid parameter.

  • CVE-2024-26779

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix race condition on enabling fast-xmit.

  • CVE-2024-26872

    In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup.

  • CVE-2024-26892

    In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921e: fix use-after-free in free_irq().

  • CVE-2024-26897

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete.

  • CVE-2024-26901

    In the Linux kernel, the following vulnerability has been resolved: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak.

  • CVE-2024-26919

    In the Linux kernel, the following vulnerability has been resolved: usb: ulpi: Fix debugfs directory leak.

  • CVE-2024-26933

    In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix deadlock in port "disable" sysfs attribute.

  • CVE-2024-26934

    In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix deadlock in usb_deauthorize_interface().

  • CVE-2024-26964

    In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Add error handling in xhci_map_urb_for_dma.

  • CVE-2024-26973

    In the Linux kernel, the following vulnerability has been resolved: fat: fix uninitialized field in nostale filehandles.

  • CVE-2024-26993

    In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection().

  • CVE-2024-27014

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Prevent deadlock while disabling aRFS.

  • CVE-2024-27048

    In the Linux kernel, the following vulnerability has been resolved: wifi: brcm80211: handle pmk_op allocation failure.

  • CVE-2024-27052

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work.

  • CVE-2024-27056

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: ensure offloading TID queue exists.

  • CVE-2024-27059

    In the Linux kernel, the following vulnerability has been resolved: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command.

Severity level

CVE Score CVSS 2.0 Score CVSS 3.x Score CVSS 4.0
no information 7.8 no information
no information 5.5 no information
no information 4.4 no information
no information 7.0 no information
no information 0.0 no information
no information 4.1 no information
no information 5.2 no information
no information 4.4 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 7.0 no information
no information 3.0 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 3.3 no information
no information 4.7 no information
no information 4.4 no information
no information 4.4 no information
no information 6.0 no information
no information 7.1 no information
no information 5.5 no information
no information 6.4 no information
NIST — CVE-2023-6240
no information 6.5 no information
NIST — CVE-2024-0340
no information 4.4 no information
no information 4.4 no information
no information 5.6 no information
no information 4.4 no information
no information 5.5 no information
no information 6.1 no information
no information 5.5 no information
no information 4.7 no information
no information 4.7 no information
no information 4.1 no information
no information 6.0 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 4.1 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
Critical, important, moderate, low

Updated packages