INFSA-2024:3627: kernel-rt security update
Information about definition
Identificator: INFSA-2024:3627
Type: security
Release date: 2024-10-10 10:34:13 UTC
Information about package
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Vulnerabilities description
- CVE-2019-25162
In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free.
- CVE-2020-36777
In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: Fix memory leak in dvb_media_device_free().
- CVE-2021-46934
In the Linux kernel, the following vulnerability has been resolved: i2c: validate user data in compat ioctl.
- CVE-2021-47013
In the Linux kernel, the following vulnerability has been resolved: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send.
- CVE-2021-47055
In the Linux kernel, the following vulnerability has been resolved: mtd: require write permissions for locking and badblock ioctls.
- CVE-2021-47118
In the Linux kernel, the following vulnerability has been resolved: pid: take a reference when initializing `cad_pid`.
- CVE-2021-47153
In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Don't generate an interrupt on bus reset.
- CVE-2021-47171
In the Linux kernel, the following vulnerability has been resolved: net: usb: fix memory leak in smsc75xx_bind.
- CVE-2021-47185
In the Linux kernel, the following vulnerability has been resolved: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc.
- CVE-2022-48627
In the Linux kernel, the following vulnerability has been resolved: vt: fix memory overlapping when deleting chars in the buffer.
- CVE-2023-52439
In the Linux kernel, the following vulnerability has been resolved: uio: Fix use-after-free in uio_open.
- CVE-2023-52445
In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix use after free on context disconnection.
- CVE-2023-52477
In the Linux kernel, the following vulnerability has been resolved: usb: hub: Guard against accesses to uninitialized BOS descriptors.
- CVE-2023-52513
In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix connection failure handling.
- CVE-2023-52520
In the Linux kernel, the following vulnerability has been resolved: platform/x86: think-lmi: Fix reference leak.
- CVE-2023-52528
In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg.
- CVE-2023-52565
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix OOB read.
- CVE-2023-52578
In the Linux kernel, the following vulnerability has been resolved: net: bridge: use DEV_STATS_INC().
- CVE-2023-52594
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus().
- CVE-2023-52595
In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset.
- CVE-2023-52610
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_ct: fix skb leak and crash on ooo frags.
- CVE-2023-6240
A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. This issue may allow a network attacker to decrypt ciphertexts or forge signatures, limiting the services that use that private key.
- CVE-2024-0340
A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
- CVE-2024-23307
Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.
- CVE-2024-25744
In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.
- CVE-2024-26593
In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Fix block process call transactions.
- CVE-2024-26603
In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Stop relying on userspace for info to fault in xsave buffer.
- CVE-2024-26610
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix a memory corruption.
- CVE-2024-26615
In the Linux kernel, the following vulnerability has been resolved: net/smc: fix illegal rmb_desc access in SMC-D connection dump.
- CVE-2024-26642
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag.
- CVE-2024-26643
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout.
- CVE-2024-26659
In the Linux kernel, the following vulnerability has been resolved: xhci: handle isoc Babble and Buffer Overrun events properly.
- CVE-2024-26664
In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Fix out-of-bounds memory access.
- CVE-2024-26693
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix a crash when we run out of stations.
- CVE-2024-26694
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix double-free bug.
- CVE-2024-26743
In the Linux kernel, the following vulnerability has been resolved: RDMA/qedr: Fix qedr_create_user_qp error flow.
- CVE-2024-26744
In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Support specifying the srpt_service_guid parameter.
- CVE-2024-26779
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix race condition on enabling fast-xmit.
- CVE-2024-26872
In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup.
- CVE-2024-26892
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921e: fix use-after-free in free_irq().
- CVE-2024-26897
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete.
- CVE-2024-26901
In the Linux kernel, the following vulnerability has been resolved: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak.
- CVE-2024-26919
In the Linux kernel, the following vulnerability has been resolved: usb: ulpi: Fix debugfs directory leak.
- CVE-2024-26933
In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix deadlock in port "disable" sysfs attribute.
- CVE-2024-26934
In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix deadlock in usb_deauthorize_interface().
- CVE-2024-26964
In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Add error handling in xhci_map_urb_for_dma.
- CVE-2024-26973
In the Linux kernel, the following vulnerability has been resolved: fat: fix uninitialized field in nostale filehandles.
- CVE-2024-26993
In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection().
- CVE-2024-27014
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Prevent deadlock while disabling aRFS.
- CVE-2024-27048
In the Linux kernel, the following vulnerability has been resolved: wifi: brcm80211: handle pmk_op allocation failure.
- CVE-2024-27052
In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work.
- CVE-2024-27056
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: ensure offloading TID queue exists.
- CVE-2024-27059
In the Linux kernel, the following vulnerability has been resolved: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command. Bug Fixes: * kernel-rt: update RT source tree to the latest RHEL-8.10.z kernel. * kernel-rt: epoll_wait not reporting catching all events to application.
Severity level
CVE | Score CVSS 2.0 | Score CVSS 3.x | Score CVSS 4.0 |
---|---|---|---|
NIST — CVE-2019-25162
|
no information | 7.8 | no information |
NIST — CVE-2020-36777
|
no information | 5.5 | no information |
NIST — CVE-2021-46934
|
no information | 4.4 | no information |
NIST — CVE-2021-47013
|
no information | 7.0 | no information |
NIST — CVE-2021-47055
|
no information | 0.0 | no information |
NIST — CVE-2021-47118
|
no information | 4.1 | no information |
NIST — CVE-2021-47153
|
no information | 5.2 | no information |
NIST — CVE-2021-47171
|
no information | 4.4 | no information |
NIST — CVE-2021-47185
|
no information | 4.4 | no information |
NIST — CVE-2022-48627
|
no information | 4.4 | no information |
NIST — CVE-2023-52439
|
no information | 7.0 | no information |
NIST — CVE-2023-52445
|
no information | 3.0 | no information |
NIST — CVE-2023-52477
|
no information | 4.4 | no information |
NIST — CVE-2023-52513
|
no information | 4.4 | no information |
NIST — CVE-2023-52520
|
no information | 5.5 | no information |
NIST — CVE-2023-52528
|
no information | 4.4 | no information |
NIST — CVE-2023-52565
|
no information | 3.3 | no information |
NIST — CVE-2023-52578
|
no information | 4.7 | no information |
NIST — CVE-2023-52594
|
no information | 4.4 | no information |
NIST — CVE-2023-52595
|
no information | 4.4 | no information |
NIST — CVE-2023-52610
|
no information | 6.4 | no information |
NIST — CVE-2023-6240
|
no information | 6.5 | no information |
NIST — CVE-2024-0340
|
no information | 4.4 | no information |
NIST — CVE-2024-23307
|
no information | 4.4 | no information |
NIST — CVE-2024-25744
|
no information | 5.6 | no information |
NIST — CVE-2024-26593
|
no information | 4.4 | no information |
NIST — CVE-2024-26603
|
no information | 5.5 | no information |
NIST — CVE-2024-26610
|
no information | 6.1 | no information |
NIST — CVE-2024-26615
|
no information | 5.5 | no information |
NIST — CVE-2024-26642
|
no information | 4.7 | no information |
NIST — CVE-2024-26643
|
no information | 4.7 | no information |
NIST — CVE-2024-26659
|
no information | 4.1 | no information |
NIST — CVE-2024-26664
|
no information | 6.0 | no information |
NIST — CVE-2024-26693
|
no information | 4.4 | no information |
NIST — CVE-2024-26694
|
no information | 4.4 | no information |
NIST — CVE-2024-26743
|
no information | 5.5 | no information |
NIST — CVE-2024-26744
|
no information | 5.5 | no information |
NIST — CVE-2024-26779
|
no information | 5.5 | no information |
NIST — CVE-2024-26872
|
no information | 4.4 | no information |
NIST — CVE-2024-26892
|
no information | 4.4 | no information |
NIST — CVE-2024-26897
|
no information | 4.1 | no information |
NIST — CVE-2024-26901
|
no information | 5.5 | no information |
NIST — CVE-2024-26919
|
no information | 5.5 | no information |
NIST — CVE-2024-26933
|
no information | 5.5 | no information |
NIST — CVE-2024-26934
|
no information | 5.5 | no information |
NIST — CVE-2024-26964
|
no information | 5.5 | no information |
NIST — CVE-2024-26973
|
no information | 5.5 | no information |
NIST — CVE-2024-26993
|
no information | 5.5 | no information |
NIST — CVE-2024-27014
|
no information | 5.5 | no information |
NIST — CVE-2024-27048
|
no information | 5.5 | no information |
NIST — CVE-2024-27052
|
no information | 5.5 | no information |
NIST — CVE-2024-27056
|
no information | 5.5 | no information |
NIST — CVE-2024-27059
|
no information | 5.5 | no information |
Updated packages