INFSA-2024:4211: kernel security update
Information about definition
Identificator: INFSA-2024:4211
Type: security
Release date: 2024-10-10 10:36:02 UTC
Information about package
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Vulnerabilities description
- CVE-2020-26555
A vulnerability was found in Linux Kernel, where Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack. When an attacker connects to a victim device using the address of the device and the victim initiates a Pairing, the attacker can reflect the encrypted nonce even without knowledge of the key.
- CVE-2021-46909
In the Linux kernel, the following vulnerability has been resolved: ARM: footbridge: fix PCI interrupt mapping.
- CVE-2021-46972
In the Linux kernel, the following vulnerability has been resolved: ovl: fix leaked dentry.
- CVE-2021-47069
In the Linux kernel, the following vulnerability has been resolved: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry.
- CVE-2021-47073
In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios.
- CVE-2021-47236
In the Linux kernel, the following vulnerability has been resolved: net: cdc_eem: fix tx fixup skb leak.
- CVE-2021-47310
In the Linux kernel, the following vulnerability has been resolved: net: ti: fix UAF in tlan_remove_one.
- CVE-2021-47311
In the Linux kernel, the following vulnerability has been resolved: net: qcom/emac: fix UAF in emac_remove.
- CVE-2021-47353
In the Linux kernel, the following vulnerability has been resolved: udf: Fix NULL pointer dereference in udf_symlink function.
- CVE-2021-47356
In the Linux kernel, the following vulnerability has been resolved: mISDN: fix possible use-after-free in HFC_cleanup().
- CVE-2021-47456
In the Linux kernel, the following vulnerability has been resolved: can: peak_pci: peak_pci_remove(): fix UAF.
- CVE-2021-47495
In the Linux kernel, the following vulnerability has been resolved: usbnet: sanity check for maxpacket.
- CVE-2023-5090
A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.
- CVE-2023-52464
In the Linux kernel, the following vulnerability has been resolved: EDAC/thunderx: Fix possible out-of-bounds string access.
- CVE-2023-52560
In the Linux kernel, the following vulnerability has been resolved: mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions().
- CVE-2023-52615
In the Linux kernel, the following vulnerability has been resolved: hwrng: core - Fix page fault dead lock on mmap-ed hwrng.
- CVE-2023-52626
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context.
- CVE-2023-52667
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix a potential double-free in fs_any_create_groups.
- CVE-2023-52669
In the Linux kernel, the following vulnerability has been resolved: crypto: s390/aes - Fix buffer overread in CTR mode.
- CVE-2023-52675
In the Linux kernel, the following vulnerability has been resolved: powerpc/imc-pmu: Add a null pointer check in update_events_in_group().
- CVE-2023-52686
In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check in opal_event_init().
- CVE-2023-52700
In the Linux kernel, the following vulnerability has been resolved: tipc: fix kernel warning when sending SYN message.
- CVE-2023-52703
In the Linux kernel, the following vulnerability has been resolved: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path.
- CVE-2023-52781
In the Linux kernel, the following vulnerability has been resolved: usb: config: fix iteration issue in 'usb_get_bos_descriptor()'.
- CVE-2023-52813
In the Linux kernel, the following vulnerability has been resolved: crypto: pcrypt - Fix hungtask for PADATA_RESET.
- CVE-2023-52835
In the Linux kernel, the following vulnerability has been resolved: perf/core: Bail out early if the request AUX area is out of bound.
- CVE-2023-52877
In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm().
- CVE-2023-52878
In the Linux kernel, the following vulnerability has been resolved: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds.
- CVE-2023-52881
In the Linux kernel, the following vulnerability has been resolved: tcp: do not accept ACK of bytes we never sent.
- CVE-2024-26583
In the Linux kernel, the following vulnerability has been resolved: tls: fix race between async notify and socket close.
- CVE-2024-26584
In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests.
- CVE-2024-26585
In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close.
- CVE-2024-26656
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix use-after-free bug.
- CVE-2024-26675
In the Linux kernel, the following vulnerability has been resolved: ppp_async: limit MRU to 64K.
- CVE-2024-26735
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref.
- CVE-2024-26759
In the Linux kernel, the following vulnerability has been resolved: mm/swap: fix race when skipping swapcache.
- CVE-2024-26801
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Avoid potential use-after-free in hci_error_reset.
- CVE-2024-26804
In the Linux kernel, the following vulnerability has been resolved: net: ip_tunnel: prevent perpetual headroom growth.
- CVE-2024-26826
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix data re-injection from stale subflow.
- CVE-2024-26859
In the Linux kernel, the following vulnerability has been resolved: net/bnx2x: Prevent access to a freed page in page_pool.
- CVE-2024-26906
In the Linux kernel, the following vulnerability has been resolved: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault().
- CVE-2024-26907
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix fortify source warning while accessing Eth segment.
- CVE-2024-26974
In the Linux kernel, the following vulnerability has been resolved: crypto: qat - resolve race condition during AER recovery.
- CVE-2024-26982
In the Linux kernel, the following vulnerability has been resolved: Squashfs: check the inode number is not the invalid value of zero.
- CVE-2024-27397
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout.
- CVE-2024-27410
In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: reject iftype change with mesh ID change.
- CVE-2024-35789
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes.
- CVE-2024-35835
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix a double-free in arfs_create_groups.
- CVE-2024-35838
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential sta-link leak.
- CVE-2024-35845
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: dbg-tlv: ensure NUL termination.
- CVE-2024-35852
In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work.
- CVE-2024-35853
In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash.
- CVE-2024-35854
In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash.
- CVE-2024-35855
In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update.
- CVE-2024-35888
In the Linux kernel, the following vulnerability has been resolved: erspan: make sure erspan_base_hdr is present in skb->head.
- CVE-2024-35890
In the Linux kernel, the following vulnerability has been resolved: gro: fix ownership transfer.
- CVE-2024-35958
In the Linux kernel, the following vulnerability has been resolved: net: ena: Fix incorrect descriptor free behavior.
- CVE-2024-35959
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix mlx5e_priv_init() cleanup flow.
- CVE-2024-35960
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Properly link new fs rules into the tree.
- CVE-2024-36004
In the Linux kernel, the following vulnerability has been resolved: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue.
- CVE-2024-36007
In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix warning during rehash. Bug Fixes: * Kernel panic - kernel BUG at mm/slub.c:376!. * Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z]. * RHEL8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible. * [RHEL8] blktests block/024 failed. * RHEL8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner). * Latency spikes with Matrox G200 graphic cards.
Severity level
CVE | Score CVSS 2.0 | Score CVSS 3.x | Score CVSS 4.0 |
---|---|---|---|
NIST — CVE-2020-26555
|
no information | 5.4 | no information |
NIST — CVE-2021-46909
|
no information | 4.4 | no information |
NIST — CVE-2021-46972
|
no information | 5.5 | no information |
NIST — CVE-2021-47069
|
no information | 5.5 | no information |
NIST — CVE-2021-47073
|
no information | 2.3 | no information |
NIST — CVE-2021-47236
|
no information | 5.1 | no information |
NIST — CVE-2021-47310
|
no information | 4.4 | no information |
NIST — CVE-2021-47311
|
no information | 5.5 | no information |
NIST — CVE-2021-47353
|
no information | 5.5 | no information |
NIST — CVE-2021-47356
|
no information | 6.7 | no information |
NIST — CVE-2021-47456
|
no information | 5.5 | no information |
NIST — CVE-2021-47495
|
no information | 4.4 | no information |
NIST — CVE-2023-5090
|
no information | 6.0 | no information |
NIST — CVE-2023-52464
|
no information | 2.9 | no information |
NIST — CVE-2023-52560
|
no information | 3.3 | no information |
NIST — CVE-2023-52615
|
no information | 4.4 | no information |
NIST — CVE-2023-52626
|
no information | 6.0 | no information |
NIST — CVE-2023-52667
|
no information | 5.5 | no information |
NIST — CVE-2023-52669
|
no information | 5.5 | no information |
NIST — CVE-2023-52675
|
no information | 5.5 | no information |
NIST — CVE-2023-52686
|
no information | 5.5 | no information |
NIST — CVE-2023-52700
|
no information | 5.5 | no information |
NIST — CVE-2023-52703
|
no information | 3.3 | no information |
NIST — CVE-2023-52781
|
no information | 4.4 | no information |
NIST — CVE-2023-52813
|
no information | 5.5 | no information |
NIST — CVE-2023-52835
|
no information | 5.5 | no information |
NIST — CVE-2023-52877
|
no information | 4.4 | no information |
NIST — CVE-2023-52878
|
no information | 4.4 | no information |
NIST — CVE-2023-52881
|
no information | 5.9 | no information |
NIST — CVE-2024-26583
|
no information | 5.1 | no information |
NIST — CVE-2024-26584
|
no information | 5.5 | no information |
NIST — CVE-2024-26585
|
no information | 7.0 | no information |
NIST — CVE-2024-26656
|
no information | 4.7 | no information |
NIST — CVE-2024-26675
|
no information | 5.5 | no information |
NIST — CVE-2024-26735
|
no information | 5.5 | no information |
NIST — CVE-2024-26759
|
no information | 5.5 | no information |
NIST — CVE-2024-26801
|
no information | 5.5 | no information |
NIST — CVE-2024-26804
|
no information | 5.5 | no information |
NIST — CVE-2024-26826
|
no information | 5.5 | no information |
NIST — CVE-2024-26859
|
no information | 4.1 | no information |
NIST — CVE-2024-26906
|
no information | 5.5 | no information |
NIST — CVE-2024-26907
|
no information | 6.7 | no information |
NIST — CVE-2024-26974
|
no information | 5.8 | no information |
NIST — CVE-2024-26982
|
no information | 5.5 | no information |
NIST — CVE-2024-27397
|
no information | 7.0 | no information |
NIST — CVE-2024-27410
|
no information | 5.5 | no information |
NIST — CVE-2024-35789
|
no information | 5.5 | no information |
NIST — CVE-2024-35835
|
no information | 5.5 | no information |
NIST — CVE-2024-35838
|
no information | 5.5 | no information |
NIST — CVE-2024-35845
|
no information | 5.5 | no information |
NIST — CVE-2024-35852
|
no information | 5.5 | no information |
NIST — CVE-2024-35853
|
no information | 5.5 | no information |
NIST — CVE-2024-35854
|
no information | 5.5 | no information |
NIST — CVE-2024-35855
|
no information | 5.5 | no information |
NIST — CVE-2024-35888
|
no information | 5.5 | no information |
NIST — CVE-2024-35890
|
no information | 5.5 | no information |
NIST — CVE-2024-35958
|
no information | 5.5 | no information |
NIST — CVE-2024-35959
|
no information | 5.5 | no information |
NIST — CVE-2024-35960
|
no information | 5.5 | no information |
NIST — CVE-2024-36004
|
no information | 5.5 | no information |
NIST — CVE-2024-36007
|
no information | 5.5 | no information |
Updated packages