INFSA-2024:4352: kernel-rt security update

Information about definition

Identificator: INFSA-2024:4352

Type: security

Release date: 2024-10-10 10:35:19 UTC

Information about package

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Vulnerabilities description

  • CVE-2020-26555

    A vulnerability was found in Linux Kernel, where Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack. When an attacker connects to a victim device using the address of the device and the victim initiates a Pairing, the attacker can reflect the encrypted nonce even without knowledge of the key.

  • CVE-2021-46909

    In the Linux kernel, the following vulnerability has been resolved: ARM: footbridge: fix PCI interrupt mapping.

  • CVE-2021-46972

    In the Linux kernel, the following vulnerability has been resolved: ovl: fix leaked dentry.

  • CVE-2021-47069

    In the Linux kernel, the following vulnerability has been resolved: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry.

  • CVE-2021-47073

    In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios.

  • CVE-2021-47236

    In the Linux kernel, the following vulnerability has been resolved: net: cdc_eem: fix tx fixup skb leak.

  • CVE-2021-47310

    In the Linux kernel, the following vulnerability has been resolved: net: ti: fix UAF in tlan_remove_one.

  • CVE-2021-47311

    In the Linux kernel, the following vulnerability has been resolved: net: qcom/emac: fix UAF in emac_remove.

  • CVE-2021-47353

    In the Linux kernel, the following vulnerability has been resolved: udf: Fix NULL pointer dereference in udf_symlink function.

  • CVE-2021-47356

    In the Linux kernel, the following vulnerability has been resolved: mISDN: fix possible use-after-free in HFC_cleanup().

  • CVE-2021-47456

    In the Linux kernel, the following vulnerability has been resolved: can: peak_pci: peak_pci_remove(): fix UAF.

  • CVE-2021-47495

    In the Linux kernel, the following vulnerability has been resolved: usbnet: sanity check for maxpacket.

  • CVE-2023-5090

    A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.

  • CVE-2023-52464

    In the Linux kernel, the following vulnerability has been resolved: EDAC/thunderx: Fix possible out-of-bounds string access.

  • CVE-2023-52560

    In the Linux kernel, the following vulnerability has been resolved: mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions().

  • CVE-2023-52615

    In the Linux kernel, the following vulnerability has been resolved: hwrng: core - Fix page fault dead lock on mmap-ed hwrng.

  • CVE-2023-52626

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context.

  • CVE-2023-52667

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix a potential double-free in fs_any_create_groups.

  • CVE-2023-52700

    In the Linux kernel, the following vulnerability has been resolved: tipc: fix kernel warning when sending SYN message.

  • CVE-2023-52703

    In the Linux kernel, the following vulnerability has been resolved: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path.

  • CVE-2023-52781

    In the Linux kernel, the following vulnerability has been resolved: usb: config: fix iteration issue in 'usb_get_bos_descriptor()'.

  • CVE-2023-52813

    In the Linux kernel, the following vulnerability has been resolved: crypto: pcrypt - Fix hungtask for PADATA_RESET.

  • CVE-2023-52835

    In the Linux kernel, the following vulnerability has been resolved: perf/core: Bail out early if the request AUX area is out of bound.

  • CVE-2023-52877

    In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm().

  • CVE-2023-52878

    In the Linux kernel, the following vulnerability has been resolved: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds.

  • CVE-2023-52881

    In the Linux kernel, the following vulnerability has been resolved: tcp: do not accept ACK of bytes we never sent.

  • CVE-2024-26583

    In the Linux kernel, the following vulnerability has been resolved: tls: fix race between async notify and socket close.

  • CVE-2024-26584

    In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests.

  • CVE-2024-26585

    In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close.

  • CVE-2024-26656

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix use-after-free bug.

  • CVE-2024-26675

    In the Linux kernel, the following vulnerability has been resolved: ppp_async: limit MRU to 64K.

  • CVE-2024-26735

    In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref.

  • CVE-2024-26759

    In the Linux kernel, the following vulnerability has been resolved: mm/swap: fix race when skipping swapcache.

  • CVE-2024-26801

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Avoid potential use-after-free in hci_error_reset.

  • CVE-2024-26804

    In the Linux kernel, the following vulnerability has been resolved: net: ip_tunnel: prevent perpetual headroom growth.

  • CVE-2024-26826

    In the Linux kernel, the following vulnerability has been resolved: mptcp: fix data re-injection from stale subflow.

  • CVE-2024-26859

    In the Linux kernel, the following vulnerability has been resolved: net/bnx2x: Prevent access to a freed page in page_pool.

  • CVE-2024-26906

    In the Linux kernel, the following vulnerability has been resolved: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault().

  • CVE-2024-26907

    In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix fortify source warning while accessing Eth segment.

  • CVE-2024-26974

    In the Linux kernel, the following vulnerability has been resolved: crypto: qat - resolve race condition during AER recovery.

  • CVE-2024-26982

    In the Linux kernel, the following vulnerability has been resolved: Squashfs: check the inode number is not the invalid value of zero.

  • CVE-2024-27397

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout.

  • CVE-2024-27410

    In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: reject iftype change with mesh ID change.

  • CVE-2024-35789

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes.

  • CVE-2024-35835

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix a double-free in arfs_create_groups.

  • CVE-2024-35838

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential sta-link leak.

  • CVE-2024-35845

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: dbg-tlv: ensure NUL termination.

  • CVE-2024-35852

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work.

  • CVE-2024-35853

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash.

  • CVE-2024-35854

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash.

  • CVE-2024-35855

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update.

  • CVE-2024-35888

    In the Linux kernel, the following vulnerability has been resolved: erspan: make sure erspan_base_hdr is present in skb->head.

  • CVE-2024-35890

    In the Linux kernel, the following vulnerability has been resolved: gro: fix ownership transfer.

  • CVE-2024-35958

    In the Linux kernel, the following vulnerability has been resolved: net: ena: Fix incorrect descriptor free behavior.

  • CVE-2024-35959

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix mlx5e_priv_init() cleanup flow.

  • CVE-2024-35960

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Properly link new fs rules into the tree.

  • CVE-2024-36004

    In the Linux kernel, the following vulnerability has been resolved: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue.

  • CVE-2024-36007

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix warning during rehash. Bug Fixes: * kernel-rt: update RT source tree to the latest RHEL-8.10.z kernel. * [rhel8.9][cxgb4]BUG: using smp_processor_id() in preemptible [00000000] code: ethtool/54735.

Severity level

CVE Score CVSS 2.0 Score CVSS 3.x Score CVSS 4.0
no information 5.4 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 2.3 no information
no information 5.1 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 6.7 no information
no information 5.5 no information
no information 4.4 no information
NIST — CVE-2023-5090
no information 6.0 no information
no information 2.9 no information
no information 3.3 no information
no information 4.4 no information
no information 6.0 no information
no information 5.5 no information
no information 5.5 no information
no information 3.3 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 5.9 no information
no information 5.1 no information
no information 5.5 no information
no information 7.0 no information
no information 4.7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.1 no information
no information 5.5 no information
no information 6.7 no information
no information 5.8 no information
no information 5.5 no information
no information 7.0 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
Critical, important, moderate, low

Updated packages