INFSA-2024:5102: kernel-rt security update

Information about definition

Identificator: INFSA-2024:5102

Type: security

Release date: 2024-09-20 18:15:44 UTC

Information about package

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Vulnerabilities description

  • CVE-2021-46939

    Linux Kernel is vulnerable to a denial of service, caused by a flaw in the ring buffer recursion detection. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

  • CVE-2021-47257

    In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: fix null deref in parse dev addr. Fix a logic error that could result in a null deref if the user sets the mode incorrectly for the given addr type.

  • CVE-2021-47284

    In the Linux kernel, the following vulnerability has been resolved: kernel: isdn: mISDN: netjet: Fix crash in nj_probe.

  • CVE-2021-47304

    In the Linux kernel, the following vulnerability has been resolved: tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized. This commit fixes a bug (found by syzkaller) that could cause spurious double-initializations for congestion control modules, which could cause memory leaks or other problems for congestion control modules (like CDG) that allocate memory in their init functions.

  • CVE-2021-47373

    In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Fix potential VPE leak on error. In its_vpe_irq_domain_alloc, when its_vpe_init() returns an error, there is an off-by-one in the number of VPEs to be freed.

  • CVE-2021-47408

    In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: serialize hash resizes and cleanups.

  • CVE-2021-47461

    In the Linux kernel, the following vulnerability has been resolved: userfaultfd: fix a race between writeprotect and exit_mmap(). A race is possible when a process exits, its VMAs are removed by exit_mmap() and at the same time userfaultfd_writeprotect() is called.

  • CVE-2021-47468

    In the Linux kernel, the following vulnerability has been resolved: isdn: mISDN: Fix sleeping function called from invalid context. The driver can call card->isac.release() function from an atomic context. Fix this by calling this function after releasing the lock.

  • CVE-2021-47491

    In the Linux kernel, the following vulnerability has been resolved: mm: khugepaged: skip huge page collapse for special files.

  • CVE-2021-47548

    In the Linux kernel, the following vulnerability has been resolved: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port().

  • CVE-2021-47579

    In the Linux kernel, the following vulnerability has been resolved: ovl: fix warning in ovl_create_real().

  • CVE-2021-47624

    In the Linux kernel, the following vulnerability has been resolved: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change. The refcount leak issues take place in an error handling path. When the 3rd argument buf doesn't match with "offline", "online" or "remove", the function simply returns -EINVAL and forgets to decrease the reference count of a rpc_xprt object and a rpc_xprt_switch object increased by rpc_sysfs_xprt_kobj_get_xprt() and rpc_sysfs_xprt_kobj_get_xprt_switch(), causing reference count leaks of both unused objects.

  • CVE-2022-48632

    In the Linux kernel, the following vulnerability has been resolved: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction().

  • CVE-2022-48743

    In the Linux kernel, the following vulnerability has been resolved: net: amd-xgbe: Fix skb data length underflow. There will be BUG_ON() triggered in include/linux/skbuff.h leading to intermittent kernel panic, when the skb length underflow is detected. Fix this by dropping the packet if such length underflows are seen because of inconsistencies in the hardware descriptors.

  • CVE-2022-48747

    In the Linux kernel, the following vulnerability has been resolved: block: Fix wrong offset in bio_truncate(). bio_truncate() clears the buffer outside of last block of bdev, however current bio_truncate() is using the wrong offset of page. So it can return the uninitialized data. This happened when both of truncated/corrupted FS and userspace (via bdev) are trying to read the last of bdev.

  • CVE-2022-48757

    In the Linux kernel, the following vulnerability has been resolved: net: fix information leakage in /proc/net/ptype. In one net namespace, after creating a packet socket without binding it to a device, users in other net namespaces can observe the new `packet_type` added by this packet socket by reading `/proc/net/ptype` file. This is minor information leakage as packet socket is namespace aware. Add a net pointer in `packet_type` to keep the net namespace of of corresponding packet socket. In `ptype_seq_show`, this net pointer must be checked when it is not NULL.

  • CVE-2023-52463

    Linux Kernel is vulnerable to a denial of service, caused by force RO when remounting if SetVariable is not supported. A local attacker could exploit this vulnerability to cause a denial of service.

  • CVE-2023-52469

    In the Linux kernel, the following vulnerability has been resolved: drivers/amd/pm: fix a use-after-free in kv_parse_power_table.

  • CVE-2023-52471

    In the Linux kernel, the following vulnerability has been resolved: ice: Fix some null pointer dereference issues in ice_ptp.c. devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.

  • CVE-2023-52486

    Linux Kernel is vulnerable to a denial of service, caused by a deadlock issue due to unref the same fb many times. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

  • CVE-2023-52530

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential key use-after-free.

  • CVE-2023-52619

    In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Fix crash when setting number of cpus to an odd number.

  • CVE-2023-52622

    In the Linux kernel, the following vulnerability has been resolved: ext4: avoid online resizing failures due to oversized flex bg.

  • CVE-2023-52623

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix a suspicious RCU usage warning.

  • CVE-2023-52648

    In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Unmap the surface before resetting it on a plane state.

  • CVE-2023-52653

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: fix a memleak in gss_import_v2_context.

  • CVE-2023-52658

    In the Linux kernel, the following vulnerability has been resolved: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency".

  • CVE-2023-52662

    In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node.

  • CVE-2023-52679

    In the Linux kernel, the following vulnerability has been resolved: of: Fix double free in of_parse_phandle_with_args_map.

  • CVE-2023-52707

    In the Linux kernel, the following vulnerability has been resolved: sched/psi: Fix use-after-free in ep_remove_wait_queue().

  • CVE-2023-52730

    In the Linux kernel, the following vulnerability has been resolved: mmc: sdio: fix possible resource leaks in some error paths.

  • CVE-2023-52756

    In the Linux kernel, the following vulnerability has been resolved: pwm: Fix double shift bug.

  • CVE-2023-52762

    In the Linux kernel, the following vulnerability has been resolved: virtio-blk: fix implicit overflow on virtio_max_dma_size.

  • CVE-2023-52764

    In the Linux kernel, the following vulnerability has been resolved: media: gspca: cpia1: shift-out-of-bounds in set_flicker.

  • CVE-2023-52777

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix gtk offload status event locking.

  • CVE-2023-52784

    In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave().

  • CVE-2023-52791

    In the Linux kernel, the following vulnerability has been resolved: i2c: core: Run atomic i2c xfer when !preemptible.

  • CVE-2023-52796

    In the Linux kernel, the following vulnerability has been resolved: ipvlan: add ipvlan_route_v6_outbound() helper.

  • CVE-2023-52803

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries RPC client pipefs dentries cleanup is in separated rpc_remove_pipedir() workqueue, which takes care about pipefs superblock locking. In some special scenarios, when kernel frees the pipefs sb of the current client and immediately allocates a new pipefs sb, rpc_remove_pipedir function would misjudge the existence of pipefs sb which is not the one it used to hold. As a result, the rpc_remove_pipedir would clean the released freed pipefs dentries. To fix this issue, rpc_remove_pipedir should check whether the current pipefs sb is consistent with the original pipefs sb.

  • CVE-2023-52811

    In the Linux kernel, the following vulnerability has been resolved: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool.

  • CVE-2023-52832

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't return unset power in ieee80211_get_tx_power().

  • CVE-2023-52834

    In the Linux kernel, the following vulnerability has been resolved: atl1c: Work around the DMA RX overflow issue.

  • CVE-2023-52845

    In the Linux kernel, the following vulnerability has been resolved: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING.

  • CVE-2023-52847

    In the Linux kernel, the following vulnerability has been resolved: media: bttv: fix use after free error due to btv->timeout timer. There may be some a race condition between timer function bttv_irq_timeout and bttv_remove. The timer is setup in probe and there is no timer_delete operation in remove function. When it hit kfree btv, the function might still be invoked, which will cause use after free bug.

  • CVE-2023-52864

    In the Linux kernel, the following vulnerability has been resolved: platform/x86: wmi: Fix opening of char device.

  • CVE-2024-21823

    Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable denial of service via local access.

  • CVE-2024-2201

    A flaw was found in some Intel CPUs where mitigations for the Spectre V2/BHI vulnerability were incomplete. This issue may allow an attacker to read arbitrary memory, compromising system integrity and exposing sensitive information.

  • CVE-2024-25739

    A flaw was found in the Linux kernel. The create_empty_lvol function in the drivers/mtd/ubi/vtbl.c file can attempt to allocate zero bytes of memory when the LEB size is smaller than a single volume table record. This issue can result in a denial of service.

  • CVE-2024-26586

    A kernel stack flaw that corrupted the Linux kernel’s Mellanox Technologies Spectrum Ethernet driver was found when a user initialized more than 16 access control lists (ACLs). This flaw allows a local user to crash or potentially escalate their privileges on the system.

  • CVE-2024-26614

    In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once.

  • CVE-2024-26640

    A vulnerability was found in Linux Kernel where rx zerocopy feature allowed mapping of pages owned by the filesystem, leading to potential system panic which is caused by the lack of sanity checks to rx zerocopy. A local authenticated attacker could exploit this vulnerability to cause a denial of service.

  • CVE-2024-26660

    A vulnerability was found in the DRM/AMD/Display module of the Linux Kernel. An out-of-bounds access exists in the 'stream_enc_regs' array within DCN301, while accessing the array with 'eng_id,’ could lead to an out-of-bounds access beyond its four-element size, which can cause a system crash.

  • CVE-2024-26669

    In the Linux kernel, the following vulnerability has been resolved: net/sched: flower: Fix chain template offload.

  • CVE-2024-26686

    In the Linux kernel, the following vulnerability has been resolved: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats lock_task_sighand() can trigger a hard lockup. If NR_CPUS threads call do_task_stat() at the same time and the process has NR_THREADS, it will spin with irqs disabled O(NR_CPUS * NR_THREADS) time. Change do_task_stat() to use sig->stats_lock to gather the statistics outside of ->siglock protected section, in the likely case this code will run lockless.

  • CVE-2024-26704

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix double-free of blocks due to wrong extents moved_len.

  • CVE-2024-26733

    In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_req_get().

  • CVE-2024-26740

    In the Linux kernel, the following vulnerability has been resolved: net/sched: act_mirred: use the backlog for mirred ingress.

  • CVE-2024-26772

    In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal(). Places the logic for checking if the group's block bitmap is corrupt under the protection of the group lock to avoid allocating blocks from the group with a corrupted block bitmap.

  • CVE-2024-26773

    In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found().

  • CVE-2024-26802

    In the Linux kernel, the following vulnerability has been resolved: stmmac: Clear variable when destroying workqueue.

  • CVE-2024-26810

    In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Lock external INTx masking ops. Mask operations through config space changes to DisINTx may race INTx configuration changes via ioctl. Create wrappers that add locking for paths outside of the core interrupt code.

  • CVE-2024-26837

    In the Linux kernel, the following vulnerability has been resolved: net: bridge: switchdev: Skip MDB replays of deferred events on offload.

  • CVE-2024-26840

    In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix memory leak in cachefiles_add_cache().

  • CVE-2024-26843

    In the Linux kernel, the following vulnerability has been resolved: efi: runtime: Fix potential overflow of soft-reserved region size. md_size will have been narrowed if we have >= 4GB worth of pages in a soft-reserved region.

  • CVE-2024-26852

    In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify().

  • CVE-2024-26853

    A memory corruption flaw was found in the Linux kernel’s Intel(R) Ethernet Controller I225-LM/I225-V driver in how a user generates a high amount of packets. This flaw allows a local user to crash the system.

  • CVE-2024-26870

    In the Linux kernel, the following vulnerability has been resolved: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102.

  • CVE-2024-26878

    In the Linux kernel, the following vulnerability has been resolved: quota: Fix potential NULL pointer dereference Below race may cause NULL pointer dereference P1 P2 dquot_free_inode quota_off drop_dquot_ref remove_dquot_ref dquots = i_dquot(inode) dquots = i_dquot(inode) srcu_read_lock dquots[cnt]) != NULL (1) dquots[type] = NULL (2) spin_lock(&dquots[cnt]->dq_dqb_lock) (3) .... If dquot_free_inode(or other routines) checks inode's quota pointers (1) before quota_off sets it to NULL(2) and use it (3) after that, NULL pointer dereference will be triggered. So let's fix it by using a temporary pointer to avoid this issue.

  • CVE-2024-26921

    In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and other functions can pass skb->sk as function argument. If the skb is a fragment and reassembly happens before such function call returns, the sk must not be released. This affects skb fragments reassembled via netfilter or similar modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.

  • CVE-2024-26925

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path.

  • CVE-2024-26940

    In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed. The driver creates /sys/kernel/debug/dri/0/mob_ttm even when the corresponding ttm_resource_manager is not allocated. This leads to a crash when trying to read from this file. Add a check to create mob_ttm, system_mob_ttm, and gmr_ttm debug file only when the corresponding ttm_resource_manager is allocated.

  • CVE-2024-26958

    In the Linux kernel, the following vulnerability has been resolved: nfs: fix UAF in direct writes.

  • CVE-2024-26960

    In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix race between free_swap_and_cache() and swapoff().

  • CVE-2024-26961

    In the Linux kernel, the following vulnerability has been resolved: mac802154: fix llsec key resources release in mac802154_llsec_key_del mac802154_llsec_key_del() can free resources of a key directly without following the RCU rules for waiting before the end of a grace period. This may lead to use-after-free in case llsec_lookup_key() is traversing the list of keys in parallel with a key deletion: refcount_t: addition on 0; use-after-free.

  • CVE-2024-27010

    In the Linux kernel, the following vulnerability has been resolved: net/sched: Fix mirred deadlock on device recursion When the mirred action is used on a classful egress qdisc and a packet is mirrored or redirected to self we hit a qdisc lock deadlock.

  • CVE-2024-27011

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix memleak in map from abort path. The delete set command does not rely on the transaction object for element removal, therefore, a combination of delete element + delete set from the abort path could result in restoring twice the refcount of the mapping.

  • CVE-2024-27019

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() nft_unregister_obj() can concurrent with __nft_obj_type_get(), and there is not any protection when iterate over nf_tables_objects list in __nft_obj_type_get(). Therefore, there is potential data-race of nf_tables_objects list entry. Use list_for_each_entry_rcu() to iterate over nf_tables_objects list in __nft_obj_type_get(), and use rcu_read_lock() in the caller nft_obj_type_get() to protect the entire type query process.

  • CVE-2024-27020

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() nft_unregister_expr() can concurrent with __nft_expr_type_get(), and there is not any protection when iterate over nf_tables_expressions list in __nft_expr_type_get(). Therefore, there is potential data-race of nf_tables_expressions list entry. Use list_for_each_entry_rcu() to iterate over nf_tables_expressions list in __nft_expr_type_get(), and use rcu_read_lock() in the caller nft_expr_type_get() to protect the entire type query process.

  • CVE-2024-27025

    In the Linux kernel, the following vulnerability has been resolved: nbd: null check for nla_nest_start nla_nest_start() may fail and return NULL. Insert a check and set errno based on other call sites within the same source code.

  • CVE-2024-27065

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not compare internal table flags on updates. Restore skipping transaction if table update does not modify flags.

  • CVE-2024-27388

    In the Linux kernel, the following vulnerability has been resolved: SUNRPC: fix some memleaks in gssx_dec_option_array. The creds and oa->data need to be freed in the error-handling paths after their allocation. So this patch add these deallocations in the corresponding paths.

  • CVE-2024-27395

    In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Fix Use-After-Free in ovs_ct_exit. Since kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal of ovs_ct_limit_exit, is not part of the RCU read critical section, it is possible that the RCU grace period will pass during the traversal and the key will be free. To prevent this, it should be changed to hlist_for_each_entry_safe.

  • CVE-2024-27434

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't set the MFP flag for the GTK. The firmware doesn't need the MFP flag for the GTK, it can even make the firmware crash. in case the AP is configured with: group cipher TKIP and MFPC. We would send the GTK with cipher = TKIP and MFP which is of course not possible.

  • CVE-2024-31076

    In the Linux kernel, the following vulnerability has been resolved: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline.

  • CVE-2024-33621

    In the Linux kernel, the following vulnerability has been resolved: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound. Raw packet from PF_PACKET socket ontop of an IPv6-backed ipvlan device will hit WARN_ON_ONCE() in sk_mc_loop() through sch_direct_xmit() path.

  • CVE-2024-35790

    In the Linux kernel, the following vulnerability has been resolved: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group. The DisplayPort driver's sysfs nodes may be present to the userspace before typec_altmode_set_drvdata() completes in dp_altmode_probe. This means that a sysfs read can trigger a NULL pointer error by deferencing dp->hpd in hpd_show or dp->lock in pin_assignment_show, as dev_get_drvdata() returns NULL in those cases. Remove manual sysfs node creation in favour of adding attribute group as default for devices bound to the driver. The ATTRIBUTE_GROUPS() macro is not used here otherwise the path to the sysfs nodes is no longer compliant with the ABI.

  • CVE-2024-35801

    In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD.

  • CVE-2024-35807

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix corruption during on-line resize.

  • CVE-2024-35810

    In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix the lifetime of the bo cursor memory. The cleanup can be dispatched while the atomic update is still active, which means that the memory acquired in the atomic update needs to not be invalidated by the cleanup. The buffer objects in vmw_plane_state instead of using the builtin map_and_cache were trying to handle the lifetime of the mapped memory themselves, leading to crashes. Use the map_and_cache instead of trying to manage the lifetime of the buffer objects held by the vmw_plane_state. Fixes kernel oops'es in IGT's kms_cursor_legacy forked-bo.

  • CVE-2024-35814

    In the Linux kernel, the following vulnerability has been resolved: swiotlb: Fix double-allocation of slots due to broken alignment handling.

  • CVE-2024-35847

    In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Prevent double free on error. The error handling path in its_vpe_irq_domain_alloc() causes a double free when its_vpe_init() fails after successfully allocating at least one interrupt. This happens because its_vpe_irq_domain_free() frees the interrupts along with the area bitmap and the vprop_page and its_vpe_irq_domain_alloc() subsequently frees the area bitmap and the vprop_page again. Fix this by unconditionally invoking its_vpe_irq_domain_free() which handles all cases correctly and by removing the bitmap/vprop_page freeing from its_vpe_irq_domain_alloc().

  • CVE-2024-35876

    In the Linux kernel, the following vulnerability has been resolved: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank().

  • CVE-2024-35893

    In the Linux kernel, the following vulnerability has been resolved: net/sched: act_skbmod: prevent kernel-infoleak.

  • CVE-2024-35896

    In the Linux kernel, the following vulnerability has been resolved: netfilter: validate user input for expected length.

  • CVE-2024-35897

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: discard table flag update with pending basechain deletion. Hook unregistration is deferred to the commit phase, same occurs with hook updates triggered by the table dormant flag. When both commands are combined, this results in deleting a basechain while leaving its hook still registered in the core.

  • CVE-2024-35899

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: flush pending destroy work before exit_net release.

  • CVE-2024-35900

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject new basechain after table flag update. When dormant flag is toggled, hooks are disabled in the commit phase by iterating over current chains in table (existing and new).

  • CVE-2024-35910

    In the Linux kernel, the following vulnerability has been resolved: tcp: properly terminate timers for kernel sockets.

  • CVE-2024-35912

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: rfi: fix potential response leaks. If the rx payload length check fails, or if kmemdup() fails, we still need to free the command response.

  • CVE-2024-35924

    In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Limit read size on v1.2. Between UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was increased from 16 to 256. In order to avoid overflowing reads for older systems, add a mechanism to use the read UCSI version to truncate read sizes on UCSI v1.2.

  • CVE-2024-35925

    In the Linux kernel, the following vulnerability has been resolved: block: prevent division by zero in blk_rq_stat_sum(). The expression dst->nr_samples + src->nr_samples may have zero value on overflow. It is necessary to add a check to avoid division by zero.

  • CVE-2024-35930

    In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc(). The call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an unsuccessful status. In such cases, the elsiocb is not issued, the completion is not called, and thus the elsiocb resource is leaked. Check return value after calling lpfc_sli4_resume_rpi() and conditionally release the elsiocb resource.

  • CVE-2024-35937

    In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: check A-MSDU format more carefully.

  • CVE-2024-35938

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: decrease MHI channel buffer length to 8KB. Currently buf_len field of ath11k_mhi_config_qca6390 is assigned with 0, making MHI use a default size, 64KB, to allocate channel buffers. This is likely to fail in some scenarios where system memory is highly fragmented and memory compaction or reclaim is not allowed.

  • CVE-2024-35946

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix null pointer access when abort scan. During cancel scan we might use vif that weren't scanning. Fix this by using the actual scanning vif.

  • CVE-2024-35947

    In the Linux kernel, the following vulnerability has been resolved: dyndbg: fix old BUG_ON in >control parser.

  • CVE-2024-35952

    In the Linux kernel, the following vulnerability has been resolved: drm/ast: Fix soft lockup. There is a while-loop in ast_dp_set_on_off() that could lead to infinite-loop. This is because the register, VGACRI-Dx, checked in this API is a scratch register actually controlled by a MCU, named DPMCU, in BMC.

  • CVE-2024-36000

    In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix missing hugetlb_lock for resv uncharge.

  • CVE-2024-36005

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: honor table dormant flag from netdev release event path. Check for table dormant flag otherwise netdev release event path tries to unregister an already unregistered hook.

  • CVE-2024-36006

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage.

  • CVE-2024-36010

    In the Linux kernel, the following vulnerability has been resolved: igb: Fix string truncation warnings in igb_set_fw_version.

  • CVE-2024-36016

    In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive().

  • CVE-2024-36017

    In the Linux kernel, the following vulnerability has been resolved: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation.

  • CVE-2024-36020

    In the Linux kernel, the following vulnerability has been resolved: i40e: fix vf may be used uninitialized in this function warning.

  • CVE-2024-36025

    In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats().

  • CVE-2024-36270

    In the Linux kernel, the following vulnerability has been resolved: netfilter: tproxy: bail out if IP has been disabled on the device.

  • CVE-2024-36286

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu().

  • CVE-2024-36489

    In the Linux kernel, the following vulnerability has been resolved: tls: fix missing memory barrier in tls_init.

  • CVE-2024-36886

    In the Linux kernel, the following vulnerability has been resolved: tipc: fix UAF in error path.

  • CVE-2024-36889

    In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure snd_nxt is properly initialized on connect.

  • CVE-2024-36896

    In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix access violation during port device removal.

  • CVE-2024-36904

    In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().

  • CVE-2024-36905

    In the Linux kernel, the following vulnerability has been resolved: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets.

  • CVE-2024-36917

    In the Linux kernel, the following vulnerability has been resolved: block: fix overflow in blk_ioctl_discard(). There is no check for overflow of 'start + len' in blk_ioctl_discard().

  • CVE-2024-36921

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: guard against invalid STA ID on removal. Guard against invalid station IDs in iwl_mvm_mld_rm_sta_id as that would result in out-of-bounds array accesses. This prevents issues should the driver get into a bad state during error handling.

  • CVE-2024-36927

    In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix uninit-value access in __ip_make_skb().

  • CVE-2024-36929

    In the Linux kernel, the following vulnerability has been resolved: net: core: reject skb_copy(_expand) for fraglist GSO skbs. SKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become invalid. Return NULL if such an skb is passed to skb_copy or skb_copy_expand, in order to prevent a crash on a potential later call to skb_gso_segment.

  • CVE-2024-36933

    In the Linux kernel, the following vulnerability has been resolved: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().

  • CVE-2024-36940

    In the Linux kernel, the following vulnerability has been resolved: pinctrl: core: delete incorrect free in pinctrl_enable(). The "pctldev" struct is allocated in devm_pinctrl_register_and_init(). It's a devm_ managed pointer that is freed by devm_pinctrl_dev_release(), so freeing it in pinctrl_enable() will lead to a double free. The devm_pinctrl_dev_release() function frees the pindescs and destroys the mutex as well.

  • CVE-2024-36941

    In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: don't free NULL coalescing rule. If the parsing fails, we can dereference a NULL pointer here.

  • CVE-2024-36950

    In the Linux kernel, the following vulnerability has been resolved: firewire: ohci: mask bus reset interrupts between ISR and bottom half. In the FireWire OHCI interrupt handler, if a bus reset interrupt has occurred, mask bus reset interrupts until bus_reset_work has serviced and cleared the interrupt. Normally, we always leave bus reset interrupts masked. We infer the bus reset from the self-ID interrupt that happens shortly thereafter.

  • CVE-2024-36954

    In the Linux kernel, the following vulnerability has been resolved: tipc: fix a possible memleak in tipc_buf_append. __skb_linearize() doesn't free the skb when it fails, so move '*buf = NULL' after __skb_linearize(), so that the skb can be freed on the err path.

  • CVE-2024-36960

    In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix invalid reads in fence signaled events. Correctly set the length of the drm_event to the size of the structure that's actually used.

  • CVE-2024-36971

    In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race.

  • CVE-2024-36978

    In the Linux kernel, the following vulnerability has been resolved: net: sched: sch_multiq: fix possible OOB write in multiq_tune().

  • CVE-2024-36979

    In the Linux kernel, the following vulnerability has been resolved: net: bridge: mst: fix vlan use-after-free.

  • CVE-2024-38538

    In the Linux kernel, the following vulnerability has been resolved: net: bridge: xmit: make sure we have at least eth header len bytes.

  • CVE-2024-38555

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Discard command completions in internal error. Fix use after free when FW completion arrives while device is in internal error state. Avoid calling completion handler in this case, since the device will flush the command interface and trigger all completions manually.

  • CVE-2024-38573

    In the Linux kernel, the following vulnerability has been resolved: cppc_cpufreq: Fix possible null pointer dereference.

  • CVE-2024-38575

    In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: pcie: handle randbuf allocation failure. The kzalloc() in brcmf_pcie_download_fw_nvram() will return null if the physical memory has run out. As a result, if we use get_random_bytes() to generate random bytes in the randbuf, the null pointer dereference bug will happen.

  • CVE-2024-38596

    In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg. A data-race condition has been identified in af_unix. In one data path, the write function unix_release_sock() atomically writes to sk->sk_shutdown using WRITE_ONCE. However, on the reader side, unix_stream_sendmsg() does not read it atomically. Consequently, this issue is causing the following KCSAN splat to occur.

  • CVE-2024-38615

    In the Linux kernel, the following vulnerability has been resolved: cpufreq: exit() callback is optional. The exit() callback is optional and shouldn't be called without checking a valid pointer first. Also, we must clear freq_table pointer even if the exit() callback isn't present.

  • CVE-2024-38627

    In the Linux kernel, the following vulnerability has been resolved: stm class: Fix a double free in stm_register_device(). The put_device(&stm->dev) call will trigger stm_device_release() which frees "stm" so the vfree(stm) on the next line is a double free.

  • CVE-2024-39276

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find().

  • CVE-2024-39472

    In the Linux kernel, the following vulnerability has been resolved: xfs: fix log recovery buffer allocation for the legacy h_size fixup.

  • CVE-2024-39476

    In the Linux kernel, the following vulnerability has been resolved: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING.

  • CVE-2024-39487

    In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set(). In function bond_option_arp_ip_targets_set(), if newval->string is an empty string, newval->string+1 will point to the byte after the string, causing an out-of-bound read.

  • CVE-2024-39502

    In the Linux kernel, the following vulnerability has been resolved: ionic: fix use after netif_napi_del(). When queues are started, netif_napi_add() and napi_enable() are called. If there are 4 queues and only 3 queues are used for the current configuration, only 3 queues' napi should be registered and enabled. The ionic_qcq_enable() checks whether the .poll pointer is not NULL for enabling only the using queue' napi. Unused queues' napi will not be registered by netif_napi_add(), so the .poll pointer indicates NULL. But it couldn't distinguish whether the napi was unregistered or not because netif_napi_del() doesn't reset the .poll pointer to NULL. So, ionic_qcq_enable() calls napi_enable() for the queue, which was unregistered by netif_napi_del().

  • CVE-2024-40927

    In the Linux kernel, the following vulnerability has been resolved: xhci: Handle TD clearing for multiple streams case.

Severity level

CVE Score CVSS 2.0 Score CVSS 3.x Score CVSS 4.0
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.7 no information
no information 7.0 no information
no information 4.4 no information
no information 5.5 no information
no information 6.0 no information
no information 4.1 no information
no information 6.1 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 3.3 no information
no information 5.5 no information
no information 4.4 no information
no information 2.3 no information
no information 4.4 no information
no information 5.8 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 7.0 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 5.2 no information
no information 4.4 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 5.2 no information
no information 4.4 no information
no information 6.4 no information
NIST — CVE-2024-2201
no information 4.7 no information
no information 5.5 no information
no information 6.7 no information
no information 3.3 no information
no information 5.5 no information
no information 4.4 no information
no information 7.1 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 6.0 no information
no information 7.0 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 7.0 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.1 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.8 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.8 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 6.4 no information
no information 6.1 no information
no information 5.3 no information
no information 5.2 no information
no information 5.5 no information
no information 4.7 no information
no information 6.1 no information
no information 7.1 no information
no information 5.5 no information
no information 5.5 no information
no information 7.0 no information
no information 5.5 no information
no information 4.4 no information
no information 6.7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.9 no information
no information 2.3 no information
no information 5.7 no information
no information 4.4 no information
no information 5.5 no information
no information 7.1 no information
no information 7.0 no information
no information 5.5 no information
no information 6.6 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 4.7 no information
no information 4.4 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
Critical, important, moderate, low

Updated packages