INFSA-2024:8856: kernel security update
Information about definition
Identificator: INFSA-2024:8856
Type: security
Release date: 2024-12-13 13:13:21 UTC
Information about package
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Vulnerabilities description
- CVE-2022-48773
Linux Kernel is vulnerable to a denial of service, caused by pointer derefs in Error Cases Of Rpcrdma_ep_create. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.
- CVE-2022-48936
In the Linux kernel, the following vulnerability has been resolved: kernel: gso: do not skip outer ip header in case of ipip and net_failover.
- CVE-2023-52492
Linux Kernel is vulnerable to a denial of service, caused by a NULL pointer dereference flaw in the channel unregistration function. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.
- CVE-2024-24857
Linux Kernel is vulnerable to a denial of service, caused by a race condition in the conn_info_{min,max}_age_set() function in net/bluetooth. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to cause bluetooth connection abnormality or a denial of service condition.
- CVE-2024-26851
A vulnerability was found in the netfilter subsystem of the Linux kernel, specifically in the nf_conntrack_h323 module. This issue involves inadequate protection for BMP length values, potentially leading to out-of-range conditions.
- CVE-2024-26924
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element.
- CVE-2024-26976
In the Linux kernel, the following vulnerability has been resolved: KVM: Always flush async #PF workqueue when vCPU is being destroyed.
- CVE-2024-27017
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generation mask can be updated while netlink dump is in progress. The pipapo set backend walk iterator cannot rely on it to infer what view of the datastructure is to be used. Add notation to specify if user wants to read/update the set. Based on patch from Florian Westphal.
- CVE-2024-27062
A flaw was found in the nouveau module in the Linux kernel. A missing resource lock can cause a race condition and trigger a general protection fault, resulting in a denial of service.
- CVE-2024-35839
In the Linux kernel, the following vulnerability has been resolved: netfilter: bridge: replace physindev with physinif in nf_bridge_info.
- CVE-2024-35898
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get().
- CVE-2024-35939
In the Linux kernel, the following vulnerability has been resolved: dma-direct: Leak pages on dma_set_decrypted() failure.
- CVE-2024-38540
In the Linux kernel, the following vulnerability has been resolved: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq.
- CVE-2024-38541
A buffer overflow flaw was found in of_modalias() in the Linux kernel, occurring after the first snprintf() call. This issue could result in loss of availability of the system.
- CVE-2024-38586
In the Linux kernel, the following vulnerability has been resolved: r8169: Fix possible ring buffer corruption on fragmented Tx packets. An issue was found on the RTL8125b when transmitting small fragmented packets, whereby invalid entries were inserted into the transmit ring buffer, subsequently leading to calls to dma_unmap_single() with a null address. This was caused by rtl8169_start_xmit() not noticing changes to nr_frags which may occur when small packets are padded (to work around hardware quirks) in rtl8169_tso_csum_v2(). To fix this, postpone inspecting nr_frags until after any padding has been applied.
- CVE-2024-38608
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix netif state handling mlx5e_suspend cleans resources only if netif_device_present() returns true.
- CVE-2024-39503
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type.
- CVE-2024-40924
In the Linux kernel, the following vulnerability has been resolved: drm/i915/dpt: Make DPT object unshrinkable
- CVE-2024-40961
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible NULL deref in fib6_nh_init().
- CVE-2024-40983
In the Linux kernel, the following vulnerability has been resolved: tipc: force a dst refcount before doing decryption.
- CVE-2024-40984
In the Linux kernel, the following vulnerability has been resolved: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.".
- CVE-2024-41009
An out-of-bounds memory access flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to crash the system.
- CVE-2024-41042
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prefer nft_chain_validate nft_chain_validate already performs loop detection because a cycle will result in a call stack overflow.
- CVE-2024-41066
In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Add tx check to prevent skb leak.
- CVE-2024-41092
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: Fix potential UAF by revoke of fence registers.
- CVE-2024-41093
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid using null object of framebuffer Instead of using state->fb->obj[0] directly, get object from framebuffer by calling drm_gem_fb_get_obj() and return error code when object is null to avoid using null object of framebuffer.
- CVE-2024-42070
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This only requires a new helper function to infer the register type from the set datatype so this conditional check can be removed. Otherwise, pointer to chain object can be leaked through the registers.
- CVE-2024-42079
In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix NULL pointer dereference in gfs2_log_flush In gfs2_jindex_free(), set sdp->sd_jdesc to NULL under the log flush lock to provide exclusion against gfs2_log_flush(). In gfs2_log_flush(), check if sdp->sd_jdesc is non-NULL before dereferencing it. Otherwise, we could run into a NULL pointer dereference when outstanding glock work races with an unmount (glock_work_func -> run_queue -> do_xmote -> inode_go_sync -> gfs2_log_flush).
- CVE-2024-42244
In the Linux kernel, the following vulnerability has been resolved: USB: serial: mos7840: fix crash on resume.
- CVE-2024-42284
In the Linux kernel, the following vulnerability has been resolved: tipc: Return non-zero value from tipc_udp_addr2str() on error tipc_udp_addr2str() should return non-zero value if the UDP media address is invalid. Otherwise, a buffer overflow access can occur in tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP media address.
- CVE-2024-42292
In the Linux kernel, the following vulnerability has been resolved: kobject_uevent: Fix OOB access within zap_modalias_env() zap_modalias_env() wrongly calculates size of memory block to move, so will cause OOB memory access issue if variable MODALIAS is not the last one within its @env parameter, fixed by correcting size to memmove.
- CVE-2024-42301
In the Linux kernel, the following vulnerability has been resolved: dev/parport: fix the array out-of-bounds risk.
- CVE-2024-43854
In the Linux kernel, the following vulnerability has been resolved: block: initialize integrity buffer to zero before writing it to media.
- CVE-2024-43880
In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_erp: Fix object nesting warning ACLs in Spectrum-2 and newer ASICs can reside in the algorithmic TCAM (A-TCAM) or in the ordinary circuit TCAM (C-TCAM).
- CVE-2024-43889
A denial of service vulnerability exists in the Linux kernel. A possible divide-by-0 is in the padata_mt_helper() function when the ps->chunk_size is 0. This vulnerability could result in a loss of system availability.
- CVE-2024-43892
In the Linux kernel, the following vulnerability has been resolved: memcg: protect concurrent access to mem_cgroup_idr.
- CVE-2024-44935
In the Linux kernel, the following vulnerability has been resolved: sctp: Fix null-ptr-deref in reuseport_add_sock().
- CVE-2024-44989
In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference.
- CVE-2024-44990
In the Linux kernel, the following vulnerability has been resolved: bonding: fix null pointer deref in bond_ipsec_offload_ok.
- CVE-2024-45018
In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: initialise extack before use.
- CVE-2024-46826
In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_space" twice. It is sysctl and can change at any moment, so 2 loads could see 2 different values in theory with unpredictable consequences. Issue exactly one load for consistent value across one exec.
- CVE-2024-47668
In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc().
Severity level
CVE | Score CVSS 2.0 | Score CVSS 3.x | Score CVSS 4.0 |
---|---|---|---|
NIST — CVE-2022-48773
|
no information | 5.5 | no information |
NIST — CVE-2022-48936
|
no information | 0 | no information |
NIST — CVE-2023-52492
|
no information | 4.4 | no information |
NIST — CVE-2024-24857
|
no information | 6.8 | no information |
NIST — CVE-2024-26851
|
no information | 5.5 | no information |
NIST — CVE-2024-26924
|
no information | 5.5 | no information |
NIST — CVE-2024-26976
|
no information | 5.5 | no information |
NIST — CVE-2024-27017
|
no information | 5.5 | no information |
NIST — CVE-2024-27062
|
no information | 5.5 | no information |
NIST — CVE-2024-35839
|
no information | 5.5 | no information |
NIST — CVE-2024-35898
|
no information | 5.5 | no information |
NIST — CVE-2024-35939
|
no information | 5.5 | no information |
NIST — CVE-2024-38540
|
no information | 4.4 | no information |
NIST — CVE-2024-38541
|
no information | 4.4 | no information |
NIST — CVE-2024-38586
|
no information | 4.1 | no information |
NIST — CVE-2024-38608
|
no information | 5.5 | no information |
NIST — CVE-2024-39503
|
no information | 6.4 | no information |
NIST — CVE-2024-40924
|
no information | 4.4 | no information |
NIST — CVE-2024-40961
|
no information | 5.5 | no information |
NIST — CVE-2024-40983
|
no information | 5.5 | no information |
NIST — CVE-2024-40984
|
no information | 5.5 | no information |
NIST — CVE-2024-41009
|
no information | 4.4 | no information |
NIST — CVE-2024-41042
|
no information | 4.1 | no information |
NIST — CVE-2024-41066
|
no information | 6.4 | no information |
NIST — CVE-2024-41092
|
no information | 6.7 | no information |
NIST — CVE-2024-41093
|
no information | 5.5 | no information |
NIST — CVE-2024-42070
|
no information | 5.5 | no information |
NIST — CVE-2024-42079
|
no information | 5.5 | no information |
NIST — CVE-2024-42244
|
no information | 4.4 | no information |
NIST — CVE-2024-42284
|
no information | 7.3 | no information |
NIST — CVE-2024-42292
|
no information | 6.1 | no information |
NIST — CVE-2024-42301
|
no information | 5.5 | no information |
NIST — CVE-2024-43854
|
no information | 5.5 | no information |
NIST — CVE-2024-43880
|
no information | 4.7 | no information |
NIST — CVE-2024-43889
|
no information | 5.5 | no information |
NIST — CVE-2024-43892
|
no information | 4.7 | no information |
NIST — CVE-2024-44935
|
no information | 5.5 | no information |
NIST — CVE-2024-44989
|
no information | 5.5 | no information |
NIST — CVE-2024-44990
|
no information | 5.5 | no information |
NIST — CVE-2024-45018
|
no information | 5.5 | no information |
NIST — CVE-2024-46826
|
no information | 5.5 | no information |
NIST — CVE-2024-47668
|
no information | 5.5 | no information |
Updated packages