INFSA-2024:8856: kernel security update

Information about definition

Identificator: INFSA-2024:8856

Type: security

Release date: 2024-12-13 13:13:21 UTC

Information about package

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Vulnerabilities description

  • CVE-2022-48773

    Linux Kernel is vulnerable to a denial of service, caused by pointer derefs in Error Cases Of Rpcrdma_ep_create. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.

  • CVE-2022-48936

    In the Linux kernel, the following vulnerability has been resolved: kernel: gso: do not skip outer ip header in case of ipip and net_failover.

  • CVE-2023-52492

    Linux Kernel is vulnerable to a denial of service, caused by a NULL pointer dereference flaw in the channel unregistration function. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

  • CVE-2024-24857

    Linux Kernel is vulnerable to a denial of service, caused by a race condition in the conn_info_{min,max}_age_set() function in net/bluetooth. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to cause bluetooth connection abnormality or a denial of service condition.

  • CVE-2024-26851

    A vulnerability was found in the netfilter subsystem of the Linux kernel, specifically in the nf_conntrack_h323 module. This issue involves inadequate protection for BMP length values, potentially leading to out-of-range conditions.

  • CVE-2024-26924

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element.

  • CVE-2024-26976

    In the Linux kernel, the following vulnerability has been resolved: KVM: Always flush async #PF workqueue when vCPU is being destroyed.

  • CVE-2024-27017

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generation mask can be updated while netlink dump is in progress. The pipapo set backend walk iterator cannot rely on it to infer what view of the datastructure is to be used. Add notation to specify if user wants to read/update the set. Based on patch from Florian Westphal.

  • CVE-2024-27062

    A flaw was found in the nouveau module in the Linux kernel. A missing resource lock can cause a race condition and trigger a general protection fault, resulting in a denial of service.

  • CVE-2024-35839

    In the Linux kernel, the following vulnerability has been resolved: netfilter: bridge: replace physindev with physinif in nf_bridge_info.

  • CVE-2024-35898

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get().

  • CVE-2024-35939

    In the Linux kernel, the following vulnerability has been resolved: dma-direct: Leak pages on dma_set_decrypted() failure.

  • CVE-2024-38540

    In the Linux kernel, the following vulnerability has been resolved: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq.

  • CVE-2024-38541

    A buffer overflow flaw was found in of_modalias() in the Linux kernel, occurring after the first snprintf() call. This issue could result in loss of availability of the system.

  • CVE-2024-38586

    In the Linux kernel, the following vulnerability has been resolved: r8169: Fix possible ring buffer corruption on fragmented Tx packets. An issue was found on the RTL8125b when transmitting small fragmented packets, whereby invalid entries were inserted into the transmit ring buffer, subsequently leading to calls to dma_unmap_single() with a null address. This was caused by rtl8169_start_xmit() not noticing changes to nr_frags which may occur when small packets are padded (to work around hardware quirks) in rtl8169_tso_csum_v2(). To fix this, postpone inspecting nr_frags until after any padding has been applied.

  • CVE-2024-38608

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix netif state handling mlx5e_suspend cleans resources only if netif_device_present() returns true.

  • CVE-2024-39503

    In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type.

  • CVE-2024-40924

    In the Linux kernel, the following vulnerability has been resolved: drm/i915/dpt: Make DPT object unshrinkable

  • CVE-2024-40961

    In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible NULL deref in fib6_nh_init().

  • CVE-2024-40983

    In the Linux kernel, the following vulnerability has been resolved: tipc: force a dst refcount before doing decryption.

  • CVE-2024-40984

    In the Linux kernel, the following vulnerability has been resolved: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.".

  • CVE-2024-41009

    An out-of-bounds memory access flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to crash the system.

  • CVE-2024-41042

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prefer nft_chain_validate nft_chain_validate already performs loop detection because a cycle will result in a call stack overflow.

  • CVE-2024-41066

    In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Add tx check to prevent skb leak.

  • CVE-2024-41092

    In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: Fix potential UAF by revoke of fence registers.

  • CVE-2024-41093

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid using null object of framebuffer Instead of using state->fb->obj[0] directly, get object from framebuffer by calling drm_gem_fb_get_obj() and return error code when object is null to avoid using null object of framebuffer.

  • CVE-2024-42070

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This only requires a new helper function to infer the register type from the set datatype so this conditional check can be removed. Otherwise, pointer to chain object can be leaked through the registers.

  • CVE-2024-42079

    In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix NULL pointer dereference in gfs2_log_flush In gfs2_jindex_free(), set sdp->sd_jdesc to NULL under the log flush lock to provide exclusion against gfs2_log_flush(). In gfs2_log_flush(), check if sdp->sd_jdesc is non-NULL before dereferencing it. Otherwise, we could run into a NULL pointer dereference when outstanding glock work races with an unmount (glock_work_func -> run_queue -> do_xmote -> inode_go_sync -> gfs2_log_flush).

  • CVE-2024-42244

    In the Linux kernel, the following vulnerability has been resolved: USB: serial: mos7840: fix crash on resume.

  • CVE-2024-42284

    In the Linux kernel, the following vulnerability has been resolved: tipc: Return non-zero value from tipc_udp_addr2str() on error tipc_udp_addr2str() should return non-zero value if the UDP media address is invalid. Otherwise, a buffer overflow access can occur in tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP media address.

  • CVE-2024-42292

    In the Linux kernel, the following vulnerability has been resolved: kobject_uevent: Fix OOB access within zap_modalias_env() zap_modalias_env() wrongly calculates size of memory block to move, so will cause OOB memory access issue if variable MODALIAS is not the last one within its @env parameter, fixed by correcting size to memmove.

  • CVE-2024-42301

    In the Linux kernel, the following vulnerability has been resolved: dev/parport: fix the array out-of-bounds risk.

  • CVE-2024-43854

    In the Linux kernel, the following vulnerability has been resolved: block: initialize integrity buffer to zero before writing it to media.

  • CVE-2024-43880

    In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_erp: Fix object nesting warning ACLs in Spectrum-2 and newer ASICs can reside in the algorithmic TCAM (A-TCAM) or in the ordinary circuit TCAM (C-TCAM).

  • CVE-2024-43889

    A denial of service vulnerability exists in the Linux kernel. A possible divide-by-0 is in the padata_mt_helper() function when the ps->chunk_size is 0. This vulnerability could result in a loss of system availability.

  • CVE-2024-43892

    In the Linux kernel, the following vulnerability has been resolved: memcg: protect concurrent access to mem_cgroup_idr.

  • CVE-2024-44935

    In the Linux kernel, the following vulnerability has been resolved: sctp: Fix null-ptr-deref in reuseport_add_sock().

  • CVE-2024-44989

    In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference.

  • CVE-2024-44990

    In the Linux kernel, the following vulnerability has been resolved: bonding: fix null pointer deref in bond_ipsec_offload_ok.

  • CVE-2024-45018

    In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: initialise extack before use.

  • CVE-2024-46826

    In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_space" twice. It is sysctl and can change at any moment, so 2 loads could see 2 different values in theory with unpredictable consequences. Issue exactly one load for consistent value across one exec.

  • CVE-2024-47668

    In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc().

Severity level

CVE Score CVSS 2.0 Score CVSS 3.x Score CVSS 4.0
no information 5.5 no information
no information 0 no information
no information 4.4 no information
no information 6.8 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.4 no information
no information 4.1 no information
no information 5.5 no information
no information 6.4 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.1 no information
no information 6.4 no information
no information 6.7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 7.3 no information
no information 6.1 no information
no information 5.5 no information
no information 5.5 no information
no information 4.7 no information
no information 5.5 no information
no information 4.7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
Critical, important, moderate, low

Updated packages