Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:4928

Опубликовано: 01 авг. 2024
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned (CVE-2023-52458)

  • kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773)

  • kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel (CVE-2024-26737)

  • kernel: dm: call the resume method on internal suspend (CVE-2024-26880)

  • kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() (CVE-2024-26852)

  • kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)

  • kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046)

  • kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030)

  • kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() (CVE-2024-35857)

  • kernel: mlxbf_gige: call request_irq() after NAPI initialized (CVE-2024-35907)

  • kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885)

  • kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (CVE-2023-52809)

  • kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (CVE-2021-47459)

  • kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (CVE-2024-36924)

  • kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (CVE-2024-36952)

  • kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743)

  • kernel: epoll: be better about file lifetimes (CVE-2024-38580)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
bpftoolx86_64427.28.1.el9_4bpftool-7.3.0-427.28.1.el9_4.x86_64.rpm
kernelx86_64427.28.1.el9_4kernel-5.14.0-427.28.1.el9_4.x86_64.rpm
kernel-abi-stablelistsnoarch427.28.1.el9_4kernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpm
kernel-corex86_64427.28.1.el9_4kernel-core-5.14.0-427.28.1.el9_4.x86_64.rpm
kernel-debugx86_64427.28.1.el9_4kernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm
kernel-debug-corex86_64427.28.1.el9_4kernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpm
kernel-debug-modulesx86_64427.28.1.el9_4kernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm
kernel-debug-modules-corex86_64427.28.1.el9_4kernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm
kernel-debug-modules-extrax86_64427.28.1.el9_4kernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm
kernel-debug-uki-virtx86_64427.28.1.el9_4kernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
11 месяцев назад

ELSA-2024-4928: kernel security update (MODERATE)

CVSS3: 7.8
ubuntu
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv It will trigger UAF for rx_kref of j1939_priv as following. cpu0 cpu1 j1939_sk_bind(socket0, ndev0, ...) j1939_netdev_start j1939_sk_bind(socket1, ndev0, ...) j1939_netdev_start j1939_priv_set j1939_priv_get_by_ndev_locked j1939_jsk_add ..... j1939_netdev_stop kref_put_lock(&priv->rx_kref, ...) kref_get(&priv->rx_kref, ...) REFCOUNT_WARN("addition on 0;...") ==================================================== refcount_t: addition on 0; use-after-free. WARNING: CPU: 1 PID: 20874 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0 RIP: 0010:refcount_warn_saturate+0x169/0x1e0 Call Trace: j1939_netdev_start+0x68b/0x920 j1939_sk_bind+0x426/0xeb0 ? security_socket_bind+0x83/0xb0 The rx_kref's kref_get() and kref_put() should use j1939_netdev_lock to protect.

CVSS3: 7.8
redhat
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv It will trigger UAF for rx_kref of j1939_priv as following. cpu0 cpu1 j1939_sk_bind(socket0, ndev0, ...) j1939_netdev_start j1939_sk_bind(socket1, ndev0, ...) j1939_netdev_start j1939_priv_set j1939_priv_get_by_ndev_locked j1939_jsk_add ..... j1939_netdev_stop kref_put_lock(&priv->rx_kref, ...) kref_get(&priv->rx_kref, ...) REFCOUNT_WARN("addition on 0;...") ==================================================== refcount_t: addition on 0; use-after-free. WARNING: CPU: 1 PID: 20874 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0 RIP: 0010:refcount_warn_saturate+0x169/0x1e0 Call Trace: j1939_netdev_start+0x68b/0x920 j1939_sk_bind+0x426/0xeb0 ? security_socket_bind+0x83/0xb0 The rx_kref's kref_get() and kref_put() should use j1939_netdev_lock to protect.

CVSS3: 7.8
nvd
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv It will trigger UAF for rx_kref of j1939_priv as following. cpu0 cpu1 j1939_sk_bind(socket0, ndev0, ...) j1939_netdev_start j1939_sk_bind(socket1, ndev0, ...) j1939_netdev_start j1939_priv_set j1939_priv_get_by_ndev_locked j1939_jsk_add ..... j1939_netdev_stop kref_put_lock(&priv->rx_kref, ...) kref_get(&priv->rx_kref, ...) REFCOUNT_WARN("addition on 0;...") ==================================================== refcount_t: addition on 0; use-after-free. WARNING: CPU: 1 PID: 20874 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0 RIP: 0010:refcount_warn_saturate+0x169/0x1e0 Call Trace: j1939_netdev_start+

CVSS3: 7.8
debian
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: c ...