Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:5101

Опубликовано: 21 авг. 2024
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451)

  • kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)

  • kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939)

  • kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622)

  • kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669)

  • kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802)

  • kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843)

  • kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878)

  • kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)

  • kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653)

  • kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823)

  • kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (CVE-2023-52658)

  • kernel: ext4: fix corruption during on-line resize (CVE-2024-35807)

  • kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801)

  • kernel: dyndbg: fix old BUG_ON in >control parser (CVE-2024-35947)

  • kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893)

  • kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876)

  • kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864)

  • kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845)

  • (CVE-2023-28746)

  • (CVE-2023-52847)

  • (CVE-2021-47548)

  • (CVE-2024-36921)

  • (CVE-2024-26921)

  • (CVE-2021-47579)

  • (CVE-2024-36927)

  • (CVE-2024-39276)

  • (CVE-2024-33621)

  • (CVE-2024-27010)

  • (CVE-2024-26960)

  • (CVE-2024-38596)

  • (CVE-2022-48743)

  • (CVE-2024-26733)

  • (CVE-2024-26586)

  • (CVE-2024-26698)

  • (CVE-2023-52619)

Bug Fix(es):

  • Rocky Linux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:Rocky Linux-17678)

  • [AWS][8.9]There are call traces found when booting debug-kernel for Amazon EC2 r8g.metal-24xl instance (JIRA:Rocky Linux-23841)

  • [rhel8] gfs2: Fix glock shrinker (JIRA:Rocky Linux-32941)

  • lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:Rocky Linux-33437)

  • [Hyper-V][Rocky Linux-8.10.z] Update hv_netvsc driver to TOT (JIRA:Rocky Linux-39074)

  • Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:Rocky Linux-40167)

  • blk-cgroup: Properly propagate the iostat update up the hierarchy [rhel-8.10.z] (JIRA:Rocky Linux-40939)

  • (JIRA:Rocky Linux-31798)

  • (JIRA:Rocky Linux-10263)

  • (JIRA:Rocky Linux-40901)

  • (JIRA:Rocky Linux-43547)

  • (JIRA:Rocky Linux-34876)

Enhancement(s):

  • [RFE] Add module parameters 'soft_reboot_cmd' and 'soft_active_on_boot' for customizing softdog configuration (JIRA:Rocky Linux-19723)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bpftoolx86_64553.16.1.el8_10bpftool-4.18.0-553.16.1.el8_10.x86_64.rpm
kernelx86_64553.16.1.el8_10kernel-4.18.0-553.16.1.el8_10.x86_64.rpm
kernel-abi-stablelistsnoarch553.16.1.el8_10kernel-abi-stablelists-4.18.0-553.16.1.el8_10.noarch.rpm
kernel-corex86_64553.16.1.el8_10kernel-core-4.18.0-553.16.1.el8_10.x86_64.rpm
kernel-cross-headersx86_64553.16.1.el8_10kernel-cross-headers-4.18.0-553.16.1.el8_10.x86_64.rpm
kernel-debugx86_64553.16.1.el8_10kernel-debug-4.18.0-553.16.1.el8_10.x86_64.rpm
kernel-debug-corex86_64553.16.1.el8_10kernel-debug-core-4.18.0-553.16.1.el8_10.x86_64.rpm
kernel-debug-develx86_64553.16.1.el8_10kernel-debug-devel-4.18.0-553.16.1.el8_10.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64553.16.1.el8_10kernel-debuginfo-common-x86_64-4.18.0-553.16.1.el8_10.x86_64.rpm
kernel-debug-modulesx86_64553.16.1.el8_10kernel-debug-modules-4.18.0-553.16.1.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
11 месяцев назад

ELSA-2024-5101: kernel security update (IMPORTANT)

CVSS3: 5.5
ubuntu
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: tracing: Restructure trace_clock_global() to never block It was reported that a fix to the ring buffer recursion detection would cause a hung machine when performing suspend / resume testing. The following backtrace was extracted from debugging that case: Call Trace: trace_clock_global+0x91/0xa0 __rb_reserve_next+0x237/0x460 ring_buffer_lock_reserve+0x12a/0x3f0 trace_buffer_lock_reserve+0x10/0x50 __trace_graph_return+0x1f/0x80 trace_graph_return+0xb7/0xf0 ? trace_clock_global+0x91/0xa0 ftrace_return_to_handler+0x8b/0xf0 ? pv_hash+0xa0/0xa0 return_to_handler+0x15/0x30 ? ftrace_graph_caller+0xa0/0xa0 ? trace_clock_global+0x91/0xa0 ? __rb_reserve_next+0x237/0x460 ? ring_buffer_lock_reserve+0x12a/0x3f0 ? trace_event_buffer_lock_reserve+0x3c/0x120 ? trace_event_buffer_reserve+0x6b/0xc0 ? trace_event_raw_event_device_pm_callback_start+0x125/0x2d0 ? dpm_run_callback+0x3b/0xc0 ? pm_ops_is_empty+0x50/0x50 ? platform_get_irq_...

CVSS3: 5.5
redhat
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: tracing: Restructure trace_clock_global() to never block It was reported that a fix to the ring buffer recursion detection would cause a hung machine when performing suspend / resume testing. The following backtrace was extracted from debugging that case: Call Trace: trace_clock_global+0x91/0xa0 __rb_reserve_next+0x237/0x460 ring_buffer_lock_reserve+0x12a/0x3f0 trace_buffer_lock_reserve+0x10/0x50 __trace_graph_return+0x1f/0x80 trace_graph_return+0xb7/0xf0 ? trace_clock_global+0x91/0xa0 ftrace_return_to_handler+0x8b/0xf0 ? pv_hash+0xa0/0xa0 return_to_handler+0x15/0x30 ? ftrace_graph_caller+0xa0/0xa0 ? trace_clock_global+0x91/0xa0 ? __rb_reserve_next+0x237/0x460 ? ring_buffer_lock_reserve+0x12a/0x3f0 ? trace_event_buffer_lock_reserve+0x3c/0x120 ? trace_event_buffer_reserve+0x6b/0xc0 ? trace_event_raw_event_device_pm_callback_start+0x125/0x2d0 ? dpm_run_callback+0x3b/0xc0 ? pm_ops_is_empty+0x50/0x50 ? platform_get_irq_...

CVSS3: 5.5
nvd
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: tracing: Restructure trace_clock_global() to never block It was reported that a fix to the ring buffer recursion detection would cause a hung machine when performing suspend / resume testing. The following backtrace was extracted from debugging that case: Call Trace: trace_clock_global+0x91/0xa0 __rb_reserve_next+0x237/0x460 ring_buffer_lock_reserve+0x12a/0x3f0 trace_buffer_lock_reserve+0x10/0x50 __trace_graph_return+0x1f/0x80 trace_graph_return+0xb7/0xf0 ? trace_clock_global+0x91/0xa0 ftrace_return_to_handler+0x8b/0xf0 ? pv_hash+0xa0/0xa0 return_to_handler+0x15/0x30 ? ftrace_graph_caller+0xa0/0xa0 ? trace_clock_global+0x91/0xa0 ? __rb_reserve_next+0x237/0x460 ? ring_buffer_lock_reserve+0x12a/0x3f0 ? trace_event_buffer_lock_reserve+0x3c/0x120 ? trace_event_buffer_reserve+0x6b/0xc0 ? trace_event_raw_event_device_pm_callback_start+0x125/0x2d0 ? dpm_run_callback+0x3b/0xc0 ? pm_ops_is_empty+0x50/0x50

CVSS3: 5.5
debian
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: t ...