alsa-2024:2394
Vulnerability from osv_almalinux
Published
2024-04-30 00:00
Modified
2024-11-03 22:05
Summary
Important: kernel security, bug fix, and enhancement update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546)
  • kernel: multiple use-after-free vulnerabilities (CVE-2024-1086, CVE-2023-3567, CVE-2023-4133, CVE-2023-6932, CVE-2023-39198, CVE-2023-51043, CVE-2023-51779, CVE-2023-51780, CVE-2024-1085, CVE-2024-26582)
  • kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)
  • kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion (CVE-2022-0480)
  • kernel: multiple NULL pointer dereference vulnerabilities (CVE-2022-38096, CVE-2023-6622, CVE-2023-6915, CVE-2023-42754, CVE-2023-46862, CVE-2023-52574, CVE-2024-0841, CVE-2023-52448)
  • kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c (CVE-2022-45934)
  • kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable() (CVE-2023-6040)
  • kernel: GC's deletion of an SKB races with unix_stream_read_generic() leading to UAF (CVE-2023-6531)
  • kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931)
  • kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses (CVE-2023-24023)
  • kernel: irdma: Improper access control (CVE-2023-25775)
  • Kernel: double free in hci_conn_cleanup of the bluetooth subsystem (CVE-2023-28464)
  • kernel: Bluetooth: HCI: global out-of-bounds access in net/bluetooth/hci_sync.c (CVE-2023-28866)
  • kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl (CVE-2023-31083)
  • kernel: multiple out-of-bounds read vulnerabilities (CVE-2023-37453, CVE-2023-39189, CVE-2023-39193, CVE-2023-6121, CVE-2023-39194)
  • kernel: netfilter: race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP (CVE-2023-42756)
  • kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write (CVE-2023-45863)
  • kernel: smb: client: fix potential OOBs in smb2_parse_contexts() (CVE-2023-52434)
  • kernel: mm/sparsemem: fix race in accessing memory_section->usage (CVE-2023-52489)
  • kernel: net: fix possible store tearing in neigh_periodic_work() (CVE-2023-52522)
  • kernel: multiple memory leak vulnerabilities (CVE-2023-52529, CVE-2023-52581)
  • kernel: net: bridge: data races indata-races in br_handle_frame_finish() (CVE-2023-52578)
  • kernel: net/core: kernel crash in ETH_P_1588 flow dissector (CVE-2023-52580)
  • kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610)
  • kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565)
  • kernel: tls: race between async notify and socket close (CVE-2024-26583)
  • kernel: tls: handle backlogging of crypto requests (CVE-2024-26584)
  • kernel: tls: race between tx work scheduling and socket close (CVE-2024-26585)
  • kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption (CVE-2024-26586)
  • kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593)
  • kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier (CVE-2024-26602)
  • kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters (CVE-2024-26609)
  • kernel: local dos vulnerability in scatterwalk_copychunks (CVE-2023-6176)
  • kernel: perf/x86/lbr: Filter vsyscall addresses (CVE-2023-52476)
  • kernel: netfilter: nf_tables: disallow timeout for anonymous sets (CVE-2023-52620)
  • kernel: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (CVE-2024-26633)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.

References
https://access.redhat.com/errata/RHSA-2024:2394 ADVISORY
https://bugzilla.redhat.com/1918601 REPORT
https://bugzilla.redhat.com/2049700 REPORT
https://bugzilla.redhat.com/2133452 REPORT
https://bugzilla.redhat.com/2151959 REPORT
https://bugzilla.redhat.com/2177759 REPORT
https://bugzilla.redhat.com/2185519 REPORT
https://bugzilla.redhat.com/2188102 REPORT
https://bugzilla.redhat.com/2210024 REPORT
https://bugzilla.redhat.com/2213132 REPORT
https://bugzilla.redhat.com/2218332 REPORT
https://bugzilla.redhat.com/2219359 REPORT
https://bugzilla.redhat.com/2221039 REPORT
https://bugzilla.redhat.com/2221463 REPORT
https://bugzilla.redhat.com/2221702 REPORT
https://bugzilla.redhat.com/2226777 REPORT
https://bugzilla.redhat.com/2226787 REPORT
https://bugzilla.redhat.com/2226788 REPORT
https://bugzilla.redhat.com/2231410 REPORT
https://bugzilla.redhat.com/2239845 REPORT
https://bugzilla.redhat.com/2239848 REPORT
https://bugzilla.redhat.com/2244720 REPORT
https://bugzilla.redhat.com/2246980 REPORT
https://bugzilla.redhat.com/2250043 REPORT
https://bugzilla.redhat.com/2252731 REPORT
https://bugzilla.redhat.com/2253034 REPORT
https://bugzilla.redhat.com/2253632 REPORT
https://bugzilla.redhat.com/2254961 REPORT
https://bugzilla.redhat.com/2254982 REPORT
https://bugzilla.redhat.com/2255283 REPORT
https://bugzilla.redhat.com/2255498 REPORT
https://bugzilla.redhat.com/2256490 REPORT
https://bugzilla.redhat.com/2256822 REPORT
https://bugzilla.redhat.com/2257682 REPORT
https://bugzilla.redhat.com/2258013 REPORT
https://bugzilla.redhat.com/2258518 REPORT
https://bugzilla.redhat.com/2260005 REPORT
https://bugzilla.redhat.com/2262126 REPORT
https://bugzilla.redhat.com/2262127 REPORT
https://bugzilla.redhat.com/2265285 REPORT
https://bugzilla.redhat.com/2265517 REPORT
https://bugzilla.redhat.com/2265518 REPORT
https://bugzilla.redhat.com/2265519 REPORT
https://bugzilla.redhat.com/2265520 REPORT
https://bugzilla.redhat.com/2265645 REPORT
https://bugzilla.redhat.com/2265646 REPORT
https://bugzilla.redhat.com/2265653 REPORT
https://bugzilla.redhat.com/2267041 REPORT
https://bugzilla.redhat.com/2267695 REPORT
https://bugzilla.redhat.com/2267750 REPORT
https://bugzilla.redhat.com/2267758 REPORT
https://bugzilla.redhat.com/2267760 REPORT
https://bugzilla.redhat.com/2267761 REPORT
https://bugzilla.redhat.com/2267788 REPORT
https://bugzilla.redhat.com/2267795 REPORT
https://bugzilla.redhat.com/2269189 REPORT
https://bugzilla.redhat.com/2269217 REPORT
https://bugzilla.redhat.com/2270080 REPORT
https://bugzilla.redhat.com/2270118 REPORT
https://bugzilla.redhat.com/2270883 REPORT
https://errata.almalinux.org/9/ALSA-2024-2394.html ADVISORY
https://www.redhat.com/security/data/cve/CVE-2020… REPORT
https://www.redhat.com/security/data/cve/CVE-2022… REPORT
https://www.redhat.com/security/data/cve/CVE-2022… REPORT
https://www.redhat.com/security/data/cve/CVE-2022… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2023… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT
https://www.redhat.com/security/data/cve/CVE-2024… REPORT

{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "bpftool"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "7.3.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-abi-stablelists"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-cross-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-uki-virt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-doc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-tools"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-tools-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-tools-libs-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-uki-virt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "libperf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "python3-perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "rtla"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "rv"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.13.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.  \n\nSecurity Fix(es):  \n\n  * kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546)\n  * kernel: multiple use-after-free vulnerabilities (CVE-2024-1086, CVE-2023-3567, CVE-2023-4133, CVE-2023-6932, CVE-2023-39198, CVE-2023-51043, CVE-2023-51779, CVE-2023-51780, CVE-2024-1085, CVE-2024-26582)\n  * kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)\n  * kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion (CVE-2022-0480)\n  * kernel: multiple NULL pointer dereference vulnerabilities (CVE-2022-38096, CVE-2023-6622, CVE-2023-6915, CVE-2023-42754, CVE-2023-46862, CVE-2023-52574, CVE-2024-0841, CVE-2023-52448)\n  * kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c (CVE-2022-45934)\n  * kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable() (CVE-2023-6040)\n  * kernel: GC\u0027s deletion of an SKB races with unix_stream_read_generic() leading to UAF (CVE-2023-6531)\n  * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event\u0027s read_size (CVE-2023-6931)\n  * kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses (CVE-2023-24023)\n  * kernel: irdma: Improper access control (CVE-2023-25775)\n  * Kernel: double free in hci_conn_cleanup of the bluetooth subsystem (CVE-2023-28464)\n  * kernel: Bluetooth: HCI: global out-of-bounds access in net/bluetooth/hci_sync.c (CVE-2023-28866)\n  * kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl (CVE-2023-31083)\n  * kernel: multiple out-of-bounds read vulnerabilities (CVE-2023-37453, CVE-2023-39189, CVE-2023-39193, CVE-2023-6121, CVE-2023-39194)\n  * kernel: netfilter: race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP (CVE-2023-42756)\n  * kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write (CVE-2023-45863)\n  * kernel: smb: client: fix potential OOBs in smb2_parse_contexts() (CVE-2023-52434)\n  * kernel: mm/sparsemem: fix race in accessing memory_section-\u003eusage (CVE-2023-52489)\n  * kernel: net: fix possible store tearing in neigh_periodic_work() (CVE-2023-52522)\n  * kernel: multiple memory leak vulnerabilities (CVE-2023-52529, CVE-2023-52581)\n  * kernel: net: bridge: data races indata-races in br_handle_frame_finish() (CVE-2023-52578)\n  * kernel: net/core: kernel crash in ETH_P_1588 flow dissector (CVE-2023-52580)\n  * kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610)\n  * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565)\n  * kernel: tls: race between async notify and socket close (CVE-2024-26583)\n  * kernel: tls: handle backlogging of crypto requests (CVE-2024-26584)\n  * kernel: tls: race between tx work scheduling and socket close (CVE-2024-26585)\n  * kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption (CVE-2024-26586)\n  * kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593)\n  * kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier (CVE-2024-26602)\n  * kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters (CVE-2024-26609)\n  * kernel: local dos vulnerability in scatterwalk_copychunks (CVE-2023-6176)\n  * kernel: perf/x86/lbr: Filter vsyscall addresses (CVE-2023-52476)\n  * kernel: netfilter: nf_tables: disallow timeout for anonymous sets (CVE-2023-52620)\n  * kernel: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (CVE-2024-26633)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  \n\nAdditional Changes:  \n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.\n",
  "id": "ALSA-2024:2394",
  "modified": "2024-11-03T22:05:30Z",
  "published": "2024-04-30T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2024:2394"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/1918601"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2049700"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2133452"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2151959"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2177759"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2185519"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188102"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2210024"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2213132"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2218332"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2219359"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2221039"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2221463"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2221702"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2226777"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2226787"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2226788"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2231410"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2239845"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2239848"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2244720"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2246980"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2250043"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2252731"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2253034"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2253632"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2254961"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2254982"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2255283"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2255498"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2256490"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2256822"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2257682"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258013"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258518"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2260005"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2262126"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2262127"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265285"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265517"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265518"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265519"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265520"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265645"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265646"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265653"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267041"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267695"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267750"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267758"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267760"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267761"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267788"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267795"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2269189"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2269217"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2270080"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2270118"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2270883"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/9/ALSA-2024-2394.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2020-26555.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2022-0480.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2022-38096.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2022-45934.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-24023.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-25775.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-28464.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-28866.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-31083.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-3567.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-37453.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-39189.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-39193.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-39194.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-39198.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-4133.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-42754.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-42756.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-45863.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-46862.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-51043.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-51779.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-51780.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52434.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52448.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52450.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52476.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52489.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52522.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52529.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52574.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52578.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52580.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52581.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52597.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52610.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-52620.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-6040.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-6121.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-6176.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-6531.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-6546.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-6622.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-6915.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-6931.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2023-6932.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-0565.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-0841.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-1085.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-1086.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-25744.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-26582.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-26583.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-26584.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-26585.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-26586.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-26593.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-26602.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-26609.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-26633.html"
    },
    {
      "type": "REPORT",
      "url": "https://www.redhat.com/security/data/cve/CVE-2024-26671.html"
    }
  ],
  "related": [
    "CVE-2023-6546",
    "CVE-2024-1086",
    "CVE-2023-3567",
    "CVE-2023-4133",
    "CVE-2023-6932",
    "CVE-2023-39198",
    "CVE-2023-51043",
    "CVE-2023-51779",
    "CVE-2023-51780",
    "CVE-2024-1085",
    "CVE-2024-26582",
    "CVE-2020-26555",
    "CVE-2022-0480",
    "CVE-2022-38096",
    "CVE-2023-6622",
    "CVE-2023-6915",
    "CVE-2023-42754",
    "CVE-2023-46862",
    "CVE-2023-52574",
    "CVE-2024-0841",
    "CVE-2023-52448",
    "CVE-2022-45934",
    "CVE-2023-6040",
    "CVE-2023-6531",
    "CVE-2023-6931",
    "CVE-2023-24023",
    "CVE-2023-25775",
    "CVE-2023-28464",
    "CVE-2023-28866",
    "CVE-2023-31083",
    "CVE-2023-37453",
    "CVE-2023-39189",
    "CVE-2023-39193",
    "CVE-2023-6121",
    "CVE-2023-39194",
    "CVE-2023-42756",
    "CVE-2023-45863",
    "CVE-2023-52434",
    "CVE-2023-52489",
    "CVE-2023-52522",
    "CVE-2023-52529",
    "CVE-2023-52581",
    "CVE-2023-52578",
    "CVE-2023-52580",
    "CVE-2023-52610",
    "CVE-2024-0565",
    "CVE-2024-26583",
    "CVE-2024-26584",
    "CVE-2024-26585",
    "CVE-2024-26586",
    "CVE-2024-26593",
    "CVE-2024-26602",
    "CVE-2024-26609",
    "CVE-2023-6176",
    "CVE-2023-52476",
    "CVE-2023-52620",
    "CVE-2024-26633"
  ],
  "summary": "Important: kernel security, bug fix, and enhancement update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…