alsa-2024:3618
Vulnerability from osv_almalinux
Published
2024-06-05 00:00
Modified
2024-06-05 17:12
Summary
Moderate: kernel update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240)
  • kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340)
  • kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744)
  • kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593)
  • kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445)
  • kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603)
  • kernel: use after free in i2c (CVE-2019-25162)
  • kernel: i2c: validate user data in compat ioctl (CVE-2021-46934)
  • kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() (CVE-2020-36777)
  • kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477)
  • kernel: mtd: require write permissions for locking and badblock ioctls (CVE-2021-47055)
  • kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump (CVE-2024-26615)
  • kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627)
  • kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307)
  • kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565)
  • kernel: net: bridge: data races indata-races in br_handle_frame_finish() (CVE-2023-52578)
  • kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528)
  • kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520)
  • kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513)
  • kernel: pid: take a reference when initializing cad_pid (CVE-2021-47118)
  • kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610)
  • kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (CVE-2024-26643)
  • kernel: netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642)
  • kernel: i2c: i801: Don't generate an interrupt on bus reset (CVE-2021-47153)
  • kernel: xhci: handle isoc Babble and Buffer Overrun events properly (CVE-2024-26659)
  • kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664)
  • kernel: wifi: mac80211: fix race condition on enabling fast-xmit (CVE-2024-26779)
  • kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744)
  • kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743)
  • kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185)
  • kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901)
  • kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872)
  • kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919)
  • kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964)
  • kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934)
  • kernel: USB: core: Fix deadlock in port "disable" sysfs attribute (CVE-2024-26933)
  • kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993)
  • kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973)
  • kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (CVE-2024-27059)
  • kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013)
  • kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171)
  • kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669)
  • kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439)
  • kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594)
  • kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595)
References
https://access.redhat.com/errata/RHSA-2024:3618 ADVISORY
https://access.redhat.com/security/cve/CVE-2019-25162 REPORT
https://access.redhat.com/security/cve/CVE-2020-36777 REPORT
https://access.redhat.com/security/cve/CVE-2021-46934 REPORT
https://access.redhat.com/security/cve/CVE-2021-47013 REPORT
https://access.redhat.com/security/cve/CVE-2021-47055 REPORT
https://access.redhat.com/security/cve/CVE-2021-47118 REPORT
https://access.redhat.com/security/cve/CVE-2021-47153 REPORT
https://access.redhat.com/security/cve/CVE-2021-47171 REPORT
https://access.redhat.com/security/cve/CVE-2021-47185 REPORT
https://access.redhat.com/security/cve/CVE-2022-48627 REPORT
https://access.redhat.com/security/cve/CVE-2022-48669 REPORT
https://access.redhat.com/security/cve/CVE-2023-52439 REPORT
https://access.redhat.com/security/cve/CVE-2023-52445 REPORT
https://access.redhat.com/security/cve/CVE-2023-52477 REPORT
https://access.redhat.com/security/cve/CVE-2023-52513 REPORT
https://access.redhat.com/security/cve/CVE-2023-52520 REPORT
https://access.redhat.com/security/cve/CVE-2023-52528 REPORT
https://access.redhat.com/security/cve/CVE-2023-52565 REPORT
https://access.redhat.com/security/cve/CVE-2023-52578 REPORT
https://access.redhat.com/security/cve/CVE-2023-52594 REPORT
https://access.redhat.com/security/cve/CVE-2023-52595 REPORT
https://access.redhat.com/security/cve/CVE-2023-52598 REPORT
https://access.redhat.com/security/cve/CVE-2023-52606 REPORT
https://access.redhat.com/security/cve/CVE-2023-52607 REPORT
https://access.redhat.com/security/cve/CVE-2023-52610 REPORT
https://access.redhat.com/security/cve/CVE-2023-6240 REPORT
https://access.redhat.com/security/cve/CVE-2024-0340 REPORT
https://access.redhat.com/security/cve/CVE-2024-23307 REPORT
https://access.redhat.com/security/cve/CVE-2024-25744 REPORT
https://access.redhat.com/security/cve/CVE-2024-26593 REPORT
https://access.redhat.com/security/cve/CVE-2024-26603 REPORT
https://access.redhat.com/security/cve/CVE-2024-26610 REPORT
https://access.redhat.com/security/cve/CVE-2024-26615 REPORT
https://access.redhat.com/security/cve/CVE-2024-26642 REPORT
https://access.redhat.com/security/cve/CVE-2024-26643 REPORT
https://access.redhat.com/security/cve/CVE-2024-26659 REPORT
https://access.redhat.com/security/cve/CVE-2024-26664 REPORT
https://access.redhat.com/security/cve/CVE-2024-26693 REPORT
https://access.redhat.com/security/cve/CVE-2024-26694 REPORT
https://access.redhat.com/security/cve/CVE-2024-26743 REPORT
https://access.redhat.com/security/cve/CVE-2024-26744 REPORT
https://access.redhat.com/security/cve/CVE-2024-26779 REPORT
https://access.redhat.com/security/cve/CVE-2024-26872 REPORT
https://access.redhat.com/security/cve/CVE-2024-26892 REPORT
https://access.redhat.com/security/cve/CVE-2024-26897 REPORT
https://access.redhat.com/security/cve/CVE-2024-26901 REPORT
https://access.redhat.com/security/cve/CVE-2024-26919 REPORT
https://access.redhat.com/security/cve/CVE-2024-26933 REPORT
https://access.redhat.com/security/cve/CVE-2024-26934 REPORT
https://access.redhat.com/security/cve/CVE-2024-26964 REPORT
https://access.redhat.com/security/cve/CVE-2024-26973 REPORT
https://access.redhat.com/security/cve/CVE-2024-26993 REPORT
https://access.redhat.com/security/cve/CVE-2024-27014 REPORT
https://access.redhat.com/security/cve/CVE-2024-27048 REPORT
https://access.redhat.com/security/cve/CVE-2024-27052 REPORT
https://access.redhat.com/security/cve/CVE-2024-27056 REPORT
https://access.redhat.com/security/cve/CVE-2024-27059 REPORT
https://bugzilla.redhat.com/2250843 REPORT
https://bugzilla.redhat.com/2257406 REPORT
https://bugzilla.redhat.com/2263875 REPORT
https://bugzilla.redhat.com/2265271 REPORT
https://bugzilla.redhat.com/2265646 REPORT
https://bugzilla.redhat.com/2265654 REPORT
https://bugzilla.redhat.com/2265833 REPORT
https://bugzilla.redhat.com/2266296 REPORT
https://bugzilla.redhat.com/2266446 REPORT
https://bugzilla.redhat.com/2266746 REPORT
https://bugzilla.redhat.com/2266841 REPORT
https://bugzilla.redhat.com/2267038 REPORT
https://bugzilla.redhat.com/2267185 REPORT
https://bugzilla.redhat.com/2267355 REPORT
https://bugzilla.redhat.com/2267509 REPORT
https://bugzilla.redhat.com/2267705 REPORT
https://bugzilla.redhat.com/2267724 REPORT
https://bugzilla.redhat.com/2267758 REPORT
https://bugzilla.redhat.com/2267789 REPORT
https://bugzilla.redhat.com/2267797 REPORT
https://bugzilla.redhat.com/2267804 REPORT
https://bugzilla.redhat.com/2268291 REPORT
https://bugzilla.redhat.com/2268293 REPORT
https://bugzilla.redhat.com/2268309 REPORT
https://bugzilla.redhat.com/2268315 REPORT
https://bugzilla.redhat.com/2268317 REPORT
https://bugzilla.redhat.com/2269213 REPORT
https://bugzilla.redhat.com/2269856 REPORT
https://bugzilla.redhat.com/2270080 REPORT
https://bugzilla.redhat.com/2270879 REPORT
https://bugzilla.redhat.com/2270881 REPORT
https://bugzilla.redhat.com/2271469 REPORT
https://bugzilla.redhat.com/2271476 REPORT
https://bugzilla.redhat.com/2272780 REPORT
https://bugzilla.redhat.com/2272791 REPORT
https://bugzilla.redhat.com/2273092 REPORT
https://bugzilla.redhat.com/2273094 REPORT
https://bugzilla.redhat.com/2273223 REPORT
https://bugzilla.redhat.com/2273260 REPORT
https://bugzilla.redhat.com/2273262 REPORT
https://bugzilla.redhat.com/2274624 REPORT
https://bugzilla.redhat.com/2275645 REPORT
https://bugzilla.redhat.com/2275655 REPORT
https://bugzilla.redhat.com/2275666 REPORT
https://bugzilla.redhat.com/2275707 REPORT
https://bugzilla.redhat.com/2275777 REPORT
https://bugzilla.redhat.com/2278169 REPORT
https://bugzilla.redhat.com/2278237 REPORT
https://bugzilla.redhat.com/2278240 REPORT
https://bugzilla.redhat.com/2278268 REPORT
https://bugzilla.redhat.com/2278314 REPORT
https://bugzilla.redhat.com/2278356 REPORT
https://bugzilla.redhat.com/2278398 REPORT
https://bugzilla.redhat.com/2278409 REPORT
https://bugzilla.redhat.com/2278417 REPORT
https://bugzilla.redhat.com/2278431 REPORT
https://bugzilla.redhat.com/2278537 REPORT
https://errata.almalinux.org/8/ALSA-2024-3618.html ADVISORY

{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "bpftool"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-abi-stablelists"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-cross-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-doc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools-libs-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "python3-perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.5.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Marvin vulnerability side-channel leakage in the RSA decryption\noperation (CVE-2023-6240)\n* kernel: Information disclosure in vhost/vhost.c:vhost_new_msg()\n(CVE-2024-0340)\n* kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744)\n* kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593)\n* kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445)\n* kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer\nthat cause loop forever (CVE-2024-26603)\n* kernel: use after free in i2c (CVE-2019-25162)\n* kernel: i2c: validate user data in compat ioctl (CVE-2021-46934)\n* kernel: media: dvbdev: Fix memory leak in dvb_media_device_free()\n(CVE-2020-36777)\n* kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors\n(CVE-2023-52477)\n* kernel: mtd: require write permissions for locking and badblock ioctls\n(CVE-2021-47055)\n* kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump\n(CVE-2024-26615)\n* kernel: vt: fix memory overlapping when deleting chars in the buffer\n(CVE-2022-48627)\n* kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307)\n* kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu()\n(CVE-2023-52565)\n* kernel: net: bridge: data races indata-races in br_handle_frame_finish()\n(CVE-2023-52578)\n* kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg\n(CVE-2023-52528)\n* kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520)\n* kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513)\n* kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118)\n* kernel: net/sched: act_ct: fix skb leak and crash on ooo frags\n(CVE-2023-52610)\n* kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set\nwith timeout (CVE-2024-26643)\n* kernel: netfilter: nf_tables: disallow anonymous set with timeout flag\n(CVE-2024-26642)\n* kernel: i2c: i801: Don\u0026#39;t generate an interrupt on bus reset\n(CVE-2021-47153)\n* kernel: xhci: handle isoc Babble and Buffer Overrun events properly\n(CVE-2024-26659)\n* kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664)\n* kernel: wifi: mac80211: fix race condition on enabling fast-xmit\n(CVE-2024-26779)\n* kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter\n(CVE-2024-26744)\n* kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743)\n* kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc\n(CVE-2021-47185)\n* kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak\n(CVE-2024-26901)\n* kernel: RDMA/srpt: Do not register event handler until srpt device is fully\nsetup (CVE-2024-26872)\n* kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919)\n* kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964)\n* kernel: USB: core: Fix deadlock in usb_deauthorize_interface()\n(CVE-2024-26934)\n* kernel: USB: core: Fix deadlock in port \u0026#34;disable\u0026#34; sysfs attribute\n(CVE-2024-26933)\n* kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()\n(CVE-2024-26993)\n* kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973)\n* kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command\n(CVE-2024-27059)\n* kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013)\n* kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171)\n* kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669)\n* kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439)\n* kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594)\n* kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595)",
  "id": "ALSA-2024:3618",
  "modified": "2024-06-05T17:12:40Z",
  "published": "2024-06-05T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2024:3618"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2019-25162"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2020-36777"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-46934"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47013"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47055"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47118"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47153"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47171"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47185"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-48627"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-48669"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52439"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52445"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52477"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52513"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52520"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52528"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52565"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52578"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52594"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52595"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52598"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52606"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52607"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52610"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-6240"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-0340"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-23307"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-25744"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26593"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26603"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26610"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26615"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26642"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26643"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26659"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26664"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26693"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26694"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26743"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26744"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26779"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26872"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26892"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26897"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26901"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26919"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26933"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26934"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26964"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26973"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26993"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27014"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27048"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27052"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27056"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27059"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2250843"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2257406"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2263875"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265271"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265646"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265654"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265833"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2266296"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2266446"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2266746"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2266841"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267038"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267185"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267355"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267509"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267705"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267724"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267758"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267789"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267797"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267804"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2268291"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2268293"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2268309"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2268315"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2268317"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2269213"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2269856"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2270080"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2270879"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2270881"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2271469"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2271476"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2272780"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2272791"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273092"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273094"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273223"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273260"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273262"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2274624"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275645"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275655"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275666"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275707"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275777"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278169"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278237"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278240"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278268"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278314"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278356"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278398"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278409"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278417"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278431"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278537"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/8/ALSA-2024-3618.html"
    }
  ],
  "related": [
    "CVE-2023-6240",
    "CVE-2024-0340",
    "CVE-2024-25744",
    "CVE-2024-26593",
    "CVE-2023-52445",
    "CVE-2024-26603",
    "CVE-2019-25162",
    "CVE-2021-46934",
    "CVE-2020-36777",
    "CVE-2023-52477",
    "CVE-2021-47055",
    "CVE-2024-26615",
    "CVE-2022-48627",
    "CVE-2024-23307",
    "CVE-2023-52565",
    "CVE-2023-52578",
    "CVE-2023-52528",
    "CVE-2023-52520",
    "CVE-2023-52513",
    "CVE-2021-47118",
    "CVE-2023-52610",
    "CVE-2024-26643",
    "CVE-2024-26642",
    "CVE-2021-47153",
    "CVE-2024-26659",
    "CVE-2024-26664",
    "CVE-2024-26779",
    "CVE-2024-26744",
    "CVE-2024-26743",
    "CVE-2021-47185",
    "CVE-2024-26901",
    "CVE-2024-26872",
    "CVE-2024-26919",
    "CVE-2024-26964",
    "CVE-2024-26934",
    "CVE-2024-26933",
    "CVE-2024-26993",
    "CVE-2024-26973",
    "CVE-2024-27059",
    "CVE-2021-47013",
    "CVE-2021-47171",
    "CVE-2022-48669",
    "CVE-2023-52439",
    "CVE-2023-52594",
    "CVE-2023-52595"
  ],
  "summary": "Moderate: kernel update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…