alsa-2024:4211
Vulnerability from osv_almalinux
Published
2024-07-02 00:00
Modified
2024-07-02 15:12
Summary
Important: kernel security and bug fix update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)
  • kernel:TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001)
  • kernel: ovl: fix leaked dentry (CVE-2021-46972)
  • kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073)
  • kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)
  • kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)
  • kernel: mm/swap: fix race when skipping swapcache (CVE-2024-26759)
  • kernel: net: ip_tunnel: prevent perpetual headroom growth (CVE-2024-26804)
  • kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)
  • kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() (CVE-2024-26906)
  • kernel: powerpc/powernv: Add a null pointer check in opal_event_init() (CVE-2023-52686)
  • kernel: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (CVE-2023-52675)
  • kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)
  • kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464)
  • kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)
  • kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)
  • kernel: net/bnx2x: Prevent access to a freed page in page_pool (CVE-2024-26859)
  • kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974)
  • kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)
  • kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960)
  • kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow (CVE-2024-35959)
  • kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958)
  • kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004)
  • kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)
  • kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353)
  • kernel: net: ti: fix UAF in tlan_remove_one (CVE-2021-47310)

Bug Fix(es):

  • Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:AlmaLinux-29783)
  • Temporary values in FIPS integrity test should be zeroized [almalinux-8.10.z] (JIRA:AlmaLinux-35361)
  • AlmaLinux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:AlmaLinux-36048)
  • [AlmaLinux8] blktests block/024 failed (JIRA:AlmaLinux-8130)
  • AlmaLinux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:AlmaLinux-14195)
  • Latency spikes with Matrox G200 graphic cards (JIRA:AlmaLinux-36172)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
https://access.redhat.com/errata/RHSA-2024:4211 ADVISORY
https://access.redhat.com/security/cve/CVE-2020-26555 REPORT
https://access.redhat.com/security/cve/CVE-2021-46909 REPORT
https://access.redhat.com/security/cve/CVE-2021-46972 REPORT
https://access.redhat.com/security/cve/CVE-2021-47069 REPORT
https://access.redhat.com/security/cve/CVE-2021-47073 REPORT
https://access.redhat.com/security/cve/CVE-2021-47236 REPORT
https://access.redhat.com/security/cve/CVE-2021-47310 REPORT
https://access.redhat.com/security/cve/CVE-2021-47311 REPORT
https://access.redhat.com/security/cve/CVE-2021-47353 REPORT
https://access.redhat.com/security/cve/CVE-2021-47356 REPORT
https://access.redhat.com/security/cve/CVE-2021-47456 REPORT
https://access.redhat.com/security/cve/CVE-2021-47495 REPORT
https://access.redhat.com/security/cve/CVE-2023-5090 REPORT
https://access.redhat.com/security/cve/CVE-2023-52464 REPORT
https://access.redhat.com/security/cve/CVE-2023-52560 REPORT
https://access.redhat.com/security/cve/CVE-2023-52615 REPORT
https://access.redhat.com/security/cve/CVE-2023-52626 REPORT
https://access.redhat.com/security/cve/CVE-2023-52667 REPORT
https://access.redhat.com/security/cve/CVE-2023-52669 REPORT
https://access.redhat.com/security/cve/CVE-2023-52675 REPORT
https://access.redhat.com/security/cve/CVE-2023-52686 REPORT
https://access.redhat.com/security/cve/CVE-2023-52700 REPORT
https://access.redhat.com/security/cve/CVE-2023-52703 REPORT
https://access.redhat.com/security/cve/CVE-2023-52781 REPORT
https://access.redhat.com/security/cve/CVE-2023-52813 REPORT
https://access.redhat.com/security/cve/CVE-2023-52835 REPORT
https://access.redhat.com/security/cve/CVE-2023-52877 REPORT
https://access.redhat.com/security/cve/CVE-2023-52878 REPORT
https://access.redhat.com/security/cve/CVE-2023-52881 REPORT
https://access.redhat.com/security/cve/CVE-2024-26583 REPORT
https://access.redhat.com/security/cve/CVE-2024-26584 REPORT
https://access.redhat.com/security/cve/CVE-2024-26585 REPORT
https://access.redhat.com/security/cve/CVE-2024-26656 REPORT
https://access.redhat.com/security/cve/CVE-2024-26675 REPORT
https://access.redhat.com/security/cve/CVE-2024-26735 REPORT
https://access.redhat.com/security/cve/CVE-2024-26759 REPORT
https://access.redhat.com/security/cve/CVE-2024-26801 REPORT
https://access.redhat.com/security/cve/CVE-2024-26804 REPORT
https://access.redhat.com/security/cve/CVE-2024-26826 REPORT
https://access.redhat.com/security/cve/CVE-2024-26859 REPORT
https://access.redhat.com/security/cve/CVE-2024-26906 REPORT
https://access.redhat.com/security/cve/CVE-2024-26907 REPORT
https://access.redhat.com/security/cve/CVE-2024-26974 REPORT
https://access.redhat.com/security/cve/CVE-2024-26982 REPORT
https://access.redhat.com/security/cve/CVE-2024-27397 REPORT
https://access.redhat.com/security/cve/CVE-2024-27410 REPORT
https://access.redhat.com/security/cve/CVE-2024-35789 REPORT
https://access.redhat.com/security/cve/CVE-2024-35835 REPORT
https://access.redhat.com/security/cve/CVE-2024-35838 REPORT
https://access.redhat.com/security/cve/CVE-2024-35845 REPORT
https://access.redhat.com/security/cve/CVE-2024-35852 REPORT
https://access.redhat.com/security/cve/CVE-2024-35853 REPORT
https://access.redhat.com/security/cve/CVE-2024-35854 REPORT
https://access.redhat.com/security/cve/CVE-2024-35855 REPORT
https://access.redhat.com/security/cve/CVE-2024-35888 REPORT
https://access.redhat.com/security/cve/CVE-2024-35890 REPORT
https://access.redhat.com/security/cve/CVE-2024-35958 REPORT
https://access.redhat.com/security/cve/CVE-2024-35959 REPORT
https://access.redhat.com/security/cve/CVE-2024-35960 REPORT
https://access.redhat.com/security/cve/CVE-2024-36004 REPORT
https://access.redhat.com/security/cve/CVE-2024-36007 REPORT
https://bugzilla.redhat.com/1918601 REPORT
https://bugzilla.redhat.com/2248122 REPORT
https://bugzilla.redhat.com/2258875 REPORT
https://bugzilla.redhat.com/2265517 REPORT
https://bugzilla.redhat.com/2265519 REPORT
https://bugzilla.redhat.com/2265520 REPORT
https://bugzilla.redhat.com/2265800 REPORT
https://bugzilla.redhat.com/2266408 REPORT
https://bugzilla.redhat.com/2266831 REPORT
https://bugzilla.redhat.com/2267513 REPORT
https://bugzilla.redhat.com/2267518 REPORT
https://bugzilla.redhat.com/2267730 REPORT
https://bugzilla.redhat.com/2270093 REPORT
https://bugzilla.redhat.com/2271680 REPORT
https://bugzilla.redhat.com/2272692 REPORT
https://bugzilla.redhat.com/2272829 REPORT
https://bugzilla.redhat.com/2273204 REPORT
https://bugzilla.redhat.com/2273278 REPORT
https://bugzilla.redhat.com/2273423 REPORT
https://bugzilla.redhat.com/2273429 REPORT
https://bugzilla.redhat.com/2275604 REPORT
https://bugzilla.redhat.com/2275633 REPORT
https://bugzilla.redhat.com/2275635 REPORT
https://bugzilla.redhat.com/2275733 REPORT
https://bugzilla.redhat.com/2278337 REPORT
https://bugzilla.redhat.com/2278354 REPORT
https://bugzilla.redhat.com/2280434 REPORT
https://bugzilla.redhat.com/2281057 REPORT
https://bugzilla.redhat.com/2281113 REPORT
https://bugzilla.redhat.com/2281157 REPORT
https://bugzilla.redhat.com/2281165 REPORT
https://bugzilla.redhat.com/2281251 REPORT
https://bugzilla.redhat.com/2281253 REPORT
https://bugzilla.redhat.com/2281255 REPORT
https://bugzilla.redhat.com/2281257 REPORT
https://bugzilla.redhat.com/2281272 REPORT
https://bugzilla.redhat.com/2281311 REPORT
https://bugzilla.redhat.com/2281334 REPORT
https://bugzilla.redhat.com/2281346 REPORT
https://bugzilla.redhat.com/2281350 REPORT
https://bugzilla.redhat.com/2281689 REPORT
https://bugzilla.redhat.com/2281693 REPORT
https://bugzilla.redhat.com/2281920 REPORT
https://bugzilla.redhat.com/2281923 REPORT
https://bugzilla.redhat.com/2281925 REPORT
https://bugzilla.redhat.com/2281953 REPORT
https://bugzilla.redhat.com/2281986 REPORT
https://bugzilla.redhat.com/2282394 REPORT
https://bugzilla.redhat.com/2282400 REPORT
https://bugzilla.redhat.com/2282471 REPORT
https://bugzilla.redhat.com/2282472 REPORT
https://bugzilla.redhat.com/2282581 REPORT
https://bugzilla.redhat.com/2282609 REPORT
https://bugzilla.redhat.com/2282612 REPORT
https://bugzilla.redhat.com/2282653 REPORT
https://bugzilla.redhat.com/2282680 REPORT
https://bugzilla.redhat.com/2282698 REPORT
https://bugzilla.redhat.com/2282712 REPORT
https://bugzilla.redhat.com/2282735 REPORT
https://bugzilla.redhat.com/2282902 REPORT
https://bugzilla.redhat.com/2282920 REPORT
https://errata.almalinux.org/8/ALSA-2024-4211.html ADVISORY

{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "bpftool"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-abi-stablelists"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-cross-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-doc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools-libs-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-zfcpdump-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "python3-perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-553.8.1.el8_10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)\n* kernel:TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001)\n* kernel: ovl: fix leaked dentry (CVE-2021-46972)\n* kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073)\n* kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)\n* kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)\n* kernel: mm/swap: fix race when skipping swapcache (CVE-2024-26759)\n* kernel: net: ip_tunnel: prevent perpetual headroom growth (CVE-2024-26804)\n* kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)\n* kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() (CVE-2024-26906)\n* kernel: powerpc/powernv: Add a null pointer check in opal_event_init() (CVE-2023-52686)\n* kernel: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (CVE-2023-52675)\n* kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)\n* kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464)\n* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)\n* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)\n* kernel: net/bnx2x: Prevent access to a freed page in page_pool (CVE-2024-26859)\n* kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974)\n* kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)\n* kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960)\n* kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow (CVE-2024-35959)\n* kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958)\n* kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004)\n* kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)\n* kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353)\n* kernel: net: ti: fix UAF in tlan_remove_one (CVE-2021-47310)\n\nBug Fix(es):\n\n* Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:AlmaLinux-29783)\n* Temporary values in FIPS integrity test should be zeroized [almalinux-8.10.z] (JIRA:AlmaLinux-35361)\n* AlmaLinux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:AlmaLinux-36048)\n* [AlmaLinux8] blktests block/024 failed (JIRA:AlmaLinux-8130)\n* AlmaLinux8.9: EEH injections results  Error:  Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:AlmaLinux-14195)\n* Latency spikes with Matrox G200 graphic cards (JIRA:AlmaLinux-36172)\n\nFor more details about the security issue(s), including the impact, \n            a CVSS score, acknowledgments, and other related information, refer to the CVE page(s)\n            listed in the References section.",
  "id": "ALSA-2024:4211",
  "modified": "2024-07-02T15:12:03Z",
  "published": "2024-07-02T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2024:4211"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2020-26555"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-46909"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-46972"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47069"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47073"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47236"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47310"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47311"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47353"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47356"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47456"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-47495"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-5090"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52464"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52560"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52615"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52626"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52667"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52669"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52675"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52686"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52700"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52703"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52781"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52813"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52835"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52877"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52878"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52881"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26583"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26584"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26585"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26656"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26675"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26735"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26759"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26801"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26804"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26826"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26859"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26906"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26907"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26974"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26982"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27397"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27410"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35789"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35835"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35838"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35845"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35852"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35853"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35854"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35855"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35888"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35890"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35958"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35959"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35960"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36004"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36007"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/1918601"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2248122"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258875"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265517"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265519"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265520"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265800"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2266408"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2266831"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267513"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267518"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2267730"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2270093"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2271680"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2272692"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2272829"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273204"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273278"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273423"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273429"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275604"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275633"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275635"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275733"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278337"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278354"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2280434"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281057"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281113"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281157"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281165"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281251"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281253"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281255"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281257"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281272"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281311"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281334"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281346"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281350"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281689"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281693"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281920"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281923"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281925"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281953"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281986"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282394"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282400"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282471"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282472"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282581"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282609"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282612"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282653"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282680"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282698"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282712"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282735"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282902"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282920"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/8/ALSA-2024-4211.html"
    }
  ],
  "related": [
    "CVE-2020-26555",
    "CVE-2023-52881",
    "CVE-2021-46972",
    "CVE-2021-47073",
    "CVE-2023-52560",
    "CVE-2024-26675",
    "CVE-2024-26759",
    "CVE-2024-26804",
    "CVE-2024-26907",
    "CVE-2024-26906",
    "CVE-2023-52686",
    "CVE-2023-52675",
    "CVE-2023-5090",
    "CVE-2023-52464",
    "CVE-2024-26735",
    "CVE-2024-26826",
    "CVE-2024-26859",
    "CVE-2024-26974",
    "CVE-2023-52667",
    "CVE-2024-35960",
    "CVE-2024-35959",
    "CVE-2024-35958",
    "CVE-2024-36004",
    "CVE-2021-47356",
    "CVE-2021-47353",
    "CVE-2021-47310"
  ],
  "summary": "Important: kernel security and bug fix update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…