alsa-2024:5928
Vulnerability from osv_almalinux
Published
2024-08-28 00:00
Modified
2024-11-03 22:29
Summary
Important: kernel security update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: nftables: nft_set_rbtree skip end interval element from gc (CVE-2024-26581)
  • kernel: netfilter: nft_limit: reject configurations that cause integer overflow (CVE-2024-26668)
  • kernel: vfio/pci: Lock external INTx masking ops (CVE-2024-26810)
  • kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() (CVE-2024-26855)
  • kernel: x86/xen: Add some null pointer checking to smp.c (CVE-2024-26908)
  • kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (CVE-2024-26925)
  • kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (CVE-2024-27020)
  • kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (CVE-2024-27019)
  • kernel: netfilter: flowtable: validate pppoe header (CVE-2024-27016)
  • kernel: netfilter: bridge: confirm multicast packets before passing them up the stack (CVE-2024-27415)
  • kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info (CVE-2024-35839)
  • kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)
  • kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion (CVE-2024-35897)
  • kernel: netfilter: validate user input for expected length (CVE-2024-35896)
  • kernel: netfilter: complete validation of user input (CVE-2024-35962)
  • kernel: ice: fix LAG and VF lock dependency in ice_reset_vf() (CVE-2024-36003)
  • kernel: cxl/port: Fix delete_endpoint() vs parent unregistration race (CVE-2023-52771)
  • kernel: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (CVE-2023-52880)
  • kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (CVE-2024-36025)
  • kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608)
  • kernel: crypto: bcm - Fix pointer arithmetic (CVE-2024-38579)
  • kernel: RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (CVE-2024-38544)
  • kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (CVE-2024-38540)
  • kernel: net: bridge: xmit: make sure we have at least eth header len bytes (CVE-2024-38538)
  • kernel: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (CVE-2024-39476)
  • kernel: ipv6: fix possible race in __fib6_drop_pcpu_from() (CVE-2024-40905)
  • kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station (CVE-2024-40911)
  • kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (CVE-2024-40912)
  • kernel: mm/huge_memory: don't unpoison huge_zero_folio (CVE-2024-40914)
  • kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (CVE-2024-40929)
  • kernel: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail (CVE-2024-40939)
  • kernel: wifi: iwlwifi: mvm: don't read past the mfuart notifcation (CVE-2024-40941)
  • kernel: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors (CVE-2024-40957)
  • kernel: scsi: qedi: Fix crash while reading debugfs attribute (CVE-2024-40978)
  • kernel: tipc: force a dst refcount before doing decryption (CVE-2024-40983)
  • kernel: virtio-net: tap: mlx5_core short frame denial of service (CVE-2024-41090)
  • kernel: virtio-net: tun: mlx5_core short frame denial of service (CVE-2024-41091)
  • kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (CVE-2024-41041)
  • kernel: NFSv4: Fix memory leak in nfs4_set_security_label (CVE-2024-41076)
  • kernel: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (CVE-2024-42110)
  • kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment (CVE-2024-42152)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
https://access.redhat.com/errata/RHSA-2024:5928 ADVISORY
https://access.redhat.com/security/cve/CVE-2023-52771 REPORT
https://access.redhat.com/security/cve/CVE-2023-52880 REPORT
https://access.redhat.com/security/cve/CVE-2024-26581 REPORT
https://access.redhat.com/security/cve/CVE-2024-26668 REPORT
https://access.redhat.com/security/cve/CVE-2024-26810 REPORT
https://access.redhat.com/security/cve/CVE-2024-26855 REPORT
https://access.redhat.com/security/cve/CVE-2024-26908 REPORT
https://access.redhat.com/security/cve/CVE-2024-26925 REPORT
https://access.redhat.com/security/cve/CVE-2024-27016 REPORT
https://access.redhat.com/security/cve/CVE-2024-27019 REPORT
https://access.redhat.com/security/cve/CVE-2024-27020 REPORT
https://access.redhat.com/security/cve/CVE-2024-27415 REPORT
https://access.redhat.com/security/cve/CVE-2024-35839 REPORT
https://access.redhat.com/security/cve/CVE-2024-35896 REPORT
https://access.redhat.com/security/cve/CVE-2024-35897 REPORT
https://access.redhat.com/security/cve/CVE-2024-35898 REPORT
https://access.redhat.com/security/cve/CVE-2024-35962 REPORT
https://access.redhat.com/security/cve/CVE-2024-36003 REPORT
https://access.redhat.com/security/cve/CVE-2024-36025 REPORT
https://access.redhat.com/security/cve/CVE-2024-38538 REPORT
https://access.redhat.com/security/cve/CVE-2024-38540 REPORT
https://access.redhat.com/security/cve/CVE-2024-38544 REPORT
https://access.redhat.com/security/cve/CVE-2024-38579 REPORT
https://access.redhat.com/security/cve/CVE-2024-38608 REPORT
https://access.redhat.com/security/cve/CVE-2024-39476 REPORT
https://access.redhat.com/security/cve/CVE-2024-40905 REPORT
https://access.redhat.com/security/cve/CVE-2024-40911 REPORT
https://access.redhat.com/security/cve/CVE-2024-40912 REPORT
https://access.redhat.com/security/cve/CVE-2024-40914 REPORT
https://access.redhat.com/security/cve/CVE-2024-40929 REPORT
https://access.redhat.com/security/cve/CVE-2024-40939 REPORT
https://access.redhat.com/security/cve/CVE-2024-40941 REPORT
https://access.redhat.com/security/cve/CVE-2024-40957 REPORT
https://access.redhat.com/security/cve/CVE-2024-40978 REPORT
https://access.redhat.com/security/cve/CVE-2024-40983 REPORT
https://access.redhat.com/security/cve/CVE-2024-41041 REPORT
https://access.redhat.com/security/cve/CVE-2024-41076 REPORT
https://access.redhat.com/security/cve/CVE-2024-41090 REPORT
https://access.redhat.com/security/cve/CVE-2024-41091 REPORT
https://access.redhat.com/security/cve/CVE-2024-42110 REPORT
https://access.redhat.com/security/cve/CVE-2024-42152 REPORT
https://bugzilla.redhat.com/2265185 REPORT
https://bugzilla.redhat.com/2272797 REPORT
https://bugzilla.redhat.com/2273654 REPORT
https://bugzilla.redhat.com/2275742 REPORT
https://bugzilla.redhat.com/2275744 REPORT
https://bugzilla.redhat.com/2277166 REPORT
https://bugzilla.redhat.com/2278256 REPORT
https://bugzilla.redhat.com/2278258 REPORT
https://bugzilla.redhat.com/2278264 REPORT
https://bugzilla.redhat.com/2281101 REPORT
https://bugzilla.redhat.com/2281284 REPORT
https://bugzilla.redhat.com/2281669 REPORT
https://bugzilla.redhat.com/2281672 REPORT
https://bugzilla.redhat.com/2281675 REPORT
https://bugzilla.redhat.com/2281916 REPORT
https://bugzilla.redhat.com/2281958 REPORT
https://bugzilla.redhat.com/2282720 REPORT
https://bugzilla.redhat.com/2283468 REPORT
https://bugzilla.redhat.com/2284421 REPORT
https://bugzilla.redhat.com/2293356 REPORT
https://bugzilla.redhat.com/2293414 REPORT
https://bugzilla.redhat.com/2293455 REPORT
https://bugzilla.redhat.com/2293459 REPORT
https://bugzilla.redhat.com/2293461 REPORT
https://bugzilla.redhat.com/2295914 REPORT
https://bugzilla.redhat.com/2297489 REPORT
https://bugzilla.redhat.com/2297495 REPORT
https://bugzilla.redhat.com/2297496 REPORT
https://bugzilla.redhat.com/2297498 REPORT
https://bugzilla.redhat.com/2297513 REPORT
https://bugzilla.redhat.com/2297523 REPORT
https://bugzilla.redhat.com/2297525 REPORT
https://bugzilla.redhat.com/2297541 REPORT
https://bugzilla.redhat.com/2297562 REPORT
https://bugzilla.redhat.com/2297567 REPORT
https://bugzilla.redhat.com/2299240 REPORT
https://bugzilla.redhat.com/2299336 REPORT
https://bugzilla.redhat.com/2300410 REPORT
https://bugzilla.redhat.com/2300453 REPORT
https://bugzilla.redhat.com/2301473 REPORT
https://bugzilla.redhat.com/2301519 REPORT
https://errata.almalinux.org/9/ALSA-2024-5928.html ADVISORY

{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "bpftool"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "7.3.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-abi-stablelists"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-cross-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-uki-virt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-doc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-tools"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-tools-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-tools-libs-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-uki-virt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "libperf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "python3-perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "rtla"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "rv"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.33.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.  \n\nSecurity Fix(es):  \n\n  * kernel: nftables: nft_set_rbtree skip end interval element from gc (CVE-2024-26581)\n  * kernel: netfilter: nft_limit: reject configurations that cause integer overflow (CVE-2024-26668)\n  * kernel: vfio/pci: Lock external INTx masking ops (CVE-2024-26810)\n  * kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() (CVE-2024-26855)\n  * kernel: x86/xen: Add some null pointer checking to smp.c (CVE-2024-26908)\n  * kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (CVE-2024-26925)\n  * kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (CVE-2024-27020)\n  * kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (CVE-2024-27019)\n  * kernel: netfilter: flowtable: validate pppoe header (CVE-2024-27016)\n  * kernel: netfilter: bridge: confirm multicast packets before passing them up the stack (CVE-2024-27415)\n  * kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info (CVE-2024-35839)\n  * kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)\n  * kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion (CVE-2024-35897)\n  * kernel: netfilter: validate user input for expected length (CVE-2024-35896)\n  * kernel: netfilter: complete validation of user input (CVE-2024-35962)\n  * kernel: ice: fix LAG and VF lock dependency in ice_reset_vf() (CVE-2024-36003)\n  * kernel: cxl/port: Fix delete_endpoint() vs parent unregistration race (CVE-2023-52771)\n  * kernel: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (CVE-2023-52880)\n  * kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (CVE-2024-36025)\n  * kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608)\n  * kernel: crypto: bcm - Fix pointer arithmetic (CVE-2024-38579)\n  * kernel: RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (CVE-2024-38544)\n  * kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (CVE-2024-38540)\n  * kernel: net: bridge: xmit: make sure we have at least eth header len bytes (CVE-2024-38538)\n  * kernel: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (CVE-2024-39476)\n  * kernel: ipv6: fix possible race in __fib6_drop_pcpu_from() (CVE-2024-40905)\n  * kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station (CVE-2024-40911)\n  * kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (CVE-2024-40912)\n  * kernel: mm/huge_memory: don\u0026#39;t unpoison huge_zero_folio (CVE-2024-40914)\n  * kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (CVE-2024-40929)\n  * kernel: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail (CVE-2024-40939)\n  * kernel: wifi: iwlwifi: mvm: don\u0026#39;t read past the mfuart notifcation (CVE-2024-40941)\n  * kernel: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors (CVE-2024-40957)\n  * kernel: scsi: qedi: Fix crash while reading debugfs attribute (CVE-2024-40978)\n  * kernel: tipc: force a dst refcount before doing decryption (CVE-2024-40983)\n  * kernel: virtio-net: tap: mlx5_core short frame denial of service (CVE-2024-41090)\n  * kernel: virtio-net: tun: mlx5_core short frame denial of service (CVE-2024-41091)\n  * kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (CVE-2024-41041)\n  * kernel: NFSv4: Fix memory leak in nfs4_set_security_label (CVE-2024-41076)\n  * kernel: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (CVE-2024-42110)\n  * kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment (CVE-2024-42152)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
  "id": "ALSA-2024:5928",
  "modified": "2024-11-03T22:29:00Z",
  "published": "2024-08-28T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2024:5928"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52771"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52880"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26581"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26668"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26810"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26855"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26908"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26925"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27016"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27019"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27020"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-27415"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35839"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35896"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35897"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35898"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35962"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36003"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36025"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38538"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38540"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38544"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38579"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38608"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-39476"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40905"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40911"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40912"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40914"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40929"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40939"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40941"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40957"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40978"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40983"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-41041"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-41076"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-41090"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-41091"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-42110"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-42152"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265185"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2272797"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273654"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275742"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275744"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2277166"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278256"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278258"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278264"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281101"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281284"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281669"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281672"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281675"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281916"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281958"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282720"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2283468"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284421"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293356"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293414"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293455"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293459"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293461"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2295914"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297489"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297495"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297496"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297498"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297513"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297523"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297525"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297541"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297562"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297567"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2299240"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2299336"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2300410"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2300453"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2301473"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2301519"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/9/ALSA-2024-5928.html"
    }
  ],
  "related": [
    "CVE-2024-26581",
    "CVE-2024-26668",
    "CVE-2024-26810",
    "CVE-2024-26855",
    "CVE-2024-26908",
    "CVE-2024-26925",
    "CVE-2024-27020",
    "CVE-2024-27019",
    "CVE-2024-27016",
    "CVE-2024-27415",
    "CVE-2024-35839",
    "CVE-2024-35898",
    "CVE-2024-35897",
    "CVE-2024-35896",
    "CVE-2024-35962",
    "CVE-2024-36003",
    "CVE-2023-52771",
    "CVE-2023-52880",
    "CVE-2024-36025",
    "CVE-2024-38608",
    "CVE-2024-38579",
    "CVE-2024-38544",
    "CVE-2024-38540",
    "CVE-2024-38538",
    "CVE-2024-39476",
    "CVE-2024-40905",
    "CVE-2024-40911",
    "CVE-2024-40912",
    "CVE-2024-40914",
    "CVE-2024-40929",
    "CVE-2024-40939",
    "CVE-2024-40941",
    "CVE-2024-40957",
    "CVE-2024-40978",
    "CVE-2024-40983",
    "CVE-2024-41090",
    "CVE-2024-41091",
    "CVE-2024-41041",
    "CVE-2024-41076",
    "CVE-2024-42110",
    "CVE-2024-42152"
  ],
  "summary": "Important: kernel security update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…