alsa-2024:6567
Vulnerability from osv_almalinux
Published
2024-09-11 00:00
Modified
2024-11-03 22:31
Summary
Moderate: kernel security update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)
  • kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629)
  • kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630)
  • kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720)
  • kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886)
  • kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946)
  • kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (CVE-2024-35791)
  • kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797)
  • kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875)
  • kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000)
  • kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801)
  • kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883)
  • kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019)
  • kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619)
  • kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979)
  • kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559)
  • kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927)
  • kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936)
  • kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040)
  • kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044)
  • kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055)
  • kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096)
  • kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082)
  • kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096)
  • kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (CVE-2024-42102)
  • kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131)
  • kernel: nvme: avoid double free special payload (CVE-2024-41073)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
https://access.redhat.com/errata/RHSA-2024:6567 ADVISORY
https://access.redhat.com/security/cve/CVE-2023-52463 REPORT
https://access.redhat.com/security/cve/CVE-2023-52801 REPORT
https://access.redhat.com/security/cve/CVE-2024-26629 REPORT
https://access.redhat.com/security/cve/CVE-2024-26630 REPORT
https://access.redhat.com/security/cve/CVE-2024-26720 REPORT
https://access.redhat.com/security/cve/CVE-2024-26886 REPORT
https://access.redhat.com/security/cve/CVE-2024-26946 REPORT
https://access.redhat.com/security/cve/CVE-2024-35791 REPORT
https://access.redhat.com/security/cve/CVE-2024-35797 REPORT
https://access.redhat.com/security/cve/CVE-2024-35875 REPORT
https://access.redhat.com/security/cve/CVE-2024-36000 REPORT
https://access.redhat.com/security/cve/CVE-2024-36019 REPORT
https://access.redhat.com/security/cve/CVE-2024-36883 REPORT
https://access.redhat.com/security/cve/CVE-2024-36979 REPORT
https://access.redhat.com/security/cve/CVE-2024-38559 REPORT
https://access.redhat.com/security/cve/CVE-2024-38619 REPORT
https://access.redhat.com/security/cve/CVE-2024-40927 REPORT
https://access.redhat.com/security/cve/CVE-2024-40936 REPORT
https://access.redhat.com/security/cve/CVE-2024-41040 REPORT
https://access.redhat.com/security/cve/CVE-2024-41044 REPORT
https://access.redhat.com/security/cve/CVE-2024-41055 REPORT
https://access.redhat.com/security/cve/CVE-2024-41073 REPORT
https://access.redhat.com/security/cve/CVE-2024-41096 REPORT
https://access.redhat.com/security/cve/CVE-2024-42082 REPORT
https://access.redhat.com/security/cve/CVE-2024-42096 REPORT
https://access.redhat.com/security/cve/CVE-2024-42102 REPORT
https://access.redhat.com/security/cve/CVE-2024-42131 REPORT
https://bugzilla.redhat.com/2265797 REPORT
https://bugzilla.redhat.com/2269434 REPORT
https://bugzilla.redhat.com/2269436 REPORT
https://bugzilla.redhat.com/2273141 REPORT
https://bugzilla.redhat.com/2275678 REPORT
https://bugzilla.redhat.com/2278206 REPORT
https://bugzilla.redhat.com/2281052 REPORT
https://bugzilla.redhat.com/2281151 REPORT
https://bugzilla.redhat.com/2281727 REPORT
https://bugzilla.redhat.com/2281968 REPORT
https://bugzilla.redhat.com/2282709 REPORT
https://bugzilla.redhat.com/2284271 REPORT
https://bugzilla.redhat.com/2284402 REPORT
https://bugzilla.redhat.com/2293273 REPORT
https://bugzilla.redhat.com/2293276 REPORT
https://bugzilla.redhat.com/2293440 REPORT
https://bugzilla.redhat.com/2297511 REPORT
https://bugzilla.redhat.com/2297520 REPORT
https://bugzilla.redhat.com/2300409 REPORT
https://bugzilla.redhat.com/2300414 REPORT
https://bugzilla.redhat.com/2300429 REPORT
https://bugzilla.redhat.com/2300491 REPORT
https://bugzilla.redhat.com/2300520 REPORT
https://bugzilla.redhat.com/2300713 REPORT
https://bugzilla.redhat.com/2301465 REPORT
https://bugzilla.redhat.com/2301496 REPORT
https://bugzilla.redhat.com/2301637 REPORT
https://errata.almalinux.org/9/ALSA-2024-6567.html ADVISORY

{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "bpftool"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "7.3.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-64k-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-abi-stablelists"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-cross-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-debug-uki-virt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-doc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-rt-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-tools"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-tools-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-tools-libs-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-uki-virt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-devel-matched"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-modules-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "kernel-zfcpdump-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "libperf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "python3-perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "rtla"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "rv"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5.14.0-427.35.1.el9_4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.  \n\nSecurity Fix(es):  \n\n  * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)\n  * kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629)\n  * kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630)\n  * kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720)\n  * kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886)\n  * kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946)\n  * kernel: KVM: SVM: Flush pages under kvm-\u0026gt;lock to fix UAF in svm_register_enc_region() (CVE-2024-35791)\n  * kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797)\n  * kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875)\n  * kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000)\n  * kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801)\n  * kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883)\n  * kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019)\n  * kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619)\n  * kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979)\n  * kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559)\n  * kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927)\n  * kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936)\n  * kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040)\n  * kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044)\n  * kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055)\n  * kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096)\n  * kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082)\n  * kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096)\n  * kernel: Revert \u0026#34;mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again\u0026#34; (CVE-2024-42102)\n  * kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131)\n  * kernel: nvme: avoid double free special payload (CVE-2024-41073)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
  "id": "ALSA-2024:6567",
  "modified": "2024-11-03T22:31:56Z",
  "published": "2024-09-11T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2024:6567"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52463"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-52801"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26629"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26630"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26720"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26886"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-26946"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35791"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35797"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-35875"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36000"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36019"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36883"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-36979"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38559"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-38619"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40927"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-40936"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-41040"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-41044"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-41055"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-41073"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-41096"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-42082"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-42096"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-42102"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-42131"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2265797"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2269434"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2269436"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2273141"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2275678"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2278206"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281052"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281151"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281727"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2281968"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2282709"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284271"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2284402"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293273"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293276"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2293440"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297511"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2297520"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2300409"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2300414"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2300429"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2300491"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2300520"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2300713"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2301465"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2301496"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2301637"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/9/ALSA-2024-6567.html"
    }
  ],
  "related": [
    "CVE-2023-52463",
    "CVE-2024-26629",
    "CVE-2024-26630",
    "CVE-2024-26720",
    "CVE-2024-26886",
    "CVE-2024-26946",
    "CVE-2024-35791",
    "CVE-2024-35797",
    "CVE-2024-35875",
    "CVE-2024-36000",
    "CVE-2023-52801",
    "CVE-2024-36883",
    "CVE-2024-36019",
    "CVE-2024-38619",
    "CVE-2024-36979",
    "CVE-2024-38559",
    "CVE-2024-40927",
    "CVE-2024-40936",
    "CVE-2024-41040",
    "CVE-2024-41044",
    "CVE-2024-41055",
    "CVE-2024-41096",
    "CVE-2024-42082",
    "CVE-2024-42096",
    "CVE-2024-42102",
    "CVE-2024-42131",
    "CVE-2024-41073"
  ],
  "summary": "Moderate: kernel security update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…