{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2024:4352","synopsis":"Important: kernel-rt security and bug fix update","severity":"SEVERITY_IMPORTANT","topic":"An update is available for kernel-rt.\nThis update affects Rocky Linux 8.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list","description":"The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: tls (CVE-2024-26585,CVE-2024-26584, CVE-2024-26583\n\n* kernel-rt: kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909)\n\n* kernel: ipc\/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069)\n\n* kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng (CVE-2023-52615)\n\n* kernel-rt: kernel: drm\/amdgpu: use-after-free vulnerability (CVE-2024-26656)\n\n* kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset CVE-2024-26801)\n\n* kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)\n\n* kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)\n\n* kernel: wifi: mac80211: (CVE-2024-35789, CVE-2024-35838, CVE-2024-35845)\n\n* kernel: wifi: nl80211: reject iftype change with mesh ID change (CVE-2024-27410)\n\n* kernel: perf\/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835)\n\n* kernel:TCP-spoofed ghost ACKs and leak initial sequence number (CVE-2023-52881)\n\n* kernel: Bluetooth BR\/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)\n\n* kernel: ovl: fix leaked dentry (CVE-2021-46972)\n\n* kernel: platform\/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073)\n\n* kernel: mm\/damon\/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)\n\n* kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)\n\n* kernel: mm\/swap: fix race when skipping swapcache (CVE-2024-26759)\n\n* kernel: RDMA\/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)\n\n* kernel: x86\/mm: Disallow vsyscall page read for copy_from_kernel_nofault() (CVE-2024-26906)\n\n* kernel: net: ip_tunnel: prevent perpetual headroom growth (CVE-2024-26804)\n\n* kernel: net\/usb: kalmia: avoid printing uninitialized value on error path (CVE-2023-52703)\n\n* kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)\n\n* kernel: EDAC\/thunderx: Incorrect buffer size in drivers\/edac\/thunderx_edac.c (CVE-2023-52464)\n\n* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)\n\n* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)\n\n* kernel: net\/bnx2x: Prevent access to a freed page in page_pool (CVE-2024-26859)\n\n* kernel: crypto: (CVE-2024-26974, CVE-2023-52813)\n\n* kernel: can: (CVE-2023-52878, CVE-2021-47456)\n\n* kernel: usb: (CVE-2023-52781, CVE-2023-52877)\n\n* kernel: net\/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)\n\n* kernel: usbnet: sanity check for maxpacket (CVE-2021-47495)\n\n* kernel: gro: fix ownership transfer (CVE-2024-35890)\n\n* kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888)\n\n* kernel: tipc: fix kernel warning when sending SYN message (CVE-2023-52700)\n\n* kernel: net\/mlx5\/mlxsw: (CVE-2024-35960, CVE-2024-36007, CVE-2024-35855)\n\n* kernel: net\/mlx5e: (CVE-2024-35959, CVE-2023-52626, CVE-2024-35835)\n\n* kernel: mlxsw: (CVE-2024-35854, CVE-2024-35853, CVE-2024-35852)\n\n* kernel: net: (CVE-2024-35958, CVE-2021-47311, CVE-2021-47236, CVE-2021-47310)\n\n* kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004)\n\n* kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)\n\n* kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353)\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest Rocky Linux-8.10.z kernel (JIRA:Rocky Linux-40882)\n\n* [rhel8.9][cxgb4]BUG: using smp_processor_id() in preemptible [00000000] code: ethtool\/54735 (JIRA:Rocky Linux-8779)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","solution":null,"affectedProducts":["Rocky Linux 8"],"fixes":[{"ticket":"1918601","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1918601","description":""},{"ticket":"2248122","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2248122","description":""},{"ticket":"2258875","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2258875","description":""},{"ticket":"2265517","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2265517","description":""},{"ticket":"2265519","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2265519","description":""},{"ticket":"2265520","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2265520","description":""},{"ticket":"2265800","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2265800","description":""},{"ticket":"2266408","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2266408","description":""},{"ticket":"2266831","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2266831","description":""},{"ticket":"2267513","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2267513","description":""},{"ticket":"2267518","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2267518","description":""},{"ticket":"2267730","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2267730","description":""},{"ticket":"2270093","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2270093","description":""},{"ticket":"2271680","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2271680","description":""},{"ticket":"2272692","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2272692","description":""},{"ticket":"2272829","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2272829","description":""},{"ticket":"2273204","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2273204","description":""},{"ticket":"2273278","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2273278","description":""},{"ticket":"2273423","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2273423","description":""},{"ticket":"2273429","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2273429","description":""},{"ticket":"2275604","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2275604","description":""},{"ticket":"2275633","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2275633","description":""},{"ticket":"2275635","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2275635","description":""},{"ticket":"2275733","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2275733","description":""},{"ticket":"2278337","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2278337","description":""},{"ticket":"2278354","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2278354","description":""},{"ticket":"2280434","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2280434","description":""},{"ticket":"2281057","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281057","description":""},{"ticket":"2281113","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281113","description":""},{"ticket":"2281157","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281157","description":""},{"ticket":"2281165","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281165","description":""},{"ticket":"2281251","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281251","description":""},{"ticket":"2281253","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281253","description":""},{"ticket":"2281255","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281255","description":""},{"ticket":"2281257","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281257","description":""},{"ticket":"2281272","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281272","description":""},{"ticket":"2281350","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281350","description":""},{"ticket":"2281689","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281689","description":""},{"ticket":"2281693","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281693","description":""},{"ticket":"2281920","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281920","description":""},{"ticket":"2281923","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281923","description":""},{"ticket":"2281925","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281925","description":""},{"ticket":"2281953","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281953","description":""},{"ticket":"2281986","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281986","description":""},{"ticket":"2282394","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282394","description":""},{"ticket":"2282400","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282400","description":""},{"ticket":"2282471","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282471","description":""},{"ticket":"2282472","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282472","description":""},{"ticket":"2282581","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282581","description":""},{"ticket":"2282609","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282609","description":""},{"ticket":"2282612","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282612","description":""},{"ticket":"2282653","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282653","description":""},{"ticket":"2282680","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282680","description":""},{"ticket":"2282698","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282698","description":""},{"ticket":"2282712","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282712","description":""},{"ticket":"2282735","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282735","description":""},{"ticket":"2282902","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282902","description":""},{"ticket":"2282920","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282920","description":""}],"cves":[{"name":"CVE-2020-26555","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-26555","cvss3ScoringVector":"CVSS:3.1\/AV:A\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:N","cvss3BaseScore":"5.4","cwe":"CWE-400"},{"name":"CVE-2021-46909","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-46909","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.4","cwe":"CWE-391"},{"name":"CVE-2021-46972","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-46972","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:N\/A:N","cvss3BaseScore":"5.5","cwe":"CWE-402"},{"name":"CVE-2021-47069","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47069","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-362"},{"name":"CVE-2021-47073","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47073","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:L","cvss3BaseScore":"2.3","cwe":"CWE-99"},{"name":"CVE-2021-47236","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47236","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2021-47310","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47310","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2021-47311","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47311","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2021-47353","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47353","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-476"},{"name":"CVE-2021-47356","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47356","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"6.7","cwe":"CWE-416"},{"name":"CVE-2021-47456","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47456","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2021-47495","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47495","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2023-5090","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-5090","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:C\/C:N\/I:N\/A:H","cvss3BaseScore":"6.0","cwe":"CWE-755"},{"name":"CVE-2023-52464","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52464","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:H\/UI:R\/S:U\/C:N\/I:L\/A:L","cvss3BaseScore":"2.9","cwe":"CWE-805"},{"name":"CVE-2023-52560","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52560","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:L","cvss3BaseScore":"3.3","cwe":"CWE-401"},{"name":"CVE-2023-52615","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52615","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.4","cwe":"CWE-400"},{"name":"CVE-2023-52626","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52626","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:N\/A:H","cvss3BaseScore":"6.0","cwe":"CWE-125"},{"name":"CVE-2023-52667","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52667","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2023-52700","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52700","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-20"},{"name":"CVE-2023-52703","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52703","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:L","cvss3BaseScore":"3.3","cwe":"CWE-15"},{"name":"CVE-2023-52781","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52781","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.4","cwe":"CWE-20"},{"name":"CVE-2023-52813","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52813","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-833"},{"name":"CVE-2023-52835","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52835","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-125"},{"name":"CVE-2023-52877","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52877","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.4","cwe":"CWE-476"},{"name":"CVE-2023-52878","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52878","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.4","cwe":"CWE-125"},{"name":"CVE-2023-52881","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52881","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.9","cwe":"UNKNOWN"},{"name":"CVE-2024-26583","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26583","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.1","cwe":"CWE-362->CWE-416"},{"name":"CVE-2024-26584","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26584","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-393"},{"name":"CVE-2024-26585","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26585","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.0","cwe":"CWE-362"},{"name":"CVE-2024-26656","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26656","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.7","cwe":"CWE-416"},{"name":"CVE-2024-26675","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26675","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-20"},{"name":"CVE-2024-26735","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26735","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-416->CWE-476"},{"name":"CVE-2024-26759","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26759","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-362"},{"name":"CVE-2024-26801","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26801","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-26804","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26804","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-26826","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26826","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-20"},{"name":"CVE-2024-26859","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26859","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.1","cwe":"CWE-362"},{"name":"CVE-2024-26906","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26906","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-20"},{"name":"CVE-2024-26907","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26907","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"6.7","cwe":"CWE-99"},{"name":"CVE-2024-26974","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26974","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:H","cvss3BaseScore":"5.8","cwe":"UNKNOWN"},{"name":"CVE-2024-26982","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26982","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-27397","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-27397","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.0","cwe":"UNKNOWN"},{"name":"CVE-2024-27410","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-27410","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35789","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35789","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35835","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35835","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35838","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35838","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35845","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35845","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35852","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35852","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35853","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35853","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35854","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35854","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35855","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35855","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35888","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35888","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35890","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35890","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35958","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35958","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35959","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35959","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35960","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35960","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-36004","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-36004","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-36007","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-36007","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"}],"references":[],"publishedAt":"2024-07-15T12:17:54.611301Z","rpms":{"Rocky Linux 8":{"nvras":["kernel-rt-0:4.18.0-553.8.1.rt7.349.el8_10.src.rpm","kernel-rt-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-core-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-debug-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-debug-core-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-debug-debuginfo-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-debug-devel-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-debuginfo-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-debug-kvm-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-debug-modules-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-debug-modules-extra-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-devel-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-kvm-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-modules-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm","kernel-rt-modules-extra-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm"]}},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2024:4352 kernel-rt security and bug fix update Security Advisories Updates

July 15, 2024
An update is available for kernel-rt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

Summary

An update is available for kernel-rt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list


The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: tls (CVE-2024-26585,CVE-2024-26584, CVE-2024-26583 * kernel-rt: kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909) * kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069) * kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng (CVE-2023-52615) * kernel-rt: kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset CVE-2024-26801) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397) * kernel: wifi: mac80211: (CVE-2024-35789, CVE-2024-35838, CVE-2024-35845) * kernel: wifi: nl80211: reject iftype change with mesh ID change (CVE-2024-27410) * kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835) * kernel:TCP-spoofed ghost ACKs and leak initial sequence number (CVE-2023-52881) * kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555) * kernel: ovl: fix leaked dentry (CVE-2021-46972) * kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073) * kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560) * kernel: ppp_async: limit MRU to 64K (CVE-2024-26675) * kernel: mm/swap: fix race when skipping swapcache (CVE-2024-26759) * kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907) * kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() (CVE-2024-26906) * kernel: net: ip_tunnel: prevent perpetual headroom growth (CVE-2024-26804) * kernel: net/usb: kalmia: avoid printing uninitialized value on error path (CVE-2023-52703) * kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090) * kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464) * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: net/bnx2x: Prevent access to a freed page in page_pool (CVE-2024-26859) * kernel: crypto: (CVE-2024-26974, CVE-2023-52813) * kernel: can: (CVE-2023-52878, CVE-2021-47456) * kernel: usb: (CVE-2023-52781, CVE-2023-52877) * kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667) * kernel: usbnet: sanity check for maxpacket (CVE-2021-47495) * kernel: gro: fix ownership transfer (CVE-2024-35890) * kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888) * kernel: tipc: fix kernel warning when sending SYN message (CVE-2023-52700) * kernel: net/mlx5/mlxsw: (CVE-2024-35960, CVE-2024-36007, CVE-2024-35855) * kernel: net/mlx5e: (CVE-2024-35959, CVE-2023-52626, CVE-2024-35835) * kernel: mlxsw: (CVE-2024-35854, CVE-2024-35853, CVE-2024-35852) * kernel: net: (CVE-2024-35958, CVE-2021-47311, CVE-2021-47236, CVE-2021-47310) * kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004) * kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356) * kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353) Bug Fix(es): * kernel-rt: update RT source tree to the latest Rocky Linux-8.10.z kernel (JIRA:Rocky Linux-40882) * [rhel8.9][cxgb4]BUG: using smp_processor_id() in preemptible [00000000] code: ethtool/54735 (JIRA:Rocky Linux-8779) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

kernel-rt-0:4.18.0-553.8.1.rt7.349.el8_10.src.rpm

kernel-rt-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-core-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-debug-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-debug-core-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-debug-debuginfo-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-debug-devel-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-debuginfo-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-debug-kvm-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-debug-modules-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-debug-modules-extra-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-devel-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-kvm-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-modules-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

kernel-rt-modules-extra-0:4.18.0-553.8.1.rt7.349.el8_10.x86_64.rpm

References

No References

CVEs

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46909

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46972

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47069

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47073

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47236

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47310

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47311

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47353

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47356

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47456

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47495

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5090

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52464

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52560

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52626

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52667

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52700

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52703

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52781

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52813

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52835

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52877

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52878

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52881

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26656

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26759

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26826

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26982

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27410

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35835

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35838

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35845

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35852

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35959

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36007

Severity
Name: RLSA-2024:4352
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=1918601

https://bugzilla.redhat.com/show_bug.cgi?id=2248122

https://bugzilla.redhat.com/show_bug.cgi?id=2258875

https://bugzilla.redhat.com/show_bug.cgi?id=2265517

https://bugzilla.redhat.com/show_bug.cgi?id=2265519

https://bugzilla.redhat.com/show_bug.cgi?id=2265520

https://bugzilla.redhat.com/show_bug.cgi?id=2265800

https://bugzilla.redhat.com/show_bug.cgi?id=2266408

https://bugzilla.redhat.com/show_bug.cgi?id=2266831

https://bugzilla.redhat.com/show_bug.cgi?id=2267513

https://bugzilla.redhat.com/show_bug.cgi?id=2267518

https://bugzilla.redhat.com/show_bug.cgi?id=2267730

https://bugzilla.redhat.com/show_bug.cgi?id=2270093

https://bugzilla.redhat.com/show_bug.cgi?id=2271680

https://bugzilla.redhat.com/show_bug.cgi?id=2272692

https://bugzilla.redhat.com/show_bug.cgi?id=2272829

https://bugzilla.redhat.com/show_bug.cgi?id=2273204

https://bugzilla.redhat.com/show_bug.cgi?id=2273278

https://bugzilla.redhat.com/show_bug.cgi?id=2273423

https://bugzilla.redhat.com/show_bug.cgi?id=2273429

https://bugzilla.redhat.com/show_bug.cgi?id=2275604

https://bugzilla.redhat.com/show_bug.cgi?id=2275633

https://bugzilla.redhat.com/show_bug.cgi?id=2275635

https://bugzilla.redhat.com/show_bug.cgi?id=2275733

https://bugzilla.redhat.com/show_bug.cgi?id=2278337

https://bugzilla.redhat.com/show_bug.cgi?id=2278354

https://bugzilla.redhat.com/show_bug.cgi?id=2280434

https://bugzilla.redhat.com/show_bug.cgi?id=2281057

https://bugzilla.redhat.com/show_bug.cgi?id=2281113

https://bugzilla.redhat.com/show_bug.cgi?id=2281157

https://bugzilla.redhat.com/show_bug.cgi?id=2281165

https://bugzilla.redhat.com/show_bug.cgi?id=2281251

https://bugzilla.redhat.com/show_bug.cgi?id=2281253

https://bugzilla.redhat.com/show_bug.cgi?id=2281255

https://bugzilla.redhat.com/show_bug.cgi?id=2281257

https://bugzilla.redhat.com/show_bug.cgi?id=2281272

https://bugzilla.redhat.com/show_bug.cgi?id=2281350

https://bugzilla.redhat.com/show_bug.cgi?id=2281689

https://bugzilla.redhat.com/show_bug.cgi?id=2281693

https://bugzilla.redhat.com/show_bug.cgi?id=2281920

https://bugzilla.redhat.com/show_bug.cgi?id=2281923

https://bugzilla.redhat.com/show_bug.cgi?id=2281925

https://bugzilla.redhat.com/show_bug.cgi?id=2281953

https://bugzilla.redhat.com/show_bug.cgi?id=2281986

https://bugzilla.redhat.com/show_bug.cgi?id=2282394

https://bugzilla.redhat.com/show_bug.cgi?id=2282400

https://bugzilla.redhat.com/show_bug.cgi?id=2282471

https://bugzilla.redhat.com/show_bug.cgi?id=2282472

https://bugzilla.redhat.com/show_bug.cgi?id=2282581

https://bugzilla.redhat.com/show_bug.cgi?id=2282609

https://bugzilla.redhat.com/show_bug.cgi?id=2282612

https://bugzilla.redhat.com/show_bug.cgi?id=2282653

https://bugzilla.redhat.com/show_bug.cgi?id=2282680

https://bugzilla.redhat.com/show_bug.cgi?id=2282698

https://bugzilla.redhat.com/show_bug.cgi?id=2282712

https://bugzilla.redhat.com/show_bug.cgi?id=2282735

https://bugzilla.redhat.com/show_bug.cgi?id=2282902

https://bugzilla.redhat.com/show_bug.cgi?id=2282920


Related News