{"type":"TYPE_SECURITY","shortCode":"RX","name":"RXSA-2024:4211","synopsis":"Important: kernel security and bug fix update","severity":"SEVERITY_IMPORTANT","topic":"An update is available for kernel.\nThis update affects Rocky Linux SIG Cloud 8.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list","description":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Bluetooth BR\/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)\n\n* kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001)\n\n* kernel: ovl: fix leaked entry (CVE-2021-46972)\n\n* kernel: platform\/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073)\n\n* kernel: gro: fix ownership transfer (CVE-2024-35890)\n\n* kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585)\n\n* kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845)\n\n* kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007)\n\n* kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909)\n\n* kernel: ipc\/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069)\n\n* kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615)\n\n* kernel: net\/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959)\n\n* kernel: drm\/amdgpu: use-after-free vulnerability (CVE-2024-26656)\n\n* kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801)\n\n* kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)\n\n* kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397)\n\n* kernel: mm\/damon\/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)\n\n* kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)\n\n* kernel: x86\/mm\/swap: (CVE-2024-26759, CVE-2024-26906)\n\n* kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700)\n\n* kernel: RDMA\/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)\n\n* kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888)\n\n* kernel: powerpc\/imc-pmu\/powernv: (CVE-2023-52675, CVE-2023-52686)\n\n* kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)\n\n* kernel: EDAC\/thunderx: Incorrect buffer size in drivers\/edac\/thunderx_edac.c (CVE-2023-52464)\n\n* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)\n\n* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)\n\n* kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813)\n\n* kernel: net\/mlx5\/bnx2x\/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703)\n\n* kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004)\n\n* kernel: perf\/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835)\n\n* kernel: USB\/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495)\n\n* kernel: can: (CVE-2023-52878, CVE-2021-47456)\n\n* kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)\n\n* kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353)\n\nBug Fix(es):\n\n* Kernel panic - kernel BUG at mm\/slub.c:376! (JIRA:Rocky Linux SIG Cloud-29783)\n\n* Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux SIG Cloud-35361)\n\n* Rocky Linux SIG Cloud8.6 - kernel: s390\/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux SIG Cloud-36048)\n\n* [Rocky Linux SIG Cloud8] blktests block\/024 failed (JIRA:Rocky Linux SIG Cloud-8130)\n\n* Rocky Linux SIG Cloud8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest\/1050\/Shiner) (JIRA:Rocky Linux SIG Cloud-14195)\n\n* Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux SIG Cloud-36172)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","solution":null,"affectedProducts":["Rocky Linux SIG Cloud 8"],"fixes":[{"ticket":"1918601","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1918601","description":""},{"ticket":"2248122","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2248122","description":""},{"ticket":"2258875","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2258875","description":""},{"ticket":"2265517","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2265517","description":""},{"ticket":"2265519","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2265519","description":""},{"ticket":"2265520","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2265520","description":""},{"ticket":"2265800","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2265800","description":""},{"ticket":"2266408","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2266408","description":""},{"ticket":"2266831","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2266831","description":""},{"ticket":"2267513","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2267513","description":""},{"ticket":"2267518","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2267518","description":""},{"ticket":"2267730","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2267730","description":""},{"ticket":"2270093","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2270093","description":""},{"ticket":"2271680","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2271680","description":""},{"ticket":"2272692","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2272692","description":""},{"ticket":"2272829","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2272829","description":""},{"ticket":"2273204","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2273204","description":""},{"ticket":"2273278","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2273278","description":""},{"ticket":"2273423","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2273423","description":""},{"ticket":"2273429","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2273429","description":""},{"ticket":"2275604","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2275604","description":""},{"ticket":"2275633","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2275633","description":""},{"ticket":"2275635","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2275635","description":""},{"ticket":"2275733","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2275733","description":""},{"ticket":"2278337","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2278337","description":""},{"ticket":"2278354","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2278354","description":""},{"ticket":"2280434","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2280434","description":""},{"ticket":"2281057","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281057","description":""},{"ticket":"2281113","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281113","description":""},{"ticket":"2281157","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281157","description":""},{"ticket":"2281165","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281165","description":""},{"ticket":"2281251","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281251","description":""},{"ticket":"2281253","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281253","description":""},{"ticket":"2281255","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281255","description":""},{"ticket":"2281257","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281257","description":""},{"ticket":"2281272","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281272","description":""},{"ticket":"2281311","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281311","description":""},{"ticket":"2281334","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281334","description":""},{"ticket":"2281346","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281346","description":""},{"ticket":"2281350","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281350","description":""},{"ticket":"2281689","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281689","description":""},{"ticket":"2281693","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281693","description":""},{"ticket":"2281920","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281920","description":""},{"ticket":"2281923","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281923","description":""},{"ticket":"2281925","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281925","description":""},{"ticket":"2281953","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281953","description":""},{"ticket":"2281986","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2281986","description":""},{"ticket":"2282394","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282394","description":""},{"ticket":"2282400","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282400","description":""},{"ticket":"2282471","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282471","description":""},{"ticket":"2282472","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282472","description":""},{"ticket":"2282581","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282581","description":""},{"ticket":"2282609","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282609","description":""},{"ticket":"2282612","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282612","description":""},{"ticket":"2282653","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282653","description":""},{"ticket":"2282680","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282680","description":""},{"ticket":"2282698","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282698","description":""},{"ticket":"2282712","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282712","description":""},{"ticket":"2282735","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282735","description":""},{"ticket":"2282902","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282902","description":""},{"ticket":"2282920","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2282920","description":""}],"cves":[{"name":"CVE-2020-26555","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-26555","cvss3ScoringVector":"CVSS:3.1\/AV:A\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:N","cvss3BaseScore":"5.4","cwe":"CWE-400"},{"name":"CVE-2021-46909","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-46909","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.4","cwe":"CWE-391"},{"name":"CVE-2021-46972","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-46972","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:N\/A:N","cvss3BaseScore":"5.5","cwe":"CWE-402"},{"name":"CVE-2021-47069","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47069","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-362"},{"name":"CVE-2021-47073","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47073","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:L","cvss3BaseScore":"2.3","cwe":"CWE-99"},{"name":"CVE-2021-47236","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47236","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2021-47310","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47310","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2021-47311","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47311","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2021-47353","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47353","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-476"},{"name":"CVE-2021-47356","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47356","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"6.7","cwe":"CWE-416"},{"name":"CVE-2021-47456","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47456","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2021-47495","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-47495","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2023-5090","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-5090","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:C\/C:N\/I:N\/A:H","cvss3BaseScore":"6.0","cwe":"CWE-755"},{"name":"CVE-2023-52464","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52464","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:H\/UI:R\/S:U\/C:N\/I:L\/A:L","cvss3BaseScore":"2.9","cwe":"CWE-805"},{"name":"CVE-2023-52560","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52560","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:L","cvss3BaseScore":"3.3","cwe":"CWE-401"},{"name":"CVE-2023-52615","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52615","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.4","cwe":"CWE-400"},{"name":"CVE-2023-52626","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52626","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:N\/A:H","cvss3BaseScore":"6.0","cwe":"CWE-125"},{"name":"CVE-2023-52667","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52667","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2023-52669","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52669","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2023-52675","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52675","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2023-52686","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52686","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2023-52700","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52700","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-20"},{"name":"CVE-2023-52703","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52703","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:L","cvss3BaseScore":"3.3","cwe":"CWE-15"},{"name":"CVE-2023-52781","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52781","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.4","cwe":"CWE-20"},{"name":"CVE-2023-52813","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52813","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-833"},{"name":"CVE-2023-52835","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52835","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-125"},{"name":"CVE-2023-52877","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52877","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.4","cwe":"CWE-476"},{"name":"CVE-2023-52878","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52878","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.4","cwe":"CWE-125"},{"name":"CVE-2023-52881","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-52881","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.9","cwe":"UNKNOWN"},{"name":"CVE-2024-26583","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26583","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.1","cwe":"CWE-362->CWE-416"},{"name":"CVE-2024-26584","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26584","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-393"},{"name":"CVE-2024-26585","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26585","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.0","cwe":"CWE-362"},{"name":"CVE-2024-26656","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26656","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.7","cwe":"CWE-416"},{"name":"CVE-2024-26675","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26675","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-20"},{"name":"CVE-2024-26735","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26735","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-416->CWE-476"},{"name":"CVE-2024-26759","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26759","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-362"},{"name":"CVE-2024-26801","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26801","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-26804","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26804","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-26826","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26826","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-20"},{"name":"CVE-2024-26859","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26859","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.1","cwe":"CWE-362"},{"name":"CVE-2024-26906","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26906","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-20"},{"name":"CVE-2024-26907","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26907","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"6.7","cwe":"CWE-99"},{"name":"CVE-2024-26974","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26974","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:H","cvss3BaseScore":"5.8","cwe":"UNKNOWN"},{"name":"CVE-2024-26982","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-26982","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-27397","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-27397","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.0","cwe":"UNKNOWN"},{"name":"CVE-2024-27410","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-27410","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35789","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35789","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35835","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35835","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35838","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35838","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35845","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35845","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35852","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35852","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35853","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35853","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35854","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35854","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35855","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35855","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35888","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35888","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35890","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35890","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35958","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35958","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35959","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35959","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-35960","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-35960","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-36004","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-36004","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"},{"name":"CVE-2024-36007","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-36007","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"UNKNOWN"}],"references":[],"publishedAt":"2024-07-15T12:20:09.524479Z","rpms":{"Rocky Linux SIG Cloud 8":{"nvras":["bpftool-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","bpftool-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","bpftool-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","bpftool-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-abi-stablelists-0:4.18.0-553.8.1.el8_10.cloud.0.1.noarch.rpm","kernel-core-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-core-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-cross-headers-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-cross-headers-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-debug-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-debug-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-debug-core-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-debug-core-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-debug-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-debug-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-debug-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-debug-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-debug-modules-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-debug-modules-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-debug-modules-extra-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-debug-modules-extra-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-doc-0:4.18.0-553.8.1.el8_10.cloud.0.1.noarch.rpm","kernel-headers-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-headers-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-modules-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-modules-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-modules-extra-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-modules-extra-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-tools-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-tools-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-tools-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-tools-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-tools-libs-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-tools-libs-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","kernel-tools-libs-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","kernel-tools-libs-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","perf-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","perf-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","perf-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","perf-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","python3-perf-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","python3-perf-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm","python3-perf-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm","python3-perf-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm"]}},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RXSA-2024:4211 kernel security and bug fix update Security Advisories Updates

July 15, 2024
An update is available for kernel. This update affects Rocky Linux SIG Cloud 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

Summary

An update is available for kernel. This update affects Rocky Linux SIG Cloud 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list


The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555) * kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001) * kernel: ovl: fix leaked entry (CVE-2021-46972) * kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073) * kernel: gro: fix ownership transfer (CVE-2024-35890) * kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585) * kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845) * kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007) * kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909) * kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069) * kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615) * kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959) * kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397) * kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560) * kernel: ppp_async: limit MRU to 64K (CVE-2024-26675) * kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906) * kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700) * kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907) * kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888) * kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686) * kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090) * kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464) * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813) * kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703) * kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004) * kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835) * kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495) * kernel: can: (CVE-2023-52878, CVE-2021-47456) * kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356) * kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353) Bug Fix(es): * Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux SIG Cloud-29783) * Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux SIG Cloud-35361) * Rocky Linux SIG Cloud8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux SIG Cloud-36048) * [Rocky Linux SIG Cloud8] blktests block/024 failed (JIRA:Rocky Linux SIG Cloud-8130) * Rocky Linux SIG Cloud8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux SIG Cloud-14195) * Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux SIG Cloud-36172) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

bpftool-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

bpftool-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

bpftool-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

bpftool-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-abi-stablelists-0:4.18.0-553.8.1.el8_10.cloud.0.1.noarch.rpm

kernel-core-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-core-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-cross-headers-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-cross-headers-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-debug-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-debug-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-debug-core-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-debug-core-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-debug-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-debug-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-debug-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-debug-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-debug-modules-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-debug-modules-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-debug-modules-extra-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-debug-modules-extra-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-doc-0:4.18.0-553.8.1.el8_10.cloud.0.1.noarch.rpm

kernel-headers-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-headers-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-modules-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-modules-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-modules-extra-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-modules-extra-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-tools-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-tools-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-tools-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-tools-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-tools-libs-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-tools-libs-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

kernel-tools-libs-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

kernel-tools-libs-devel-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

perf-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

perf-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

perf-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

perf-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

python3-perf-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

python3-perf-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

python3-perf-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.aarch64.rpm

python3-perf-debuginfo-0:4.18.0-553.8.1.el8_10.cloud.0.1.x86_64.rpm

References

No References

CVEs

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46909

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46972

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47069

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47073

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47236

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47310

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47311

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47353

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47356

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47456

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47495

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5090

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52464

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52560

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52626

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52667

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52669

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52675

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52686

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52700

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52703

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52781

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52813

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52835

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52877

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52878

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52881

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26656

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26759

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26826

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26982

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27410

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35835

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35838

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35845

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35852

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35959

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36007

Severity
Name: RXSA-2024:4211
Affected Products: Rocky Linux SIG Cloud 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=1918601

https://bugzilla.redhat.com/show_bug.cgi?id=2248122

https://bugzilla.redhat.com/show_bug.cgi?id=2258875

https://bugzilla.redhat.com/show_bug.cgi?id=2265517

https://bugzilla.redhat.com/show_bug.cgi?id=2265519

https://bugzilla.redhat.com/show_bug.cgi?id=2265520

https://bugzilla.redhat.com/show_bug.cgi?id=2265800

https://bugzilla.redhat.com/show_bug.cgi?id=2266408

https://bugzilla.redhat.com/show_bug.cgi?id=2266831

https://bugzilla.redhat.com/show_bug.cgi?id=2267513

https://bugzilla.redhat.com/show_bug.cgi?id=2267518

https://bugzilla.redhat.com/show_bug.cgi?id=2267730

https://bugzilla.redhat.com/show_bug.cgi?id=2270093

https://bugzilla.redhat.com/show_bug.cgi?id=2271680

https://bugzilla.redhat.com/show_bug.cgi?id=2272692

https://bugzilla.redhat.com/show_bug.cgi?id=2272829

https://bugzilla.redhat.com/show_bug.cgi?id=2273204

https://bugzilla.redhat.com/show_bug.cgi?id=2273278

https://bugzilla.redhat.com/show_bug.cgi?id=2273423

https://bugzilla.redhat.com/show_bug.cgi?id=2273429

https://bugzilla.redhat.com/show_bug.cgi?id=2275604

https://bugzilla.redhat.com/show_bug.cgi?id=2275633

https://bugzilla.redhat.com/show_bug.cgi?id=2275635

https://bugzilla.redhat.com/show_bug.cgi?id=2275733

https://bugzilla.redhat.com/show_bug.cgi?id=2278337

https://bugzilla.redhat.com/show_bug.cgi?id=2278354

https://bugzilla.redhat.com/show_bug.cgi?id=2280434

https://bugzilla.redhat.com/show_bug.cgi?id=2281057

https://bugzilla.redhat.com/show_bug.cgi?id=2281113

https://bugzilla.redhat.com/show_bug.cgi?id=2281157

https://bugzilla.redhat.com/show_bug.cgi?id=2281165

https://bugzilla.redhat.com/show_bug.cgi?id=2281251

https://bugzilla.redhat.com/show_bug.cgi?id=2281253

https://bugzilla.redhat.com/show_bug.cgi?id=2281255

https://bugzilla.redhat.com/show_bug.cgi?id=2281257

https://bugzilla.redhat.com/show_bug.cgi?id=2281272

https://bugzilla.redhat.com/show_bug.cgi?id=2281311

https://bugzilla.redhat.com/show_bug.cgi?id=2281334

https://bugzilla.redhat.com/show_bug.cgi?id=2281346

https://bugzilla.redhat.com/show_bug.cgi?id=2281350

https://bugzilla.redhat.com/show_bug.cgi?id=2281689

https://bugzilla.redhat.com/show_bug.cgi?id=2281693

https://bugzilla.redhat.com/show_bug.cgi?id=2281920

https://bugzilla.redhat.com/show_bug.cgi?id=2281923

https://bugzilla.redhat.com/show_bug.cgi?id=2281925

https://bugzilla.redhat.com/show_bug.cgi?id=2281953

https://bugzilla.redhat.com/show_bug.cgi?id=2281986

https://bugzilla.redhat.com/show_bug.cgi?id=2282394

https://bugzilla.redhat.com/show_bug.cgi?id=2282400

https://bugzilla.redhat.com/show_bug.cgi?id=2282471

https://bugzilla.redhat.com/show_bug.cgi?id=2282472

https://bugzilla.redhat.com/show_bug.cgi?id=2282581

https://bugzilla.redhat.com/show_bug.cgi?id=2282609

https://bugzilla.redhat.com/show_bug.cgi?id=2282612

https://bugzilla.redhat.com/show_bug.cgi?id=2282653

https://bugzilla.redhat.com/show_bug.cgi?id=2282680

https://bugzilla.redhat.com/show_bug.cgi?id=2282698

https://bugzilla.redhat.com/show_bug.cgi?id=2282712

https://bugzilla.redhat.com/show_bug.cgi?id=2282735

https://bugzilla.redhat.com/show_bug.cgi?id=2282902

https://bugzilla.redhat.com/show_bug.cgi?id=2282920


Related News