{"schema_version": "1.3.1", "id": "RLSA-2024:8617", "modified": "2024-11-08T15:59:32.848646Z", "published": "2024-11-08T15:57:49.260064Z", "related": ["CVE-2021-47383", "CVE-2024-2201", "CVE-2024-26640", "CVE-2024-26826", "CVE-2024-26923", "CVE-2024-26935", "CVE-2024-26961", "CVE-2024-36244", "CVE-2024-39472", "CVE-2024-39504", "CVE-2024-40904", "CVE-2024-40931", "CVE-2024-40960", "CVE-2024-40972", "CVE-2024-40977", "CVE-2024-40995", "CVE-2024-40998", "CVE-2024-41005", "CVE-2024-41013", "CVE-2024-41014", "CVE-2024-43854", "CVE-2024-45018"], "summary": "Moderate: kernel security update", "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: intel: Native Branch History Injection (BHI) (CVE-2024-2201)\n\n* kernel: tcp: add sanity checks to rx zerocopy (CVE-2024-26640)\n\n* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)\n\n* kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923)\n\n* kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del (CVE-2024-26961)\n\n* kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935)\n\n* kernel: tty: Fix out-of-bound vmalloc access in imageblit (CVE-2021-47383)\n\n* kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too (CVE-2024-36244)\n\n* kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup (CVE-2024-39472)\n\n* kernel: netfilter: nft_inner: validate mandatory meta and payload (CVE-2024-39504)\n\n* kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CVE-2024-40904)\n\n* kernel: mptcp: ensure snd_una is properly initialized on connect (CVE-2024-40931)\n\n* kernel: ipv6: prevent possible NULL dereference in rt6_probe() (CVE-2024-40960)\n\n* kernel: ext4: do not create EA inode under buffer lock (CVE-2024-40972)\n\n* kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CVE-2024-40977)\n\n* kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995)\n\n* kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (CVE-2024-40998)\n\n* kernel: netpoll: Fix race condition in netpoll_owner_active (CVE-2024-41005)\n\n* kernel: xfs: don't walk off the end of a directory data block (CVE-2024-41013)\n\n* kernel: xfs: add bounds checking to xlog_recover_process_data (CVE-2024-41014)\n\n* kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854)\n\n* kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "affected": [{"package": {"ecosystem": "Rocky Linux:9", "name": "kernel", "purl": "pkg:rpm/rocky-linux/kernel?distro=rocky-linux-9&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:5.14.0-427.42.1.el9_4"}], "database_specific": {"yum_repository": "RT"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2024:8617"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268118"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270100"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275604"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277171"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278176"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278235"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282357"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293654"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296067"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297476"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297488"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297515"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297544"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297556"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297561"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297579"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297582"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297589"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300296"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300297"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311715"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}