rhsa-2024_5256
Vulnerability from csaf_redhat
Published
2024-08-13 00:13
Modified
2024-11-15 18:39
Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642)
* kernel: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (CVE-2024-26808)
* kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)
* kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993)
* kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823)
* kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)
* kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow (CVE-2024-27403)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)
* kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion (CVE-2024-35897)
* kernel: net: CVE-2024-36971 kernel: UAF in network route management (CVE-2024-36971)
* kernel: ionic: fix use after netif_napi_del() (CVE-2024-39502)
* kernel: scsi: qedi: Fix crash while reading debugfs attribute (CVE-2024-40978)
* kernel: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (CVE-2021-47624)
* kernel: virtio-net: tap: mlx5_core short frame denial of service (CVE-2024-41090)
* kernel: virtio-net: tun: mlx5_core short frame denial of service (CVE-2024-41091)
Bug Fix(es):
* kernel-rt: update RT source tree to the latest RHEL-9.0.z Batch 19 (JIRA:RHEL-45540)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642)\n\n* kernel: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (CVE-2024-26808)\n\n* kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)\n\n* kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993)\n\n* kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823)\n\n* kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)\n\n* kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow (CVE-2024-27403)\n\n* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)\n\n* kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion (CVE-2024-35897)\n\n* kernel: net: CVE-2024-36971 kernel: UAF in network route management (CVE-2024-36971)\n\n* kernel: ionic: fix use after netif_napi_del() (CVE-2024-39502)\n\n* kernel: scsi: qedi: Fix crash while reading debugfs attribute (CVE-2024-40978)\n\n* kernel: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (CVE-2021-47624)\n\n* kernel: virtio-net: tap: mlx5_core short frame denial of service (CVE-2024-41090)\n\n* kernel: virtio-net: tun: mlx5_core short frame denial of service (CVE-2024-41091)\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-9.0.z Batch 19 (JIRA:RHEL-45540)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5256", "url": "https://access.redhat.com/errata/RHSA-2024:5256" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2270881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270881" }, { "category": "external", "summary": "2273405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273405" }, { "category": "external", "summary": "2277238", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277238" }, { "category": "external", "summary": "2278314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278314" }, { "category": "external", "summary": "2278989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278989" }, { "category": "external", "summary": "2280434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280434" }, { "category": "external", "summary": "2281127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281127" }, { "category": "external", "summary": "2281669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281669" }, { "category": "external", "summary": "2281672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281672" }, { "category": "external", "summary": "2292331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292331" }, { "category": "external", "summary": "2297474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297474" }, { "category": "external", "summary": "2297562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297562" }, { "category": "external", "summary": "2298108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298108" }, { "category": "external", "summary": "2299240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299240" }, { "category": "external", "summary": "2299336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5256.json" } ], "title": "Red Hat Security Advisory: kernel-rt security update", "tracking": { "current_release_date": "2024-11-15T18:39:06+00:00", "generator": { "date": "2024-11-15T18:39:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:5256", "initial_release_date": "2024-08-13T00:13:06+00:00", "revision_history": [ { "date": "2024-08-13T00:13:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T00:13:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T18:39:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux NFV E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "product": { "name": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "product_id": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.112.1.rt21.184.el9_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-70.112.1.rt21.184.el9_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src" }, "product_reference": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux NFV E4S (v.9.0)", "product_id": "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src" }, "product_reference": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time E4S (v.9.0)", "product_id": "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-47624", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2024-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2298108" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Linux kernel\u2019s SunRpc filesystem (sysfs). This flaw allows a local user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47624" }, { "category": "external", "summary": "RHBZ#2298108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298108" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47624", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47624" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024071646-CVE-2021-47624-86cd@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024071646-CVE-2021-47624-86cd@gregkh/T" } ], "release_date": "2024-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" }, { "category": "workaround", "details": "To mitigate this issue, prevent module sunrpc from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change" }, { "cve": "CVE-2024-21823", "discovery_date": "2024-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278989" } ], "notes": [ { "category": "description", "text": "Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21823" }, { "category": "external", "summary": "RHBZ#2278989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278989" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21823" } ], "release_date": "2024-05-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application" }, { "cve": "CVE-2024-26642", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "discovery_date": "2024-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270881" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: disallow anonymous set with timeout flag\n\nAnonymous sets are never used with timeout from userspace, reject this.\nException to this rule is NFT_SET_EVAL to ensure legacy meters still work.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: nf_tables: disallow anonymous set with timeout flag", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-26642" }, { "category": "external", "summary": "RHBZ#2270881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26642", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26642" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024032150-CVE-2024-26642-3549@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024032150-CVE-2024-26642-3549@gregkh/T" } ], "release_date": "2024-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: netfilter: nf_tables: disallow anonymous set with timeout flag" }, { "cve": "CVE-2024-26808", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2273405" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel\u0027s netfilter subsystem, related to the nft_chain_filter feature. This issue occurs when a NETDEV_UNREGISTER event is reported, which can leave a stale reference to a network device in the ingress basechain. If this issue is not addressed, this stale reference could result in lingering issues with network device handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability has been fixed by ensuring that network devices are correctly removed from the basechain when these events occur. It affects multiple Linux kernel versions and is rated as a medium-severity issue with a CVSS v3 base score of 5.5, indicating it could lead to a denial of service under certain conditions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-26808" }, { "category": "external", "summary": "RHBZ#2273405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273405" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26808" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024040458-CVE-2024-26808-2df2@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024040458-CVE-2024-26808-2df2@gregkh/T" } ], "release_date": "2024-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, { "cve": "CVE-2024-26993", "discovery_date": "2024-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278314" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: sysfs: Fix reference leak in sysfs_break_active_protection()\n\nThe sysfs_break_active_protection() routine has an obvious reference\nleak in its error path. If the call to kernfs_find_and_get() fails then\nkn will be NULL, so the companion sysfs_unbreak_active_protection()\nroutine won\u0027t get called (and would only cause an access violation by\ntrying to dereference kn-\u003eparent if it was called). As a result, the\nreference to kobj acquired at the start of the function will never be\nreleased.\n\nFix the leak by adding an explicit kobject_put() call when kn is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-26993" }, { "category": "external", "summary": "RHBZ#2278314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278314" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26993", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26993" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024050144-CVE-2024-26993-fe52@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024050144-CVE-2024-26993-fe52@gregkh/T" } ], "release_date": "2024-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()" }, { "cve": "CVE-2024-27397", "discovery_date": "2024-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280434" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s netfilter subsystem in how a user triggers the element timeout. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: nf_tables: use timestamp to check for set element timeout", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability impact level between Moderate and High, and chosen Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27397" }, { "category": "external", "summary": "RHBZ#2280434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280434" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27397" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024050837-CVE-2024-27397-fd1e@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024050837-CVE-2024-27397-fd1e@gregkh/T" } ], "release_date": "2024-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" }, { "category": "workaround", "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: nf_tables: use timestamp to check for set element timeout" }, { "cve": "CVE-2024-27403", "discovery_date": "2024-05-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2281127" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_flow_offload: reset dst in route object after setting up flow\n\ndst is transferred to the flow object, route object does not own it\nanymore. Reset dst in route object, otherwise if flow_offload_add()\nfails, error path releases dst twice, leading to a refcount underflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27403" }, { "category": "external", "summary": "RHBZ#2281127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281127" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27403", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27403" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27403", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27403" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-27403-c4ba@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-27403-c4ba@gregkh/T" } ], "release_date": "2024-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow" }, { "cve": "CVE-2024-35897", "discovery_date": "2024-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2281672" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: discard table flag update with pending basechain deletion\n\nHook unregistration is deferred to the commit phase, same occurs with\nhook updates triggered by the table dormant flag. When both commands are\ncombined, this results in deleting a basechain while leaving its hook\nstill registered in the core.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-35897" }, { "category": "external", "summary": "RHBZ#2281672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281672" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-35897", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35897" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35897-1585@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35897-1585@gregkh/T" } ], "release_date": "2024-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion" }, { "cve": "CVE-2024-35898", "discovery_date": "2024-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2281669" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()\n\nnft_unregister_flowtable_type() within nf_flow_inet_module_exit() can\nconcurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().\nAnd thhere is not any protection when iterate over nf_tables_flowtables\nlist in __nft_flowtable_type_get(). Therefore, there is pertential\ndata-race of nf_tables_flowtables list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_flowtables list\nin __nft_flowtable_type_get(), and use rcu_read_lock() in the caller\nnft_flowtable_type_get() to protect the entire type query process.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-35898" }, { "category": "external", "summary": "RHBZ#2281669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-35898", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35898" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35898", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35898" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T" } ], "release_date": "2024-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()" }, { "cve": "CVE-2024-36886", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2277238" } ], "notes": [ { "category": "description", "text": "A use-after-free (UAF) flaw exists in the Linux Kernel within the reassembly of fragmented TIPC messages, specifically in the tipc_buf_append() function. The issue results due to a lack of checks in the error handling cleanup and can trigger a UAF on \"struct sk_buff\", which may lead to remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TIPC message reassembly use-after-free remote code execution vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "While the TIPC module is not loaded by default, this flaw might be used as one in a series of attacks. For that reason, and because of the possibility of remote code execution on systems where this module has been loaded, Red Hat assesses the impact of this flaw as Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-36886" }, { "category": "external", "summary": "RHBZ#2277238", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277238" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-36886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36886" }, { "category": "external", "summary": "https://lore.kernel.org/all/752f1ccf762223d109845365d07f55414058e5a3.1714484273.git.pabeni@redhat.com/", "url": "https://lore.kernel.org/all/752f1ccf762223d109845365d07f55414058e5a3.1714484273.git.pabeni@redhat.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024053033-CVE-2024-36886-dd83@gregkh/T/#u", "url": "https://lore.kernel.org/linux-cve-announce/2024053033-CVE-2024-36886-dd83@gregkh/T/#u" } ], "release_date": "2024-06-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" }, { "category": "workaround", "details": "The TIPC module is not automatically loaded in default configurations. When required, administrative privileges are required to explicitly load this module.\nTo determine if the TIPC module is loaded, use the following command:\n# grep tipc /proc/modules\nLook for output similar to the following:\ntipc 479232 0 - Live 0xffffffffc1ba5000\nip6_udp_tunnel 16384 1 tipc, Live 0xffffffffc1b9b000\nudp_tunnel 32768 1 tipc, Live 0xffffffffc1b8b000\n\nLoading the module can be prevented with the following instructions:\n# echo \"install tipc /bin/true\" \u003e\u003e /etc/modprobe.d/disable-tipc.conf\nThe system will need to be restarted if the module is loaded. In most circumstances, the TIPC kernel module will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TIPC message reassembly use-after-free remote code execution vulnerability" }, { "cve": "CVE-2024-36971", "discovery_date": "2024-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292331" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s network route management. This flaw allows an attacker to alter the behavior of certain network connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: kernel: UAF in network route management", "title": "Vulnerability summary" }, { "category": "other", "text": "Environments which use third-party KABI modules may experience kernel crashes after applying errata for CVE-2024-36971. Contact your module vendor about an update. Until these third party modules can be fixed, you can prevent crashes by disabling them. This problem stems from modules which use the `negative_advice()` function.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-36971" }, { "category": "external", "summary": "RHBZ#2292331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-36971", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36971" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36971", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36971" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/20240610090330.1347021-2-lee@kernel.org/T", "url": "https://lore.kernel.org/linux-cve-announce/20240610090330.1347021-2-lee@kernel.org/T" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-08-07T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: net: kernel: UAF in network route management" }, { "cve": "CVE-2024-39502", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2297474" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nionic: fix use after netif_napi_del()\n\nWhen queues are started, netif_napi_add() and napi_enable() are called.\nIf there are 4 queues and only 3 queues are used for the current\nconfiguration, only 3 queues\u0027 napi should be registered and enabled.\nThe ionic_qcq_enable() checks whether the .poll pointer is not NULL for\nenabling only the using queue\u0027 napi. Unused queues\u0027 napi will not be\nregistered by netif_napi_add(), so the .poll pointer indicates NULL.\nBut it couldn\u0027t distinguish whether the napi was unregistered or not\nbecause netif_napi_del() doesn\u0027t reset the .poll pointer to NULL.\nSo, ionic_qcq_enable() calls napi_enable() for the queue, which was\nunregistered by netif_napi_del().\n\nReproducer:\n ethtool -L \u003cinterface name\u003e rx 1 tx 1 combined 0\n ethtool -L \u003cinterface name\u003e rx 0 tx 0 combined 1\n ethtool -L \u003cinterface name\u003e rx 0 tx 0 combined 4\n\nSplat looks like:\nkernel BUG at net/core/dev.c:6666!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 3 PID: 1057 Comm: kworker/3:3 Not tainted 6.10.0-rc2+ #16\nWorkqueue: events ionic_lif_deferred_work [ionic]\nRIP: 0010:napi_enable+0x3b/0x40\nCode: 48 89 c2 48 83 e2 f6 80 b9 61 09 00 00 00 74 0d 48 83 bf 60 01 00 00 00 74 03 80 ce 01 f0 4f\nRSP: 0018:ffffb6ed83227d48 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff97560cda0828 RCX: 0000000000000029\nRDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff97560cda0a28\nRBP: ffffb6ed83227d50 R08: 0000000000000400 R09: 0000000000000001\nR10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000\nR13: ffff97560ce3c1a0 R14: 0000000000000000 R15: ffff975613ba0a20\nFS: 0000000000000000(0000) GS:ffff975d5f780000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f8f734ee200 CR3: 0000000103e50000 CR4: 00000000007506f0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? die+0x33/0x90\n ? do_trap+0xd9/0x100\n ? napi_enable+0x3b/0x40\n ? do_error_trap+0x83/0xb0\n ? napi_enable+0x3b/0x40\n ? napi_enable+0x3b/0x40\n ? exc_invalid_op+0x4e/0x70\n ? napi_enable+0x3b/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? napi_enable+0x3b/0x40\n ionic_qcq_enable+0xb7/0x180 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]\n ionic_start_queues+0xc4/0x290 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]\n ionic_link_status_check+0x11c/0x170 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]\n ionic_lif_deferred_work+0x129/0x280 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]\n process_one_work+0x145/0x360\n worker_thread+0x2bb/0x3d0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xcc/0x100\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x2d/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ionic: fix use after netif_napi_del()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39502" }, { "category": "external", "summary": "RHBZ#2297474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39502", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39502" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39502-afe9@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39502-afe9@gregkh/T" } ], "release_date": "2024-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ionic: fix use after netif_napi_del()" }, { "cve": "CVE-2024-40978", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "discovery_date": "2024-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2297562" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedi: Fix crash while reading debugfs attribute\n\nThe qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly\non a __user pointer, which results into the crash.\n\nTo fix this issue, use a small local stack buffer for sprintf() and then\ncall simple_read_from_buffer(), which in turns make the copy_to_user()\ncall.\n\nBUG: unable to handle page fault for address: 00007f4801111000\nPGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0\nOops: 0002 [#1] PREEMPT SMP PTI\nHardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023\nRIP: 0010:memcpy_orig+0xcd/0x130\nRSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202\nRAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f\nRDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000\nRBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572\nR10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff\nR13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af\nFS: 00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __die_body+0x1a/0x60\n ? page_fault_oops+0x183/0x510\n ? exc_page_fault+0x69/0x150\n ? asm_exc_page_fault+0x22/0x30\n ? memcpy_orig+0xcd/0x130\n vsnprintf+0x102/0x4c0\n sprintf+0x51/0x80\n qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]\n full_proxy_read+0x50/0x80\n vfs_read+0xa5/0x2e0\n ? folio_add_new_anon_rmap+0x44/0xa0\n ? set_pte_at+0x15/0x30\n ? do_pte_missing+0x426/0x7f0\n ksys_read+0xa5/0xe0\n do_syscall_64+0x58/0x80\n ? __count_memcg_events+0x46/0x90\n ? count_memcg_event_mm+0x3d/0x60\n ? handle_mm_fault+0x196/0x2f0\n ? do_user_addr_fault+0x267/0x890\n ? exc_page_fault+0x69/0x150\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f4800f20b4d", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: scsi: qedi: Fix crash while reading debugfs attribute", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40978" }, { "category": "external", "summary": "RHBZ#2297562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297562" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40978" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40978", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40978" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024071231-CVE-2024-40978-d135@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024071231-CVE-2024-40978-d135@gregkh/T" } ], "release_date": "2024-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: scsi: qedi: Fix crash while reading debugfs attribute" }, { "cve": "CVE-2024-41090", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2299240" } ], "notes": [ { "category": "description", "text": "A denial of service (DoS) attack was found in the mlx5 driver in the Linux kernel. A KVM guest VM using virtio-net can crash the host by sending a short packet, for example, size \u003c ETH_HLEN. The packet may traverse through vhost-net, macvtap, and vlan without any validation or drop. When this packet is presented to the mlx5 driver on the host side, the kernel panic happens since mlx5_core assumes the frame size is always \u003e= ETH_HLEN.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: virtio-net: tap: mlx5_core short frame denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-41090" }, { "category": "external", "summary": "RHBZ#2299240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-41090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41090" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41090", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41090" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024072916-CVE-2024-41090-9830@gregkh", "url": "https://lore.kernel.org/linux-cve-announce/2024072916-CVE-2024-41090-9830@gregkh" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/07/24/4", "url": "https://www.openwall.com/lists/oss-security/2024/07/24/4" } ], "release_date": "2024-07-24T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: virtio-net: tap: mlx5_core short frame denial of service" }, { "cve": "CVE-2024-41091", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2299336" } ], "notes": [ { "category": "description", "text": "A denial of service (DoS) attack was found in the mlx5 driver in the Linux kernel. A KVM guest VM using virtio-net can crash the host by sending a short packet, for example, size \u003c ETH_HLEN. The packet may traverse through vhost-net, macvtap, and vlan without any validation or drop. When this packet is presented to the mlx5 driver on the host side, the kernel panic happens since mlx5_core assumes the frame size is always \u003e= ETH_HLEN.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: virtio-net: tun: mlx5_core short frame denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-41091" }, { "category": "external", "summary": "RHBZ#2299336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-41091", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41091" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41091", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41091" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024072918-CVE-2024-41091-35b7@gregkh", "url": "https://lore.kernel.org/linux-cve-announce/2024072918-CVE-2024-41091-35b7@gregkh" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/07/24/4", "url": "https://www.openwall.com/lists/oss-security/2024/07/24/4" } ], "release_date": "2024-07-24T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T00:13:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5256" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "NFV-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "NFV-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.src", "RT-9.0.0.Z.E4S:kernel-rt-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-core-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debug-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-devel-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-kvm-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64", "RT-9.0.0.Z.E4S:kernel-rt-modules-extra-0:5.14.0-70.112.1.rt21.184.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: virtio-net: tun: mlx5_core short frame denial of service" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.