[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2024:1248 -- Redhat kernel, bpftool, perf, python3-perf, rtla, rv

ID: oval:org.secpod.oval:def:509126Date: (C)2024-03-25   (M)2024-04-25
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: kernel: inactive elements in nft_pipapo_walk kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child"s sibling_list kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

Platform:
Red Hat Enterprise Linux 9
Product:
kernel
bpftool
perf
python3-perf
rtla
rv
Reference:
RHSA-2024:1248
CVE-2023-6817
CVE-2024-0193
CVE-2024-0646
CVE-2023-4244
CVE-2023-5717
CVE-2023-6356
CVE-2023-6535
CVE-2023-6536
CVE-2023-6606
CVE-2023-6610
CVE-2023-51042
CVE    11
CVE-2023-4244
CVE-2023-5717
CVE-2024-0193
CVE-2023-6606
...

© SecPod Technologies