RHSA-2024:1249 -- Redhat kernel, bpftool, perf, python-perfID: oval:org.secpod.oval:def:509138 | Date: (C)2024-03-25 (M)2024-04-25 |
Class: PATCH | Family: unix |
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: use-after-free in sch_qfq network scheduler kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init function For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: [rhel-7] INFO: possible circular locking dependency detected: store+0x70/0xe0 kernfs_fop_write+0xe3/0x190 qedf: Reading /sys/kernel/debug/qedf/hostX/stop_io_on_error can cause panic
Platform: |
Red Hat Enterprise Linux 7 |
Product: |
kernel |
bpftool |
perf |
python-perf |