[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RLSA-2024:1607 --- bpftool

ID: oval:org.secpod.oval:def:4501552Date: (C)2024-05-21   (M)2024-06-19
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query * kernel: Out of boundary write in perf_read_group as result of overflow a perf_event"s read_size * kernel: GSM multiplexing race condition leads to privilege escalation * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c * kernel: ext4: kernel bug in ext4_write_inline_data_end * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init function Bug Fix: * OCP 4.12 crashed due to use-after-free in libceph in rhel8 * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init function * Screen floods with random colour suggesting something not initialised * kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query * tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client * kernel: Out of boundary write in perf_read_group as result of overflow a perf_event"s read_size * rbd: don"t move requests to the running list on errors [8.x] * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c * ceph: several cap and snap fixes * [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release * unable to access smsc95xx based interface unless you start outgoing traffic. * [Rocky Linux8] ] BUG bio-696 : Poison overwritten * kernel: GSM multiplexing race condition leads to privilege escalation * backport smartpqi: fix disable_managed_interrupts * kernel: ext4: kernel bug in ext4_write_inline_data_end * ceph: always check dir caps asynchronously Enhancement: * [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4

Platform:
Rocky Linux 8
Product:
bpftool
kernel
perf
python3-perf
Reference:
RLSA-2024:1607
CVE-2021-33631
CVE-2022-38096
CVE-2023-51042
CVE-2023-6546
CVE-2023-6931
CVE-2024-0565
CVE-2024-1086
CVE    7
CVE-2022-38096
CVE-2023-6546
CVE-2021-33631
CVE-2023-51042
...

© SecPod Technologies