RHSA-2024:2004 -- Redhat kernel, bpftool, perf, python-perfID: oval:org.secpod.oval:def:509217 | Date: (C)2024-05-23 (M)2024-06-24 |
Class: PATCH | Family: unix |
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security fixes: kernel: use after free in unix_stream_sendpage Kernel: bluetooth: Unauthorized management command execution kernel: irdma: Improper access control kernel: net/sched: sch_hfsc UAF kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference This update also fixes the following bugs: NFS client closes active connection kernel panic at __list_del_entry from smb2_reconnect_server kernel: race condition when call to VT_RESIZEX ioctl and vc_cons[i].d is already NULL, causing a NULL pointer dereference. kernel: net/sched: sch_hfsc UAF kernel: irdma: Improper access control The message in RHEL 7 ?stack-protector: Kernel stack is corrupted in:? is triggered because perf_trace_buf_prepare does not verify that per_cpu array perf_trace_buf has allocated per_cpu buffers in it. [rhel7] gfs2: Invalid metadata access in punch_hole UDP packets dropped due to SELinux denial Boot fails with kernel panic at acpi_device_hid+0x6 For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.
Platform: |
Red Hat Enterprise Linux 7 |
Product: |
kernel |
bpftool |
perf |
python-perf |