[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256488

 
 

909

 
 

199193

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2024:2004 -- Redhat kernel, bpftool, perf, python-perf

ID: oval:org.secpod.oval:def:509217Date: (C)2024-05-23   (M)2024-06-24
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. Security fixes: kernel: use after free in unix_stream_sendpage Kernel: bluetooth: Unauthorized management command execution kernel: irdma: Improper access control kernel: net/sched: sch_hfsc UAF kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference This update also fixes the following bugs: NFS client closes active connection kernel panic at __list_del_entry from smb2_reconnect_server kernel: race condition when call to VT_RESIZEX ioctl and vc_cons[i].d is already NULL, causing a NULL pointer dereference. kernel: net/sched: sch_hfsc UAF kernel: irdma: Improper access control The message in RHEL 7 ?stack-protector: Kernel stack is corrupted in:? is triggered because perf_trace_buf_prepare does not verify that per_cpu array perf_trace_buf has allocated per_cpu buffers in it. [rhel7] gfs2: Invalid metadata access in punch_hole UDP packets dropped due to SELinux denial Boot fails with kernel panic at acpi_device_hid+0x6 For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

Platform:
Red Hat Enterprise Linux 7
Product:
kernel
bpftool
perf
python-perf
Reference:
RHSA-2024:2004
CVE-2023-4622
CVE-2023-2002
CVE-2023-25775
CVE-2023-4623
CVE-2020-36558
CVE    5
CVE-2020-36558
CVE-2023-2002
CVE-2023-25775
CVE-2023-4622
...
CPE    5
cpe:/o:linux:linux_kernel
cpe:/o:redhat:enterprise_linux:7
cpe:/a:perf:perf
cpe:/a:python-perf:python-perf
...

© SecPod Technologies