[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2024:2394 -- Redhat kernel, bpftool, perf, python3-perf, rtla, rv

ID: oval:org.secpod.oval:def:509299Date: (C)2024-05-17   (M)2024-05-29
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: kernel: GSM multiplexing race condition leads to privilege escalation kernel: multiple use-after-free vulnerabilities kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion kernel: multiple NULL pointer dereference vulnerabilities kernel: integer overflow in l2cap_config_req in net/bluetooth/l2cap_core.c kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable kernel: GC"s deletion of an SKB races with unix_stream_read_generic leading to UAF kernel: Out of boundary write in perf_read_group as result of overflow a perf_event"s read_size kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses kernel: irdma: Improper access control Kernel: double free in hci_conn_cleanup of the bluetooth subsystem kernel: Bluetooth: HCI: global out-of-bounds access in net/bluetooth/hci_sync.c kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl kernel: multiple out-of-bounds read vulnerabilities kernel: netfilter: race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write kernel: smb: client: fix potential OOBs in smb2_parse_contexts kernel: mm/sparsemem: fix race in accessing memory_section-

Platform:
Red Hat Enterprise Linux 9
Product:
kernel
bpftool
perf
python3-perf
rtla
rv
Reference:
RHSA-2024:2394
CVE-2023-6546
CVE-2024-1086
CVE-2023-3567
CVE-2023-4133
CVE-2023-6932
CVE-2023-39198
CVE-2023-51043
CVE-2023-51779
CVE-2023-51780
CVE-2024-1085
CVE-2024-26582
CVE-2020-26555
CVE-2022-0480
CVE-2022-38096
CVE-2023-6622
CVE-2023-6915
CVE-2023-42754
CVE-2023-46862
CVE-2023-52574
CVE-2024-0841
CVE-2023-52448
CVE-2022-45934
CVE-2023-6040
CVE-2023-6531
CVE-2023-6931
CVE-2023-24023
CVE-2023-25775
CVE-2023-28464
CVE-2023-28866
CVE-2023-31083
CVE-2023-37453
CVE-2023-39189
CVE-2023-39193
CVE-2023-6121
CVE-2023-39194
CVE-2023-42756
CVE-2023-45863
CVE-2023-52434
CVE-2023-52489
CVE-2023-52522
CVE-2023-52529
CVE-2023-52581
CVE-2023-52578
CVE-2023-52580
CVE-2023-52610
CVE-2024-0565
CVE-2024-26583
CVE-2024-26584
CVE-2024-26585
CVE-2024-26586
CVE-2024-26593
CVE-2024-26602
CVE-2024-26609
CVE-2023-6176
CVE-2023-52476
CVE-2023-52620
CVE-2024-26633
CVE    57
CVE-2023-28866
CVE-2023-28464
CVE-2023-31083
CVE-2020-26555
...
CPE    5
cpe:/a:bpf:bpftool
cpe:/a:python-perf:python3-perf
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
...

© SecPod Technologies