RHSA-2024:0897 -- Redhat kernel, bpftool, perf, python3-perfID: oval:org.secpod.oval:def:509091 | Date: (C)2024-03-12 (M)2024-04-29 |
Class: PATCH | Family: unix |
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: kernel: net/sched: sch_hfsc UAF kernel: use-after-free in sch_qfq network scheduler kernel: inactive elements in nft_pipapo_walk kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination kernel: nfp: use-after-free in area_cache_get kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: HID: check empty report_list in hid_validate_values kernel: Possible use-after-free since the two fdget during vhost_net_set_backend kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child"s sibling_list kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: SEV-ES local priv escalation For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.
Platform: |
Red Hat Enterprise Linux 8 |
Product: |
kernel |
bpftool |
perf |
python3-perf |