{"id":"RLSA-2024:4583","summary":"Important: kernel security update","details":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)\n\n* kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() (CVE-2021-47548)\n\n* kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg (CVE-2021-47596)\n\n* kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627)\n\n* kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (CVE-2023-52638)\n\n* kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index (CVE-2024-26783)\n\n* kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (CVE-2024-26858)\n\n* kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)\n\n* kernel: nvme: fix reconnection fail due to reserved tag allocation (CVE-2024-27435)\n\n* kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958)\n\n* kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). (CVE-2024-36904)\n\n* kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (CVE-2024-38543)\n\n* kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586)\n\n* kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 (CVE-2024-38593)\n\n* kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270)\n\n* kernel: octeontx2-af: avoid off-by-one read from userspace (CVE-2024-36957)\n\n* kernel: blk-cgroup: fix list corruption from resetting io stat (CVE-2024-38663)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-05T08:45:19.402840Z","published":"2024-07-26T12:33:50.717957Z","upstream":["CVE-2021-47548","CVE-2021-47596","CVE-2022-48627","CVE-2023-52638","CVE-2024-26783","CVE-2024-26858","CVE-2024-27397","CVE-2024-27435","CVE-2024-35958","CVE-2024-36270","CVE-2024-36886","CVE-2024-36904","CVE-2024-36957","CVE-2024-38543","CVE-2024-38586","CVE-2024-38593","CVE-2024-38663"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:4583"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267509"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273082"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273466"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275735"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277238"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281131"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281925"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283401"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284541"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284581"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293230"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293380"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293402"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293456"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2294225"}],"affected":[{"package":{"name":"kernel","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/kernel?distro=rocky-linux-9&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.26.1.el9_4"}],"database_specific":{"yum_repository":"RT"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:4583.json"}}],"schema_version":"1.7.3","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}