{"id":"RLSA-2024:8162","summary":"Moderate: kernel security update","details":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Local information disclosure on Intel(R) Atom(R) processors (CVE-2023-28746)\n\n* kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow (CVE-2024-27403)\n\n* kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34; (CVE-2023-52658)\n\n* kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (CVE-2024-35989)\n\n* kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47385)\n\n* kernel: mptcp: ensure snd_nxt is properly initialized on connect (CVE-2024-36889)\n\n* kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978)\n\n* kernel: net/mlx5: Add a timeout to acquire the command queue semaphore (CVE-2024-38556)\n\n* kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (CVE-2024-39483)\n\n* kernel: ionic: fix use after netif_napi_del() (CVE-2024-39502)\n\n* kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (CVE-2024-40959)\n\n* kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079)\n\n* kernel: sched: act_ct: take care of padding in struct zones_ht_key (CVE-2024-42272)\n\n* kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-05T02:45:08.661115Z","published":"2024-10-25T17:17:17.459405Z","upstream":["CVE-2021-47385","CVE-2023-28746","CVE-2023-52658","CVE-2024-27403","CVE-2024-35989","CVE-2024-36889","CVE-2024-36978","CVE-2024-38556","CVE-2024-39483","CVE-2024-39502","CVE-2024-40959","CVE-2024-42079","CVE-2024-42272","CVE-2024-42284"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:8162"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281127"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281149"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281847"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282355"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284571"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293078"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293443"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295921"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297474"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297543"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300517"}],"affected":[{"package":{"name":"kernel","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/kernel?distro=rocky-linux-9&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.40.1.el9_4"}],"database_specific":{"yum_repository":"RT"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:8162.json"}}],"schema_version":"1.7.3","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}