{"id":"RLSA-2024:8617","summary":"Moderate: kernel security update","details":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: intel: Native Branch History Injection (BHI) (CVE-2024-2201)\n\n* kernel: tcp: add sanity checks to rx zerocopy (CVE-2024-26640)\n\n* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)\n\n* kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923)\n\n* kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del (CVE-2024-26961)\n\n* kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935)\n\n* kernel: tty: Fix out-of-bound vmalloc access in imageblit (CVE-2021-47383)\n\n* kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too (CVE-2024-36244)\n\n* kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup (CVE-2024-39472)\n\n* kernel: netfilter: nft_inner: validate mandatory meta and payload (CVE-2024-39504)\n\n* kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CVE-2024-40904)\n\n* kernel: mptcp: ensure snd_una is properly initialized on connect (CVE-2024-40931)\n\n* kernel: ipv6: prevent possible NULL dereference in rt6_probe() (CVE-2024-40960)\n\n* kernel: ext4: do not create EA inode under buffer lock (CVE-2024-40972)\n\n* kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CVE-2024-40977)\n\n* kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995)\n\n* kernel: ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super() (CVE-2024-40998)\n\n* kernel: netpoll: Fix race condition in netpoll_owner_active (CVE-2024-41005)\n\n* kernel: xfs: don&#39;t walk off the end of a directory data block (CVE-2024-41013)\n\n* kernel: xfs: add bounds checking to xlog_recover_process_data (CVE-2024-41014)\n\n* kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854)\n\n* kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-04T16:00:11.285233Z","published":"2024-11-08T15:57:49.260064Z","upstream":["CVE-2021-47383","CVE-2024-2201","CVE-2024-26640","CVE-2024-26826","CVE-2024-26923","CVE-2024-26935","CVE-2024-26961","CVE-2024-36244","CVE-2024-39472","CVE-2024-39504","CVE-2024-40904","CVE-2024-40931","CVE-2024-40960","CVE-2024-40972","CVE-2024-40977","CVE-2024-40995","CVE-2024-40998","CVE-2024-41005","CVE-2024-41013","CVE-2024-41014","CVE-2024-43854","CVE-2024-45018"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:8617"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268118"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270100"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275604"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277171"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278176"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282357"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293654"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2296067"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297476"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297515"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297561"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297579"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297582"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297589"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300296"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300297"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2311715"}],"affected":[{"package":{"name":"kernel","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/kernel?distro=rocky-linux-9&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.42.1.el9_4"}],"database_specific":{"yum_repository":"RT"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:8617.json"}}],"schema_version":"1.7.3","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}