Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: RHSA-2025:3510
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux BaseOS EUS (v.9.4), Red Hat Enterprise Linux AppStream EUS (v.9.4), Red Hat CodeReady Linux Builder EUS (v.9.4), Red Hat Enterprise Linux Real Time for NFV EUS (v.9.4), Red Hat Enterprise Linux Real Time EUS (v.9.4)
Datum: Mi, 2. April 2025, 23:00
Referenzen: https://access.redhat.com/security/cve/CVE-2024-26976
https://access.redhat.com/security/cve/CVE-2024-35925
https://bugzilla.redhat.com/show_bug.cgi?id=2281693
https://access.redhat.com/security/cve/CVE-2024-27410
https://bugzilla.redhat.com/show_bug.cgi?id=2278350
https://access.redhat.com/errata/RHSA-2025:3510
https://bugzilla.redhat.com/show_bug.cgi?id=2281215
https://bugzilla.redhat.com/show_bug.cgi?id=2281752
https://access.redhat.com/security/cve/CVE-2024-23848
https://access.redhat.com/security/cve/CVE-2024-35888
https://bugzilla.redhat.com/show_bug.cgi?id=2281113
https://access.redhat.com/security/cve/CVE-2024-35810
https://bugzilla.redhat.com/show_bug.cgi?id=2327168
https://access.redhat.com/security/cve/CVE-2024-27010
https://access.redhat.com/security/cve/CVE-2024-50264
https://bugzilla.redhat.com/show_bug.cgi?id=2278515
https://access.redhat.com/security/cve/CVE-2023-52653
https://bugzilla.redhat.com/show_bug.cgi?id=2260038
https://bugzilla.redhat.com/show_bug.cgi?id=2278279
Applikationen: Linux

Originalnachricht

An update for kernel is now available for Red Hat Enterprise Linux 9.4 Extended
Update Support.

Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

* kernel: use-after-free in cec_queue_msg_fh (CVE-2024-23848)

* kernel: net/sched: Fix mirred deadlock on device recursion (CVE-2024-27010)

* kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed
(CVE-2024-26976)

* kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653)

* kernel: wifi: nl80211: reject iftype change with mesh ID change
(CVE-2024-27410)

* kernel: drm/vmwgfx: Fix the lifetime of the bo cursor memory (CVE-2024-35810)

* kernel: erspan: make sure erspan_base_hdr is present in skb->head
(CVE-2024-35888)

* kernel: block: prevent division by zero in blk_rq_stat_sum() (CVE-2024-35925)

* kernel: vsock/virtio: Initialization of the dangling pointer occurring in
vsk->trans (CVE-2024-50264)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2023-52653
CVE-2024-23848: Use After Free (CWE-416)
CVE-2024-26976
CVE-2024-27010
CVE-2024-27410
CVE-2024-35810
CVE-2024-35888
CVE-2024-35925
CVE-2024-50264: Use After Free (CWE-416)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung