drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
RHSA-2025:3510 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux BaseOS EUS (v.9.4), Red Hat Enterprise Linux AppStream EUS (v.9.4), Red Hat CodeReady Linux Builder EUS (v.9.4), Red Hat Enterprise Linux Real Time for NFV EUS (v.9.4), Red Hat Enterprise Linux Real Time EUS (v.9.4) |
|
Datum: |
Mi, 2. April 2025, 23:00 |
|
Referenzen: |
https://access.redhat.com/security/cve/CVE-2024-26976
https://access.redhat.com/security/cve/CVE-2024-35925
https://bugzilla.redhat.com/show_bug.cgi?id=2281693
https://access.redhat.com/security/cve/CVE-2024-27410
https://bugzilla.redhat.com/show_bug.cgi?id=2278350
https://access.redhat.com/errata/RHSA-2025:3510
https://bugzilla.redhat.com/show_bug.cgi?id=2281215
https://bugzilla.redhat.com/show_bug.cgi?id=2281752
https://access.redhat.com/security/cve/CVE-2024-23848
https://access.redhat.com/security/cve/CVE-2024-35888
https://bugzilla.redhat.com/show_bug.cgi?id=2281113
https://access.redhat.com/security/cve/CVE-2024-35810
https://bugzilla.redhat.com/show_bug.cgi?id=2327168
https://access.redhat.com/security/cve/CVE-2024-27010
https://access.redhat.com/security/cve/CVE-2024-50264
https://bugzilla.redhat.com/show_bug.cgi?id=2278515
https://access.redhat.com/security/cve/CVE-2023-52653
https://bugzilla.redhat.com/show_bug.cgi?id=2260038
https://bugzilla.redhat.com/show_bug.cgi?id=2278279 |
|
Applikationen: |
Linux |
|
Originalnachricht |
An update for kernel is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in cec_queue_msg_fh (CVE-2024-23848)
* kernel: net/sched: Fix mirred deadlock on device recursion (CVE-2024-27010)
* kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976)
* kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653)
* kernel: wifi: nl80211: reject iftype change with mesh ID change (CVE-2024-27410)
* kernel: drm/vmwgfx: Fix the lifetime of the bo cursor memory (CVE-2024-35810)
* kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888)
* kernel: block: prevent division by zero in blk_rq_stat_sum() (CVE-2024-35925)
* kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (CVE-2024-50264)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
CVE-2023-52653 CVE-2024-23848: Use After Free (CWE-416) CVE-2024-26976 CVE-2024-27010 CVE-2024-27410 CVE-2024-35810 CVE-2024-35888 CVE-2024-35925 CVE-2024-50264: Use After Free (CWE-416)
|
|
|
|