Lucene search

K
redhatRedHatRHSA-2024:2621
HistoryApr 30, 2024 - 4:31 p.m.

(RHSA-2024:2621) Important: kernel security, bug fix, and enhancement update

2024-04-3016:31:58
access.redhat.com
5
kernel
security
bug fix
enhancement
l2cap_conn_del
l2cap_parse_conf_req
gsm multiplexing
ext4_write_inline_data_end
privilege escalation
tx-checksumming
ceph
smsc95xx
qeth driver

8.8 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

5.8 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

49.8%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)

  • kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c (CVE-2022-42895)

  • kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527)

  • kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631)

  • kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744)

Bug Fix(es):

  • kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (JIRA:RHEL-18806)

  • tx-checksumming required for accessing port in OpenShift for RHEL 8.6 (JIRA:RHEL-20821)

  • ceph: several cap and snap fixes (JIRA:RHEL-20908)

  • unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:RHEL-25718)

  • [RHEL8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:RHEL-26100)

  • kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:RHEL-26330)

  • kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c (JIRA:RHEL-18808)

  • kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:RHEL-19953)

Enhancement(s):

  • [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:RHEL-25810)

8.8 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

5.8 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

49.8%