Lucene search

K
redhatRedHatRHSA-2024:3421
HistoryMay 28, 2024 - 1:04 p.m.

(RHSA-2024:3421) Important: kernel security and bug fix update

2024-05-2813:04:19
access.redhat.com
21
kernel
security
vulnerability
bug fix
linux
cve-2023-6240
cve-2024-1086
cve-2024-26586
cve-2024-25743
cve-2023-52628
cve-2023-4244
cve-2023-6817
jira:rhel-32889

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

EPSS

0.003

Percentile

69.6%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240)

  • kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086)

  • kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption (CVE-2024-26586)

  • CVE-2024-25743 hw: amd: Instruction raise #VC exception at exit (AMD-SN-3008,CVE-2024-25742,CVE-2024-25743)

  • kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write (CVE-2023-52628)

  • kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction (CVE-2023-4244)

  • kernel: inactive elements in nft_pipapo_walk (CVE-2023-6817)

Bug Fix(es):

  • kdump 2nd kernel panic in call trace tick_handle_periodic (JIRA:RHEL-32889)

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

EPSS

0.003

Percentile

69.6%