what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2024-3618-03

Red Hat Security Advisory 2024-3618-03
Posted Jun 6, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-3618-03 - An update for kernel is now available for Red Hat Enterprise Linux 8. Issues addressed include information leakage, integer overflow, memory leak, out of bounds read, and use-after-free vulnerabilities.

tags | advisory, overflow, kernel, vulnerability, memory leak
systems | linux, redhat
advisories | CVE-2019-25162
SHA-256 | 2636e8256200ba4a8ab28e8dd0b0ee7243ccb13e39490f4ed6fc0b4105e8c8a1

Red Hat Security Advisory 2024-3618-03

Change Mirror Download


The following advisory data is extracted from:

https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_3618.json

Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.

- Packet Storm Staff




====================================================================
Red Hat Security Advisory

Synopsis: Moderate: kernel update
Advisory ID: RHSA-2024:3618-03
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2024:3618
Issue date: 2024-06-05
Revision: 03
CVE Names: CVE-2019-25162
====================================================================

Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.




Description:

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: Marvin vulnerability side-channel leakage in the RSA decryption
operation (CVE-2023-6240)

* kernel: Information disclosure in vhost/vhost.c:vhost_new_msg()
(CVE-2024-0340)

* kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744)

* kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593)

* kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445)

* kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer
that cause loop forever (CVE-2024-26603)

* kernel: use after free in i2c (CVE-2019-25162)

* kernel: i2c: validate user data in compat ioctl (CVE-2021-46934)

* kernel: media: dvbdev: Fix memory leak in dvb_media_device_free()
(CVE-2020-36777)

* kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors
(CVE-2023-52477)

* kernel: mtd: require write permissions for locking and badblock ioctls
(CVE-2021-47055)

* kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump
(CVE-2024-26615)

* kernel: vt: fix memory overlapping when deleting chars in the buffer
(CVE-2022-48627)

* kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307)

* kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu()
(CVE-2023-52565)

* kernel: net: bridge: data races indata-races in br_handle_frame_finish()
(CVE-2023-52578)

* kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
(CVE-2023-52528)

* kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520)

* kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513)

* kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118)

* kernel: net/sched: act_ct: fix skb leak and crash on ooo frags
(CVE-2023-52610)

* kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set
with timeout (CVE-2024-26643)

* kernel: netfilter: nf_tables: disallow anonymous set with timeout flag
(CVE-2024-26642)

* kernel: i2c: i801: Don't generate an interrupt on bus reset
(CVE-2021-47153)

* kernel: xhci: handle isoc Babble and Buffer Overrun events properly
(CVE-2024-26659)

* kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664)

* kernel: wifi: mac80211: fix race condition on enabling fast-xmit
(CVE-2024-26779)

* kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter
(CVE-2024-26744)

* kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743)

* kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
(CVE-2021-47185)

* kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
(CVE-2024-26901)

* kernel: RDMA/srpt: Do not register event handler until srpt device is fully
setup (CVE-2024-26872)

* kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919)

* kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964)

* kernel: USB: core: Fix deadlock in usb_deauthorize_interface()
(CVE-2024-26934)

* kernel: USB: core: Fix deadlock in port "disable" sysfs attribute
(CVE-2024-26933)

* kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()
(CVE-2024-26993)

* kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973)

* kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
(CVE-2024-27059)

* kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013)

* kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171)

* kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669)

* kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439)

* kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594)

* kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595)


Solution:

https://access.redhat.com/articles/11258



CVEs:

CVE-2019-25162

References:

https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2250843
https://bugzilla.redhat.com/show_bug.cgi?id=2257406
https://bugzilla.redhat.com/show_bug.cgi?id=2263875
https://bugzilla.redhat.com/show_bug.cgi?id=2265271
https://bugzilla.redhat.com/show_bug.cgi?id=2265646
https://bugzilla.redhat.com/show_bug.cgi?id=2265654
https://bugzilla.redhat.com/show_bug.cgi?id=2265833
https://bugzilla.redhat.com/show_bug.cgi?id=2266296
https://bugzilla.redhat.com/show_bug.cgi?id=2266446
https://bugzilla.redhat.com/show_bug.cgi?id=2266746
https://bugzilla.redhat.com/show_bug.cgi?id=2266841
https://bugzilla.redhat.com/show_bug.cgi?id=2267038
https://bugzilla.redhat.com/show_bug.cgi?id=2267185
https://bugzilla.redhat.com/show_bug.cgi?id=2267355
https://bugzilla.redhat.com/show_bug.cgi?id=2267509
https://bugzilla.redhat.com/show_bug.cgi?id=2267705
https://bugzilla.redhat.com/show_bug.cgi?id=2267724
https://bugzilla.redhat.com/show_bug.cgi?id=2267758
https://bugzilla.redhat.com/show_bug.cgi?id=2267789
https://bugzilla.redhat.com/show_bug.cgi?id=2267797
https://bugzilla.redhat.com/show_bug.cgi?id=2267804
https://bugzilla.redhat.com/show_bug.cgi?id=2268291
https://bugzilla.redhat.com/show_bug.cgi?id=2268293
https://bugzilla.redhat.com/show_bug.cgi?id=2268309
https://bugzilla.redhat.com/show_bug.cgi?id=2268315
https://bugzilla.redhat.com/show_bug.cgi?id=2268317
https://bugzilla.redhat.com/show_bug.cgi?id=2269213
https://bugzilla.redhat.com/show_bug.cgi?id=2269856
https://bugzilla.redhat.com/show_bug.cgi?id=2270080
https://bugzilla.redhat.com/show_bug.cgi?id=2270879
https://bugzilla.redhat.com/show_bug.cgi?id=2270881
https://bugzilla.redhat.com/show_bug.cgi?id=2271469
https://bugzilla.redhat.com/show_bug.cgi?id=2271476
https://bugzilla.redhat.com/show_bug.cgi?id=2272780
https://bugzilla.redhat.com/show_bug.cgi?id=2272791
https://bugzilla.redhat.com/show_bug.cgi?id=2273092
https://bugzilla.redhat.com/show_bug.cgi?id=2273094
https://bugzilla.redhat.com/show_bug.cgi?id=2273223
https://bugzilla.redhat.com/show_bug.cgi?id=2273260
https://bugzilla.redhat.com/show_bug.cgi?id=2273262
https://bugzilla.redhat.com/show_bug.cgi?id=2274624
https://bugzilla.redhat.com/show_bug.cgi?id=2275645
https://bugzilla.redhat.com/show_bug.cgi?id=2275655
https://bugzilla.redhat.com/show_bug.cgi?id=2275666
https://bugzilla.redhat.com/show_bug.cgi?id=2275707
https://bugzilla.redhat.com/show_bug.cgi?id=2275777
https://bugzilla.redhat.com/show_bug.cgi?id=2278169
https://bugzilla.redhat.com/show_bug.cgi?id=2278237
https://bugzilla.redhat.com/show_bug.cgi?id=2278240
https://bugzilla.redhat.com/show_bug.cgi?id=2278268
https://bugzilla.redhat.com/show_bug.cgi?id=2278314
https://bugzilla.redhat.com/show_bug.cgi?id=2278356
https://bugzilla.redhat.com/show_bug.cgi?id=2278398
https://bugzilla.redhat.com/show_bug.cgi?id=2278409
https://bugzilla.redhat.com/show_bug.cgi?id=2278417
https://bugzilla.redhat.com/show_bug.cgi?id=2278431
https://bugzilla.redhat.com/show_bug.cgi?id=2278537
https://issues.redhat.com/browse/RHEL-35576

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close