Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-18262

kernel update [RHEL 9.4 5.14.0-427.37.1.el9_4]

    XMLWordPrintable

Details

    • Improvement
    • Resolution: Won't Fix
    • Minor
    • None
    • Lustre 2.16.0, Lustre 2.15.6
    • None
    • 3
    • 9223372036854775807

    Description

      Security Fix(es):

      • kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439)
      • kernel: net/sched: act_mirred: don't override retval if we already lost the skb (CVE-2024-26739)
      • kernel: ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses (CVE-2024-26947)
      • kernel: scsi: qla2xxx: Fix command flush on cable pull (CVE-2024-26931)
      • kernel: scsi: qla2xxx: Fix double free of the ha->vp_map pointer (CVE-2024-26930)
      • kernel: scsi: qla2xxx: Fix double free of fcport (CVE-2024-26929)
      • kernel: fork: defer linking file vma until vma is fully initialized (CVE-2024-27022)
      • kernel: KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes (CVE-2024-26991)
      • kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem (CVE-2024-35895)
      • kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (CVE-2024-36016)
      • kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (CVE-2024-36899)
      • kernel: cpufreq: exit() callback is optional (CVE-2024-38615)
      • kernel: ring-buffer: Fix a race between readers and resize checks (CVE-2024-38601)
      • kernel: cppc_cpufreq: Fix possible null pointer dereference (CVE-2024-38573)
      • kernel: gfs2: Fix potential glock use-after-free on unmount (CVE-2024-38570)
      • kernel: wifi: nl80211: Avoid address calculations via out of bounds array indexing (CVE-2024-38562)
      • kernel: Input: cyapa - add missing input core locking to suspend/resume functions (CVE-2023-52884)
      • kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." (CVE-2024-40984)
      • kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing (CVE-2024-41071)
      • kernel: wifi: mt76: replace skb_put with skb_put_zero (CVE-2024-42225)
      • kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket (CVE-2024-42246)

      https://access.redhat.com/errata/RHSA-2024:6997?sc_cid=701600000006NHXAA2

      Attachments

        Issue Links

          Activity

            People

              yujian Jian Yu
              yujian Jian Yu
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: