[FEDORA-2024-2116a8468b] Fedora 39: kernel, kernel-headers
Severity
High
Affected Packages
2
CVEs
3
The 6.7.3 stable kernel rebase contains new features, improved hardware support,
and a number of important fixes across the tree.
Package | Affected Version |
---|---|
pkg:rpm/fedora/kernel?distro=fedora-39 | < 6.7.3.200.fc39 |
pkg:rpm/fedora/kernel-headers?distro=fedora-39 | < 6.7.3.200.fc39 |
- ID
- FEDORA-2024-2116a8468b
- Severity
- high
- Severity from
- CVE-2024-1086
- URL
- https://bodhi.fedoraproject.org/updates/FEDORA-2024-2116a8468b
- Published
-
2024-02-06T01:18:52
(7 months ago) - Modified
-
2024-02-06T01:18:52
(7 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALAS-2024-1919
- ALAS-2024-1923
- ALAS2-2024-2453
- ALAS2-2024-2475
- ALSA-2024:1607
- CISA-2024:0530
- DSA-5681-1
- ELSA-2024-0461
- ELSA-2024-12149
- ELSA-2024-12255
- ELSA-2024-12256
- ELSA-2024-12257
- ELSA-2024-12258
- ELSA-2024-12259
- ELSA-2024-12260
- ELSA-2024-12265
- ELSA-2024-12266
- ELSA-2024-12270
- ELSA-2024-12271
- ELSA-2024-12274
- ELSA-2024-12275
- ELSA-2024-12378
- ELSA-2024-1249
- ELSA-2024-1607
- ELSA-2024-2394
- FEDORA-2024-cf47b35a6c
- RHSA-2024:1249
- RHSA-2024:1332
- RHSA-2024:1607
- RHSA-2024:1614
- RHSA-2024:4073
- RLSA-2024:1607
- SSA:2024-157-01
- SUSE-SU-2024:0463-1
- SUSE-SU-2024:0468-1
- SUSE-SU-2024:0469-1
- SUSE-SU-2024:0474-1
- SUSE-SU-2024:0476-1
- SUSE-SU-2024:0478-1
- SUSE-SU-2024:0483-1
- SUSE-SU-2024:0484-1
- SUSE-SU-2024:0514-1
- SUSE-SU-2024:0515-1
- SUSE-SU-2024:0516-1
- SUSE-SU-2024:0855-1
- SUSE-SU-2024:0856-1
- SUSE-SU-2024:0857-1
- SUSE-SU-2024:0858-1
- SUSE-SU-2024:0900-1
- SUSE-SU-2024:0900-2
- SUSE-SU-2024:0910-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0926-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:0976-1
- SUSE-SU-2024:0977-1
- SUSE-SU-2024:1358-1
- SUSE-SU-2024:1359-1
- SUSE-SU-2024:1364-1
- SUSE-SU-2024:1373-1
- SUSE-SU-2024:1380-1
- SUSE-SU-2024:1382-1
- SUSE-SU-2024:1386-1
- SUSE-SU-2024:1388-1
- SUSE-SU-2024:1390-1
- SUSE-SU-2024:1400-1
- SUSE-SU-2024:1401-1
- SUSE-SU-2024:1405-1
- SUSE-SU-2024:1406-1
- SUSE-SU-2024:1410-1
- SUSE-SU-2024:1418-1
- SUSE-SU-2024:1493-1
- SUSE-SU-2024:1505-1
- SUSE-SU-2024:1506-1
- SUSE-SU-2024:1537-1
- SUSE-SU-2024:1545-1
- SUSE-SU-2024:1551-1
- SUSE-SU-2024:1554-1
- SUSE-SU-2024:1558-1
- SUSE-SU-2024:1562-1
- SUSE-SU-2024:1580-1
- SUSE-SU-2024:1581-1
- SUSE-SU-2024:1582-1
- SUSE-SU-2024:1596-1
- USN-6688-1
- USN-6700-1
- USN-6700-2
- USN-6701-1
- USN-6701-2
- USN-6701-3
- USN-6701-4
- USN-6702-1
- USN-6702-2
- USN-6704-1
- USN-6704-2
- USN-6704-3
- USN-6704-4
- USN-6705-1
- USN-6707-1
- USN-6707-2
- USN-6707-3
- USN-6707-4
- USN-6716-1
- USN-6765-1
- USN-6766-1
- USN-6766-2
- USN-6766-3
- USN-6767-1
- USN-6767-2
- USN-6795-1
- USN-6818-1
- USN-6818-2
- USN-6818-3
- USN-6818-4
- USN-6819-1
- USN-6819-2
- USN-6819-3
- USN-6819-4
- USN-6828-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2253986 | Bug #2253986 - CVE-2023-6679 kernel: NULL pointer dereference in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c | https://bugzilla.redhat.com/show_bug.cgi?id=2253986 |
Bugzilla | 2262126 | Bug #2262126 - CVE-2024-1086 kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | https://bugzilla.redhat.com/show_bug.cgi?id=2262126 |
Bugzilla | 2260041 | Bug #2260041 - CVE-2024-23849 kernel: off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access | https://bugzilla.redhat.com/show_bug.cgi?id=2260041 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/fedora/kernel?distro=fedora-39 | fedora | kernel | < 6.7.3.200.fc39 | fedora-39 | ||
Affected | pkg:rpm/fedora/kernel-headers?distro=fedora-39 | fedora | kernel-headers | < 6.7.3.200.fc39 | fedora-39 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |