[FEDORA-2024-71f0f16533] Fedora 38: kernel

Severity High
Affected Packages 1
CVEs 7

The 6.7.6 stable kernel update contains a number of important fixes across the
tree.

Package Affected Version
pkg:rpm/fedora/kernel?distro=fedora-38 < 6.7.6.100.fc38
ID
FEDORA-2024-71f0f16533
Severity
high
Severity from
CVE-2024-26582
URL
https://bodhi.fedoraproject.org/updates/FEDORA-2024-71f0f16533
Published
2024-02-28T01:41:53
(6 months ago)
Modified
2024-02-28T01:41:53
(6 months ago)
Rights
Copyright 2024 Red Hat, Inc.
Other Advisories
Source # ID Name URL
Bugzilla 2265520 Bug #2265520 - CVE-2024-26583 kernel: tls: race between async notify and socket close https://bugzilla.redhat.com/show_bug.cgi?id=2265520
Bugzilla 2265646 Bug #2265646 - CVE-2024-26593 kernel: i2c: i801: Fix block process call transactions https://bugzilla.redhat.com/show_bug.cgi?id=2265646
Bugzilla 2265517 Bug #2265517 - CVE-2024-26585 kernel: tls: race between tx work scheduling and socket close https://bugzilla.redhat.com/show_bug.cgi?id=2265517
Bugzilla 2265518 Bug #2265518 - CVE-2024-26582 kernel: tls: use-after-free with partial reads and async decrypt https://bugzilla.redhat.com/show_bug.cgi?id=2265518
Bugzilla 2265833 Bug #2265833 - CVE-2024-26603 kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer https://bugzilla.redhat.com/show_bug.cgi?id=2265833
Bugzilla 2265269 Bug #2265269 - CVE-2023-52437 kernel: Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d" https://bugzilla.redhat.com/show_bug.cgi?id=2265269
Bugzilla 2265519 Bug #2265519 - CVE-2024-26584 kernel: tls: handle backlogging of crypto requests https://bugzilla.redhat.com/show_bug.cgi?id=2265519
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/fedora/kernel?distro=fedora-38 fedora kernel < 6.7.6.100.fc38 fedora-38
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...