[FEDORA-2024-71f0f16533] Fedora 38: kernel
Severity
High
Affected Packages
1
CVEs
7
The 6.7.6 stable kernel update contains a number of important fixes across the
tree.
Package | Affected Version |
---|---|
pkg:rpm/fedora/kernel?distro=fedora-38 | < 6.7.6.100.fc38 |
- ID
- FEDORA-2024-71f0f16533
- Severity
- high
- Severity from
- CVE-2024-26582
- URL
- https://bodhi.fedoraproject.org/updates/FEDORA-2024-71f0f16533
- Published
-
2024-02-28T01:41:53
(6 months ago) - Modified
-
2024-02-28T01:41:53
(6 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALSA-2024:3618
- ALSA-2024:4211
- DSA-5658-1
- DSA-5681-1
- ELSA-2024-2394
- ELSA-2024-3618
- ELSA-2024-4211
- FEDORA-2024-d16d94b00d
- RHSA-2024:3618
- RHSA-2024:3627
- RHSA-2024:4211
- RHSA-2024:4352
- RLSA-2024:3618
- RLSA-2024:4211
- SSA:2024-157-01
- SUSE-SU-2024:0855-1
- SUSE-SU-2024:0856-1
- SUSE-SU-2024:0857-1
- SUSE-SU-2024:0858-1
- SUSE-SU-2024:0900-1
- SUSE-SU-2024:0900-2
- SUSE-SU-2024:0910-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0926-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:0976-1
- SUSE-SU-2024:0977-1
- SUSE-SU-2024:1677-1
- SUSE-SU-2024:1679-1
- SUSE-SU-2024:1680-1
- SUSE-SU-2024:1682-1
- SUSE-SU-2024:1685-1
- SUSE-SU-2024:1686-1
- SUSE-SU-2024:1692-1
- SUSE-SU-2024:1695-1
- SUSE-SU-2024:1696-1
- SUSE-SU-2024:1705-1
- SUSE-SU-2024:1706-1
- SUSE-SU-2024:1707-1
- SUSE-SU-2024:1709-1
- SUSE-SU-2024:1711-1
- SUSE-SU-2024:1712-1
- SUSE-SU-2024:1713-1
- SUSE-SU-2024:1720-1
- SUSE-SU-2024:1726-1
- SUSE-SU-2024:1729-1
- SUSE-SU-2024:1732-1
- SUSE-SU-2024:1735-1
- SUSE-SU-2024:1736-1
- SUSE-SU-2024:1739-1
- SUSE-SU-2024:1740-1
- SUSE-SU-2024:1742-1
- SUSE-SU-2024:1746-1
- SUSE-SU-2024:1748-1
- SUSE-SU-2024:1749-1
- SUSE-SU-2024:1751-1
- SUSE-SU-2024:1757-1
- SUSE-SU-2024:1759-1
- SUSE-SU-2024:2092-1
- SUSE-SU-2024:2162-1
- SUSE-SU-2024:2207-1
- SUSE-SU-2024:2337-1
- SUSE-SU-2024:2446-1
- SUSE-SU-2024:2722-1
- SUSE-SU-2024:2824-1
- SUSE-SU-2024:2850-1
- SUSE-SU-2024:2893-1
- SUSE-SU-2024:2894-1
- SUSE-SU-2024:2902-1
- SUSE-SU-2024:2923-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2939-1
- SUSE-SU-2024:2947-1
- SUSE-SU-2024:2948-1
- USN-6765-1
- USN-6766-1
- USN-6766-2
- USN-6766-3
- USN-6767-1
- USN-6767-2
- USN-6795-1
- USN-6818-1
- USN-6818-2
- USN-6818-3
- USN-6818-4
- USN-6819-1
- USN-6819-2
- USN-6819-3
- USN-6819-4
- USN-6820-1
- USN-6820-2
- USN-6821-1
- USN-6821-2
- USN-6821-3
- USN-6821-4
- USN-6828-1
- USN-6871-1
- USN-6892-1
- USN-6895-1
- USN-6895-2
- USN-6895-3
- USN-6895-4
- USN-6900-1
- USN-6919-1
- USN-6924-1
- USN-6924-2
- USN-6953-1
- USN-6979-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2265520 | Bug #2265520 - CVE-2024-26583 kernel: tls: race between async notify and socket close | https://bugzilla.redhat.com/show_bug.cgi?id=2265520 |
Bugzilla | 2265646 | Bug #2265646 - CVE-2024-26593 kernel: i2c: i801: Fix block process call transactions | https://bugzilla.redhat.com/show_bug.cgi?id=2265646 |
Bugzilla | 2265517 | Bug #2265517 - CVE-2024-26585 kernel: tls: race between tx work scheduling and socket close | https://bugzilla.redhat.com/show_bug.cgi?id=2265517 |
Bugzilla | 2265518 | Bug #2265518 - CVE-2024-26582 kernel: tls: use-after-free with partial reads and async decrypt | https://bugzilla.redhat.com/show_bug.cgi?id=2265518 |
Bugzilla | 2265833 | Bug #2265833 - CVE-2024-26603 kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer | https://bugzilla.redhat.com/show_bug.cgi?id=2265833 |
Bugzilla | 2265269 | Bug #2265269 - CVE-2023-52437 kernel: Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d" | https://bugzilla.redhat.com/show_bug.cgi?id=2265269 |
Bugzilla | 2265519 | Bug #2265519 - CVE-2024-26584 kernel: tls: handle backlogging of crypto requests | https://bugzilla.redhat.com/show_bug.cgi?id=2265519 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/fedora/kernel?distro=fedora-38 | fedora | kernel | < 6.7.6.100.fc38 | fedora-38 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |