[RLSA-2024:4211] kernel security and bug fix update

Severity Important
Affected Packages 40
CVEs 61

An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)

  • kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001)

  • kernel: ovl: fix leaked entry (CVE-2021-46972)

  • kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073)

  • kernel: gro: fix ownership transfer (CVE-2024-35890)

  • kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585)

  • kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845)

  • kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007)

  • kernel: PCI interrupt mapping cause oops rhel-8

  • kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069)

  • kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng rhel-8

  • kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959)

  • kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656)

  • kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset rhel-8

  • kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)

  • kernel: netfilter: nf_tables: use timestamp to check for set element timeout rhel-8.10

  • kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)

  • kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)

  • kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906)

  • kernel: tipc: fix kernel warning when sending SYN message rhel-8

  • kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)

  • kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888)

  • kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686)

  • kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)

  • kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464)

  • kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)

  • kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)

  • kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813)

  • kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703)

  • kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004)

  • kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835)

  • kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495)

  • kernel: can: (CVE-2023-52878, CVE-2021-47456)

  • kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)

  • kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353)

Bug Fix(es):

  • Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux-29783)

  • Temporary values in FIPS integrity test should be zeroized rhel-8.10.z

  • Rocky Linux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux-36048)

  • [Rocky Linux8] blktests block/024 failed (JIRA:Rocky Linux-8130)

  • Rocky Linux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux-14195)

  • Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux-36172)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Package Affected Version
pkg:rpm/rockylinux/python3-perf?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/python3-perf?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/perf?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/perf?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-tools?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-tools?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-tools-libs?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-tools-libs?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-tools-libs-devel?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-tools-libs-devel?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-modules?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-modules?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-modules-extra?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-modules-extra?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-headers?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-headers?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-doc?arch=noarch&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-devel?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-devel?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debuginfo-common-x86_64?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debuginfo-common-aarch64?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debug?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debug?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debug-modules?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debug-modules?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debug-modules-extra?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debug-modules-extra?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debug-devel?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debug-devel?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debug-core?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-debug-core?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-cross-headers?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-cross-headers?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-core?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-core?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/kernel-abi-stablelists?arch=noarch&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/bpftool?arch=x86_64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
pkg:rpm/rockylinux/bpftool?arch=aarch64&distro=rockylinux-8.10 < 4.18.0-553.8.1.el8_10
ID
RLSA-2024:4211
Severity
important
URL
https://errata.rockylinux.org/RLSA-2024:4211
Published
2024-07-15T12:17:38
(7 weeks ago)
Modified
2024-07-15T12:19:56
(7 weeks ago)
Rights
Copyright 2024 Rocky Enterprise Software Foundation
Other Advisories
Source # ID Name URL
CVE CVE-2020-26555 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555
CVE CVE-2021-46909 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46909
CVE CVE-2021-46972 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46972
CVE CVE-2021-47069 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47069
CVE CVE-2021-47073 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47073
CVE CVE-2021-47236 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47236
CVE CVE-2021-47310 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47310
CVE CVE-2021-47311 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47311
CVE CVE-2021-47353 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47353
CVE CVE-2021-47356 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47356
CVE CVE-2021-47456 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47456
CVE CVE-2021-47495 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47495
CVE CVE-2023-5090 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5090
CVE CVE-2023-52464 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52464
CVE CVE-2023-52560 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52560
CVE CVE-2023-52615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
CVE CVE-2023-52626 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52626
CVE CVE-2023-52667 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52667
CVE CVE-2023-52669 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52669
CVE CVE-2023-52675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52675
CVE CVE-2023-52686 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52686
CVE CVE-2023-52700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52700
CVE CVE-2023-52703 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52703
CVE CVE-2023-52781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52781
CVE CVE-2023-52813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52813
CVE CVE-2023-52835 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52835
CVE CVE-2023-52877 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52877
CVE CVE-2023-52878 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52878
CVE CVE-2023-52881 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52881
CVE CVE-2024-26583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583
CVE CVE-2024-26584 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584
CVE CVE-2024-26585 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585
CVE CVE-2024-26656 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26656
CVE CVE-2024-26675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
CVE CVE-2024-26735 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
CVE CVE-2024-26759 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26759
CVE CVE-2024-26801 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
CVE CVE-2024-26804 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
CVE CVE-2024-26826 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26826
CVE CVE-2024-26859 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
CVE CVE-2024-26906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
CVE CVE-2024-26907 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
CVE CVE-2024-26974 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
CVE CVE-2024-26982 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26982
CVE CVE-2024-27397 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397
CVE CVE-2024-27410 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27410
CVE CVE-2024-35789 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789
CVE CVE-2024-35835 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35835
CVE CVE-2024-35838 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35838
CVE CVE-2024-35845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35845
CVE CVE-2024-35852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35852
CVE CVE-2024-35853 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853
CVE CVE-2024-35854 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854
CVE CVE-2024-35855 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855
CVE CVE-2024-35888 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888
CVE CVE-2024-35890 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890
CVE CVE-2024-35958 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958
CVE CVE-2024-35959 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35959
CVE CVE-2024-35960 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960
CVE CVE-2024-36004 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004
CVE CVE-2024-36007 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36007
Bugzilla 1918601 https://bugzilla.redhat.com/show_bug.cgi?id=1918601
Bugzilla 2248122 https://bugzilla.redhat.com/show_bug.cgi?id=2248122
Bugzilla 2258875 https://bugzilla.redhat.com/show_bug.cgi?id=2258875
Bugzilla 2265517 https://bugzilla.redhat.com/show_bug.cgi?id=2265517
Bugzilla 2265519 https://bugzilla.redhat.com/show_bug.cgi?id=2265519
Bugzilla 2265520 https://bugzilla.redhat.com/show_bug.cgi?id=2265520
Bugzilla 2265800 https://bugzilla.redhat.com/show_bug.cgi?id=2265800
Bugzilla 2266408 https://bugzilla.redhat.com/show_bug.cgi?id=2266408
Bugzilla 2266831 https://bugzilla.redhat.com/show_bug.cgi?id=2266831
Bugzilla 2267513 https://bugzilla.redhat.com/show_bug.cgi?id=2267513
Bugzilla 2267518 https://bugzilla.redhat.com/show_bug.cgi?id=2267518
Bugzilla 2267730 https://bugzilla.redhat.com/show_bug.cgi?id=2267730
Bugzilla 2270093 https://bugzilla.redhat.com/show_bug.cgi?id=2270093
Bugzilla 2271680 https://bugzilla.redhat.com/show_bug.cgi?id=2271680
Bugzilla 2272692 https://bugzilla.redhat.com/show_bug.cgi?id=2272692
Bugzilla 2272829 https://bugzilla.redhat.com/show_bug.cgi?id=2272829
Bugzilla 2273204 https://bugzilla.redhat.com/show_bug.cgi?id=2273204
Bugzilla 2273278 https://bugzilla.redhat.com/show_bug.cgi?id=2273278
Bugzilla 2273423 https://bugzilla.redhat.com/show_bug.cgi?id=2273423
Bugzilla 2273429 https://bugzilla.redhat.com/show_bug.cgi?id=2273429
Bugzilla 2275604 https://bugzilla.redhat.com/show_bug.cgi?id=2275604
Bugzilla 2275633 https://bugzilla.redhat.com/show_bug.cgi?id=2275633
Bugzilla 2275635 https://bugzilla.redhat.com/show_bug.cgi?id=2275635
Bugzilla 2275733 https://bugzilla.redhat.com/show_bug.cgi?id=2275733
Bugzilla 2278337 https://bugzilla.redhat.com/show_bug.cgi?id=2278337
Bugzilla 2278354 https://bugzilla.redhat.com/show_bug.cgi?id=2278354
Bugzilla 2280434 https://bugzilla.redhat.com/show_bug.cgi?id=2280434
Bugzilla 2281057 https://bugzilla.redhat.com/show_bug.cgi?id=2281057
Bugzilla 2281113 https://bugzilla.redhat.com/show_bug.cgi?id=2281113
Bugzilla 2281157 https://bugzilla.redhat.com/show_bug.cgi?id=2281157
Bugzilla 2281165 https://bugzilla.redhat.com/show_bug.cgi?id=2281165
Bugzilla 2281251 https://bugzilla.redhat.com/show_bug.cgi?id=2281251
Bugzilla 2281253 https://bugzilla.redhat.com/show_bug.cgi?id=2281253
Bugzilla 2281255 https://bugzilla.redhat.com/show_bug.cgi?id=2281255
Bugzilla 2281257 https://bugzilla.redhat.com/show_bug.cgi?id=2281257
Bugzilla 2281272 https://bugzilla.redhat.com/show_bug.cgi?id=2281272
Bugzilla 2281311 https://bugzilla.redhat.com/show_bug.cgi?id=2281311
Bugzilla 2281334 https://bugzilla.redhat.com/show_bug.cgi?id=2281334
Bugzilla 2281346 https://bugzilla.redhat.com/show_bug.cgi?id=2281346
Bugzilla 2281350 https://bugzilla.redhat.com/show_bug.cgi?id=2281350
Bugzilla 2281689 https://bugzilla.redhat.com/show_bug.cgi?id=2281689
Bugzilla 2281693 https://bugzilla.redhat.com/show_bug.cgi?id=2281693
Bugzilla 2281920 https://bugzilla.redhat.com/show_bug.cgi?id=2281920
Bugzilla 2281923 https://bugzilla.redhat.com/show_bug.cgi?id=2281923
Bugzilla 2281925 https://bugzilla.redhat.com/show_bug.cgi?id=2281925
Bugzilla 2281953 https://bugzilla.redhat.com/show_bug.cgi?id=2281953
Bugzilla 2281986 https://bugzilla.redhat.com/show_bug.cgi?id=2281986
Bugzilla 2282394 https://bugzilla.redhat.com/show_bug.cgi?id=2282394
Bugzilla 2282400 https://bugzilla.redhat.com/show_bug.cgi?id=2282400
Bugzilla 2282471 https://bugzilla.redhat.com/show_bug.cgi?id=2282471
Bugzilla 2282472 https://bugzilla.redhat.com/show_bug.cgi?id=2282472
Bugzilla 2282581 https://bugzilla.redhat.com/show_bug.cgi?id=2282581
Bugzilla 2282609 https://bugzilla.redhat.com/show_bug.cgi?id=2282609
Bugzilla 2282612 https://bugzilla.redhat.com/show_bug.cgi?id=2282612
Bugzilla 2282653 https://bugzilla.redhat.com/show_bug.cgi?id=2282653
Bugzilla 2282680 https://bugzilla.redhat.com/show_bug.cgi?id=2282680
Bugzilla 2282698 https://bugzilla.redhat.com/show_bug.cgi?id=2282698
Bugzilla 2282712 https://bugzilla.redhat.com/show_bug.cgi?id=2282712
Bugzilla 2282735 https://bugzilla.redhat.com/show_bug.cgi?id=2282735
Bugzilla 2282902 https://bugzilla.redhat.com/show_bug.cgi?id=2282902
Bugzilla 2282920 https://bugzilla.redhat.com/show_bug.cgi?id=2282920
Self RLSA-2024:4211 https://errata.rockylinux.org/RLSA-2024:4211
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/rockylinux/python3-perf?arch=x86_64&distro=rockylinux-8.10 rockylinux python3-perf < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/python3-perf?arch=aarch64&distro=rockylinux-8.10 rockylinux python3-perf < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/perf?arch=x86_64&distro=rockylinux-8.10 rockylinux perf < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/perf?arch=aarch64&distro=rockylinux-8.10 rockylinux perf < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-tools?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-tools < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-tools?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-tools < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-tools-libs?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-tools-libs < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-tools-libs?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-tools-libs < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-tools-libs-devel?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-tools-libs-devel < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-tools-libs-devel?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-tools-libs-devel < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-modules?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-modules < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-modules?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-modules < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-modules-extra?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-modules-extra < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-modules-extra?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-modules-extra < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-headers?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-headers < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-headers?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-headers < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-doc?arch=noarch&distro=rockylinux-8.10 rockylinux kernel-doc < 4.18.0-553.8.1.el8_10 rockylinux-8.10 noarch
Affected pkg:rpm/rockylinux/kernel-devel?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-devel < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-devel?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-devel < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-debuginfo-common-x86_64?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-debuginfo-common-x86_64 < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-debuginfo-common-aarch64?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-debuginfo-common-aarch64 < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-debug?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-debug < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-debug?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-debug < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-debug-modules?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-debug-modules < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-debug-modules?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-debug-modules < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-debug-modules-extra?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-debug-modules-extra < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-debug-modules-extra?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-debug-modules-extra < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-debug-devel?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-debug-devel < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-debug-devel?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-debug-devel < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-debug-core?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-debug-core < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-debug-core?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-debug-core < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-cross-headers?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-cross-headers < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-cross-headers?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-cross-headers < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-core?arch=x86_64&distro=rockylinux-8.10 rockylinux kernel-core < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/kernel-core?arch=aarch64&distro=rockylinux-8.10 rockylinux kernel-core < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
Affected pkg:rpm/rockylinux/kernel-abi-stablelists?arch=noarch&distro=rockylinux-8.10 rockylinux kernel-abi-stablelists < 4.18.0-553.8.1.el8_10 rockylinux-8.10 noarch
Affected pkg:rpm/rockylinux/bpftool?arch=x86_64&distro=rockylinux-8.10 rockylinux bpftool < 4.18.0-553.8.1.el8_10 rockylinux-8.10 x86_64
Affected pkg:rpm/rockylinux/bpftool?arch=aarch64&distro=rockylinux-8.10 rockylinux bpftool < 4.18.0-553.8.1.el8_10 rockylinux-8.10 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...