RHEL 8 : kernel (RHSA-2024:6993)

high Nessus Plugin ID 207689

Synopsis

The remote Red Hat host is missing one or more security updates for kernel.

Description

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2024:6993 advisory.

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439)

* kernel: smb: client: fix potential OOBs in smb2_parse_contexts() (CVE-2023-52434)

* kernel: net: fix possible store tearing in neigh_periodic_work() (CVE-2023-52522)

* kernel: tunnels: fix out of bounds access when building IPv6 PMTU error (CVE-2024-26665)

* kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove (CVE-2024-26698)

* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772)

* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)

* kernel: x86/xen: Add some null pointer checking to smp.c (CVE-2024-26908)

* kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (CVE-2024-26851)

* kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923)

* kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (CVE-2022-48638)

* kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (CVE-2024-27020)

* kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (CVE-2024-27019)

* kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CVE-2024-27399)

* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)

* kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr (CVE-2024-35969)

* kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path (CVE-2024-36005)

* kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47384)

* kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)

* kernel: virtio-net: Add validation for used length (CVE-2021-47352)

* kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864)

* kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (CVE-2023-52811)

* kernel: bonding: stop the device in bond_setup_by_slave() (CVE-2023-52784)

* kernel: isdn: mISDN: Fix sleeping function called from invalid context (CVE-2021-47468)

* kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() (CVE-2021-47566)

* kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (CVE-2024-36016)

* kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs (CVE-2024-36929)

* kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978)

* kernel: cpufreq: exit() callback is optional (CVE-2024-38615)

* kernel: md: fix resync softlockup when bitmap size is less than array size (CVE-2024-38598)

* kernel: cppc_cpufreq: Fix possible null pointer dereference (CVE-2024-38573)

* kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270)

* kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995)

* kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (CVE-2024-41041)

* kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044)

* kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing (CVE-2024-41071)

* kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093)

* kernel: tcp_metrics: validate source addr length (CVE-2024-42154)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL kernel package based on the guidance in RHSA-2024:6993.

See Also

http://www.nessus.org/u?1943e146

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=2265271

https://bugzilla.redhat.com/show_bug.cgi?id=2265285

https://bugzilla.redhat.com/show_bug.cgi?id=2267795

https://bugzilla.redhat.com/show_bug.cgi?id=2272793

https://bugzilla.redhat.com/show_bug.cgi?id=2273117

https://bugzilla.redhat.com/show_bug.cgi?id=2273242

https://bugzilla.redhat.com/show_bug.cgi?id=2275604

https://bugzilla.redhat.com/show_bug.cgi?id=2275744

https://bugzilla.redhat.com/show_bug.cgi?id=2275750

https://bugzilla.redhat.com/show_bug.cgi?id=2277171

https://bugzilla.redhat.com/show_bug.cgi?id=2277829

https://bugzilla.redhat.com/show_bug.cgi?id=2278256

https://bugzilla.redhat.com/show_bug.cgi?id=2278258

https://bugzilla.redhat.com/show_bug.cgi?id=2280462

https://bugzilla.redhat.com/show_bug.cgi?id=2281669

https://bugzilla.redhat.com/show_bug.cgi?id=2281900

https://bugzilla.redhat.com/show_bug.cgi?id=2281949

https://bugzilla.redhat.com/show_bug.cgi?id=2282356

https://bugzilla.redhat.com/show_bug.cgi?id=2282394

https://bugzilla.redhat.com/show_bug.cgi?id=2282401

https://bugzilla.redhat.com/show_bug.cgi?id=2282719

https://bugzilla.redhat.com/show_bug.cgi?id=2282743

https://bugzilla.redhat.com/show_bug.cgi?id=2282772

https://bugzilla.redhat.com/show_bug.cgi?id=2282887

https://bugzilla.redhat.com/show_bug.cgi?id=2283463

https://bugzilla.redhat.com/show_bug.cgi?id=2283894

https://bugzilla.redhat.com/show_bug.cgi?id=2284496

https://bugzilla.redhat.com/show_bug.cgi?id=2293078

https://bugzilla.redhat.com/show_bug.cgi?id=2293348

https://bugzilla.redhat.com/show_bug.cgi?id=2293367

https://bugzilla.redhat.com/show_bug.cgi?id=2293420

https://bugzilla.redhat.com/show_bug.cgi?id=2293653

https://bugzilla.redhat.com/show_bug.cgi?id=2297579

https://bugzilla.redhat.com/show_bug.cgi?id=2300410

https://bugzilla.redhat.com/show_bug.cgi?id=2300414

https://bugzilla.redhat.com/show_bug.cgi?id=2300448

https://bugzilla.redhat.com/show_bug.cgi?id=2300488

https://bugzilla.redhat.com/show_bug.cgi?id=2301522

https://access.redhat.com/errata/RHSA-2024:6993

Plugin Details

Severity: High

ID: 207689

File Name: redhat-RHSA-2024-6993.nasl

Version: 1.3

Type: local

Agent: unix

Published: 9/24/2024

Updated: 11/11/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 7.7

Temporal Score: 5.7

Vector: CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2023-52434

CVSS v3

Risk Factor: High

Base Score: 8

Temporal Score: 7

Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:bpftool, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:redhat:enterprise_linux:kernel-tools, p-cpe:/a:redhat:enterprise_linux:kernel-modules, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules, p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-debug-core, p-cpe:/a:redhat:enterprise_linux:perf, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel, p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers, p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:python3-perf, p-cpe:/a:redhat:enterprise_linux:kernel-core, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-headers, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core, cpe:/o:redhat:rhel_eus:8.8, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 9/24/2024

Vulnerability Publication Date: 10/17/2022

Reference Information

CVE: CVE-2021-47352, CVE-2021-47356, CVE-2021-47384, CVE-2021-47468, CVE-2021-47566, CVE-2022-48638, CVE-2023-52434, CVE-2023-52439, CVE-2023-52522, CVE-2023-52784, CVE-2023-52811, CVE-2023-52864, CVE-2024-26665, CVE-2024-26698, CVE-2024-26772, CVE-2024-26826, CVE-2024-26851, CVE-2024-26908, CVE-2024-26923, CVE-2024-27019, CVE-2024-27020, CVE-2024-27399, CVE-2024-35898, CVE-2024-35969, CVE-2024-36005, CVE-2024-36016, CVE-2024-36270, CVE-2024-36929, CVE-2024-36978, CVE-2024-38573, CVE-2024-38598, CVE-2024-38615, CVE-2024-40995, CVE-2024-41041, CVE-2024-41044, CVE-2024-41071, CVE-2024-41093, CVE-2024-42154

CWE: 125, 130, 20, 229, 362, 402, 416, 459, 476, 501, 588, 667, 690, 787, 822, 833, 911, 99

RHSA: 2024:6993