{"id":"RLSA-2024:1607","summary":"Important: kernel security, bug fix, and enhancement update","details":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096)\n\n* kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931)\n\n* kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527)\n\n* kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565)\n\n* kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042)\n\n* kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631)\n\n* kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086)\n\nBug Fix(es):\n\n* OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:Rocky Linux-21394)\n\n* kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24010)\n\n* Screen floods with random colour suggesting something not initialised (JIRA:Rocky Linux-21055)\n\n* kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22766)\n\n* tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 (JIRA:Rocky Linux-20822)\n\n* kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22077)\n\n* kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22930)\n\n* rbd: don't move requests to the running list on errors [8.x] (JIRA:Rocky Linux-24204)\n\n* kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24479)\n\n* ceph: several cap and snap fixes (JIRA:Rocky Linux-20909)\n\n* [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:Rocky Linux-23063)\n\n* unable to access smsc95xx based interface unless you start outgoing traffic.  (JIRA:Rocky Linux-25719)\n\n* [Rocky Linux8] ] BUG bio-696 (Not tainted): Poison overwritten  (JIRA:Rocky Linux-26101)\n\n* kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19954)\n\n* backport smartpqi: fix disable_managed_interrupts (JIRA:Rocky Linux-26139)\n\n* kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26331)\n\n* ceph: always check dir caps asynchronously (JIRA:Rocky Linux-27496)\n\nEnhancement(s):\n\n* [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:Rocky Linux-25811)","modified":"2026-03-11T06:30:48.444689Z","published":"2024-04-05T14:55:53.600745Z","upstream":["CVE-2021-33631","CVE-2022-38096","CVE-2023-51042","CVE-2023-6546","CVE-2023-6931","CVE-2024-0565","CVE-2024-1086"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:1607"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133452"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2252731"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255498"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258518"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259866"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2261976"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262126"}],"affected":[{"package":{"name":"kernel","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/kernel?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.24.1.el8_9"}],"database_specific":{"yum_repository":"BaseOS"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:1607.json"}}],"schema_version":"1.7.5","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}