Skip to content

Commit 3d4e86e

Browse files
committed
add 1 more RPM CVE; spiff up metadata in list-fixed-security-issues-in-rpm-1.3.1.txt file too
Signed-off-by: Nick Boldt <[email protected]>
1 parent 9a1cd0c commit 3d4e86e

File tree

2 files changed

+21
-16
lines changed

2 files changed

+21
-16
lines changed
Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,18 @@
1-
CVE-2024-34156
2-
CVE-2023-28746
3-
CVE-2024-27403
4-
CVE-2023-52658
5-
CVE-2024-35989
6-
CVE-2021-47385
7-
CVE-2024-36889
8-
CVE-2024-36978
9-
CVE-2024-38556
10-
CVE-2024-39483
11-
CVE-2024-39502
12-
CVE-2024-40959
13-
CVE-2024-42079
14-
CVE-2024-42272
15-
CVE-2024-42284
16-
CVE-2024-9355
1+
# CVE number, Errata details, Bugzilla
2+
CVE-2021-47385, kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field, https://bugzilla.redhat.com/show_bug.cgi?id=2282355
3+
CVE-2023-28746, kernel: Local information disclosure on Intel(R) Atom(R) processors, https://bugzilla.redhat.com/show_bug.cgi?id=2270700
4+
CVE-2023-52658, kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34;, https://bugzilla.redhat.com/show_bug.cgi?id=2281149
5+
CVE-2024-27403, kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow, https://bugzilla.redhat.com/show_bug.cgi?id=2281127
6+
CVE-2024-34156, encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion, https://bugzilla.redhat.com/show_bug.cgi?id=2310528
7+
CVE-2024-35989, kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms, https://bugzilla.redhat.com/show_bug.cgi?id=2281847
8+
CVE-2024-36889, kernel: mptcp: ensure snd_nxt is properly initialized on connect, https://bugzilla.redhat.com/show_bug.cgi?id=2284571
9+
CVE-2024-36978, kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune(), https://bugzilla.redhat.com/show_bug.cgi?id=2293078
10+
CVE-2024-38556, kernel: net/mlx5: Add a timeout to acquire the command queue semaphore, https://bugzilla.redhat.com/show_bug.cgi?id=2293443
11+
CVE-2024-39483, kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked, https://bugzilla.redhat.com/show_bug.cgi?id=2295921
12+
CVE-2024-39502, kernel: ionic: fix use after netif_napi_del(), https://bugzilla.redhat.com/show_bug.cgi?id=2297474
13+
CVE-2024-40959, kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr(), https://bugzilla.redhat.com/show_bug.cgi?id=2297543
14+
CVE-2024-42079, kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush, https://bugzilla.redhat.com/show_bug.cgi?id=2300517
15+
CVE-2024-42272, kernel: sched: act_ct: take care of padding in struct zones_ht_key, https://bugzilla.redhat.com/show_bug.cgi?id=2305417
16+
CVE-2024-42284, kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error, https://bugzilla.redhat.com/show_bug.cgi?id=2305429
17+
CVE-2024-6232, python: cpython: tarfile: ReDos via excessive backtracking while parsing header values, https://bugzilla.redhat.com/show_bug.cgi?id=2309426
18+
CVE-2024-9355, Golang FIPS OpenSSL: zeroed buffer, https://bugzilla.redhat.com/show_bug.cgi?id=2315719

modules/release-notes/snip-fixed-security-issues-in-rpm-1.3.1.adoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,9 @@ link:https://access.redhat.com/security/cve/CVE-2023-52658[CVE-2023-52658]::
1111
In the Linux kernel, the following vulnerability has been resolved:
1212
Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"
1313

14+
link:https://access.redhat.com/security/cve/CVE-2024-6232[CVE-2024-6232]::
15+
A regular expression denial of service (ReDos) vulnerability was found in Python's tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.
16+
1417
link:https://access.redhat.com/security/cve/CVE-2024-9355[CVE-2024-9355]::
1518
A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.
1619

0 commit comments

Comments
 (0)