Integer Underflow Affecting kernel package, versions *
Threat Intelligence
EPSS
0.04% (15th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-KERNEL-7627366
- published 5 Aug 2024
- disclosed 29 Jul 2024
How to fix?
There is no fixed version for RHEL:7
kernel
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel
package and not the kernel
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
The "instance" variable needs to be signed for the error handling to work.
References
- https://access.redhat.com/security/cve/CVE-2024-41022
- https://git.kernel.org/stable/c/298e2ce222e712ffafa47288c5b2fcf33d72fda3
- https://git.kernel.org/stable/c/3dd9734878a9042f0358301d19a2b006a0fc4d06
- https://git.kernel.org/stable/c/4edb0a84e6b32e75dc9bd6dd085b2c2ff19ec287
- https://git.kernel.org/stable/c/544fa213f15d27f0370795845d55eeb3e00080d2
- https://git.kernel.org/stable/c/6769a23697f17f9bf9365ca8ed62fe37e361a05a
- https://git.kernel.org/stable/c/a5224e2123ce21102f346f518db80f004d5053a7
- https://git.kernel.org/stable/c/d347c9a398bf7eab9408d207c0a50fb720f9de7d
- https://git.kernel.org/stable/c/e8dfbf83a82bbfb9680921719fbe65e535af59ea
CVSS Scores
version 3.1