Resource Injection Affecting kernel-cross-headers package, versions <0:4.18.0-553.27.1.el8_10
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELCROSSHEADERS-7512832
- published 17 Jul 2024
- disclosed 12 Jul 2024
Introduced: 12 Jul 2024
CVE-2024-40924 Open this link in a new tabHow to fix?
Upgrade RHEL:8
kernel-cross-headers
to version 0:4.18.0-553.27.1.el8_10 or higher.
This issue was patched in RHSA-2024:8856
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-cross-headers
package and not the kernel-cross-headers
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
drm/i915/dpt: Make DPT object unshrinkable
In some scenarios, the DPT object gets shrunk but the actual framebuffer did not and thus its still there on the DPT's vm->bound_list. Then it tries to rewrite the PTEs via a stale CPU mapping. This causes panic.
[vsyrjala: Add TODO comment] (cherry picked from commit 51064d471c53dcc8eddd2333c3f1c1d9131ba36c)
References
- https://access.redhat.com/security/cve/CVE-2024-40924
- https://git.kernel.org/stable/c/327280149066f0e5f2e50356b5823f76dabfe86e
- https://git.kernel.org/stable/c/43e2b37e2ab660c3565d4cff27922bc70e79c3f1
- https://git.kernel.org/stable/c/7a9883be3b98673333eec65c4a21cc18e60292eb
- https://git.kernel.org/stable/c/a2552020fb714ff357182c3c179abfac2289f84d