MontaVista CVE List and Response

MontaVista continually monitors the security community and customers for threats. We follow the community on CVE scoring (NVD) and set fix priority accordingly for affected products. Please view the following CVEs that have been remediated or are in process by clicking the CVE Year to the left or use the CVE Filters below.

For inquiries regarding Security Vulnerabilities, please see our Vulnerability Response Policy or email our PSIRT team security@mvista.com. Email messages and attachments can be encrypted using PGP and a MontaVista PSIRT PGP key, which is available for download here.

Year
Product
Score
Severity
Status
CVE
CVE Score Severity Package Description Published
CVE-2022-21505
8.4 (i)
CGX 3.1 Released
Rocky 8.4 Wont Fix
CGX 2.4 Wont Fix
CGX 4.0 Released
Rocky 8.5 Wont Fix
Centos 8.3 Wont Fix
Centos 7.9 Wont Fix
Centos 8.1 Wont Fix
Centos 7.8 Wont Fix
Centos 7.7 Wont Fix
Centos 7.6 Wont Fix
Centos 6.10 Wont Fix
Centos 7.5 Wont Fix
HIGHkernel ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. 2024-04-24
CVE-2024-26922
5.5 (i)
CGX 2.4 Under Investigation
Centos 6.10 Under Investigation
Rocky 9.1 Under Investigation
Rocky 9.2 Under Investigation
Rocky 8.8 Under Investigation
Centos 7.6 Under Investigation
Centos 7.7 Under Investigation
Centos 7.8 Under Investigation
Centos 7.8 Under Investigation
Centos 8.3 Under Investigation
CGX 2.0 Under Investigation
CGX 2.0 Under Investigation
CGX 2.2 Under Investigation
CGE 7.0 Under Investigation
Rocky 8.5 Under Investigation
Centos 8.1 Under Investigation
Rocky 8.4 Under Investigation
CGX 3.1 Under Investigation
Centos 7.9 Under Investigation
Centos 7.9 Under Investigation
Centos 7.9 Under Investigation
CGX 4.0 Under Investigation
Rocky 9.3 Under Investigation
Rocky 8.9 Under Investigation
CGE 6.0 Under Investigation
Centos 5.11 Under Investigation
MEDIUMkernel In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: validate the parameters of bo mapping operations more clearlyVerify the parameters ofamdgpu_vm_bo_(map/replace_map/clearing_mappings) in one common place. 2024-04-23
CVE-2024-3177
4.9 (i)
CGX 2.4 Under Investigation
CGX 3.1 Under Investigation
Kubernetes 1.21.14 Under Investigation
CGX 4.0 Under Investigation
MEDIUMkubernetes A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated. 2024-04-22
CVE-2024-31745
7.5 (i)
Rocky 8.9 Not Affected
Centos 7.9 Not Affected
HIGHlibdwarf Libdwarf v0.9.1 was discovered to contain a heap use-after-free via the dw_empty_errlist_item function at /libdwarf/dwarf_alloc.c. 2024-04-19
CVE-2024-32473
4.7 (i)
MEDIUMmoby Moby is an open source container framework that is a key component of Docker Engine, Docker Desktop, and other distributions of container tooling or runtimes. In 26.0.0, IPv6 is not disabled on network interfaces, including those belonging to networks where `--ipv6=false`. An container with an `ipvlan` or `macvlan` interface will normally be configured to share an external network link with the host machine. Because of this direct access, (1) Containers may be able to communicate with other hosts on the local network over link-local IPv6 addresses, (2) if router advertisements are being broadcast over the local network, containers may get SLAAC-assigned addresses, and (3) the interface will be a member of IPv6 multicast groups. This means interfaces in IPv4-only networks present an unexpectedly and unnecessarily increased attack surface. The issue is patched in 26.0.2. To completely disable IPv6 in a container, use `--sysctl=net.ipv6.conf.all.disable_ipv6=1` in the `docker create` or `docker run` command. Or, in the service configuration of a `compose` file. 2024-04-18
CVE-2023-3758
7.1 (i)
Rocky 9.1 Under Investigation
Rocky 9.2 Under Investigation
Rocky 8.8 Under Investigation
Centos 7.7 Under Investigation
Centos 8.3 Under Investigation
CGE 7.0 Under Investigation
Rocky 8.5 Under Investigation
Centos 8.1 Under Investigation
Centos 7.9 Under Investigation
CGX 4.0 Pending Release
Rocky 9.3 Under Investigation
Rocky 8.9 Under Investigation
Centos 6.10 Under Investigation
CGX 3.1 Under Investigation
Rocky 8.4 Under Investigation
HIGHsssd A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately. 2024-04-18
CVE-2024-26921
5.5 (i)
CGX 2.0 Out of Support Scope
CGX 4.0 Under Investigation
Rocky 9.1 Out of Support Scope
Rocky 9.2 Out of Support Scope
Rocky 8.8 Out of Support Scope
Centos 7.6 Out of Support Scope
Centos 7.7 Out of Support Scope
Centos 7.8 Out of Support Scope
Centos 7.8 Out of Support Scope
Centos 8.3 Out of Support Scope
CGX 2.0 Out of Support Scope
CGX 2.2 Out of Support Scope
CGE 7.0 Not Affected
CGX 2.4 Out of Support Scope
Rocky 8.5 Out of Support Scope
Centos 8.1 Out of Support Scope
Rocky 8.4 Out of Support Scope
CGX 3.1 Under Investigation
Centos 7.9 Under Investigation
Centos 7.9 Under Investigation
Centos 7.9 Under Investigation
Rocky 9.3 Under Investigation
Rocky 8.9 Under Investigation
Centos 5.11 Not Affected
CGE 6.0 Not Affected
Centos 6.10 Not Affected
MEDIUMkernel In the Linux kernel, the following vulnerability has been resolved:inet: inet_defrag: prevent sk release while still in useip_local_out() and other functions can pass skb->sk as function argument.If the skb is a fragment and reassembly happens before such function callreturns, the sk must not be released.This affects skb fragments reassembled via netfilter or similarmodules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.Eric Dumazet made an initial analysis of this bug. Quoting Eric: Calling ip_defrag() in output path is also implying skb_orphan(), which is buggy because output path relies on sk not disappearing. A relevant old patch about the issue was : 8282f27449bf ("inet: frag: Always orphan skbs inside ip_defrag()") [..] net/ipv4/ip_output.c depends on skb->sk being set, and probably to an inet socket, not an arbitrary one. If we orphan the packet in ipvlan, then downstream things like FQ packet scheduler will not work properly. We need to change ip_defrag() to only use skb_orphan() when really needed, ie whenever frag_list is going to be used.Eric suggested to stash sk in fragment queue and made an initial patch.However there is a problem with this:If skb is refragmented again right after, ip_do_fragment() will copyhead->sk to the new fragments, and sets up destructor to sock_wfree.IOW, we have no choice but to fix up sk_wmem accouting to reflect thefully reassembled skb, else wmem will underflow.This change moves the orphan down into the core, to last possible moment.As ip_defrag_offset is aliased with sk_buff->sk member, we must move theoffset into the FRAG_CB, else skb->sk gets clobbered.This allows to delay the orphaning long enough to learn if the skb hasto be queued or if the skb is completing the reasm queue.In the former case, things work as before, skb is orphaned. This issafe because skb gets queued/stolen and won't continue past reasm engine.In the latter case, we will steal the skb->sk reference, reattach it tothe head skb, and fix up wmem accouting when inet_frag inflates truesize. 2024-04-18
CVE-2024-2961
8.8 (i)
Centos 7.8 Out of Support Scope
Rocky 9.1 Out of Support Scope
Rocky 9.2 Out of Support Scope
Rocky 8.8 Out of Support Scope
Centos 7.6 Out of Support Scope
Centos 7.7 Out of Support Scope
Centos 8.3 Out of Support Scope
CGX 2.0 Out of Support Scope
CGX 2.2 Out of Support Scope
CGX 2.2 Out of Support Scope
CGE 7.0 Out of Support Scope
CGX 2.4 Out of Support Scope
Rocky 8.5 Out of Support Scope
Centos 8.1 Out of Support Scope
Rocky 8.4 Out of Support Scope
CGX 3.1 Under Investigation
Centos 7.9 Under Investigation
CGX 4.0 Under Investigation
Rocky 9.3 Under Investigation
Rocky 8.9 Under Investigation
Centos 5.11 Out of Support Scope
CGE 6.0 Out of Support Scope
Centos 6.10 Out of Support Scope
HIGHglibc The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable. 2024-04-17
CVE-2024-26920
5.5 (i)
CGE 6.0 Not Affected
Rocky 8.9 Not Affected
Rocky 9.1 Not Affected
Rocky 9.2 Not Affected
Rocky 8.8 Not Affected
Centos 7.6 Not Affected
Centos 7.7 Not Affected
Centos 7.8 Not Affected
Centos 7.8 Not Affected
Centos 8.3 Not Affected
CGX 2.0 Out of Support Scope
CGX 2.0 Not Affected
CGX 2.2 Out of Support Scope
CGE 7.0 Not Affected
CGX 2.4 Out of Support Scope
Rocky 8.5 Not Affected
Centos 8.1 Not Affected
Rocky 8.4 Not Affected
CGX 3.1 Pending Release
Centos 7.9 Not Affected
Centos 7.9 Not Affected
Centos 7.9 Not Affected
CGX 4.0 Pending Release
Rocky 9.3 Not Affected
Centos 5.11 Not Affected
Centos 6.10 Not Affected
MEDIUMkernel In the Linux kernel, the following vulnerability has been resolved:tracing/trigger: Fix to return error if failed to alloc snapshotFix register_snapshot_trigger() to return error code if it failed toallocate a snapshot instead of 0 (success). Unless that, it will registersnapshot trigger without an error. 2024-04-17
CVE-2024-26919
5.5 (i)
Centos 7.9 Not Affected
Rocky 9.1 Not Affected
Rocky 9.2 Not Affected
Rocky 8.8 Not Affected
Centos 7.6 Not Affected
Centos 7.7 Not Affected
Centos 7.8 Not Affected
Centos 7.8 Not Affected
Centos 8.3 Not Affected
CGX 2.0 Not Affected
CGX 2.0 Not Affected
CGX 2.2 Not Affected
CGE 7.0 Not Affected
CGX 2.4 Not Affected
Rocky 8.5 Not Affected
Centos 8.1 Not Affected
Rocky 8.4 Not Affected
CGX 3.1 Not Affected
Centos 7.9 Not Affected
CGX 4.0 Not Affected
Rocky 9.3 Not Affected
Rocky 8.9 Not Affected
Centos 5.11 Not Affected
CGE 6.0 Not Affected
Centos 6.10 Not Affected
Centos 7.9 Not Affected
MEDIUMkernel In the Linux kernel, the following vulnerability has been resolved:usb: ulpi: Fix debugfs directory leakThe ULPI per-device debugfs root is named after the ulpi device'sparent, but ulpi_unregister_interface tries to remove a debugfsdirectory named after the ulpi device itself. This results in thedirectory sticking around and preventing subsequent (deferred) probesfrom succeeding. Change the directory name to match the ulpi device. 2024-04-17