[CLSA-2025:1738592614] kernel: Fix of 26 CVEs
Type:
security
Severity:
Important
Release date:
2025-02-03 14:23:43 UTC
Description:
- xsk: fix OOB map writes when deleting elements {CVE-2024-56614} - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer {CVE-2024-53103} - scsi: sg: Fix slab-use-after-free read in sg_release() {CVE-2024-56631} - net: inet: do not leave a dangling sk pointer in inet_create() {CVE-2024-56601} - initramfs: avoid filename buffer overrun {CVE-2024-53142} - wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() {CVE-2024-53156} - ALSA: usb-audio: Fix out of bounds reads when finding clock sources {CVE-2024-53150} - Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() {CVE-2024-56604} - Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() {CVE-2024-56605} - af_packet: avoid erroring out after sock_init_data() in packet_create() {CVE-2024-56606} - af_packet: Block execution of tasks waiting for transmit to complete in AF_PACKET {CVE-2024-56606} - scsi: bfa: Fix use-after-free in bfad_im_module_exit() {CVE-2024-53227} - net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() {CVE-2024-56602} - net: inet6: do not leave a dangling sk pointer in inet6_create() {CVE-2024-56600} - NFSv4.0: Fix a use-after-free problem in the asynchronous open() {CVE-2024-53173} - net: af_can: do not leave a dangling sk pointer in can_create() {CVE-2024-56603} - ceph: prevent use-after-free in encode_cap_msg() {CVE-2024-26689} - drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' {CVE-2024-56608} - netfilter: ipset: add missing range check in bitmap_ip_uadt {CVE-2024-53141} - tipc: Fix use-after-free of kernel socket in cleanup_bearer(). {CVE-2024-27043} - smb: client: fix potential UAF in cifs_stats_proc_write() {CVE-2024-35868} - smb: client: fix potential UAF in cifs_stats_proc_show() {CVE-2024-35867} - smb: client: fix potential UAF in smb2_is_valid_lease_break() {CVE-2024-35864} - smb: client: fix potential UAF in smb2_is_valid_oplock_break() {CVE-2024-35863} - smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() {CVE-2024-35861} - smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752} - smb: client: fix potential UAF in cifs_debug_files_proc_show() {CVE-2024-26928}
Updated packages:
  • bpftool-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:4302719d968615639d40ddcbefd6a5dd02ea694afdf16ea9cbae2c98cbc1bea7
  • kernel-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:abcd207c9089e779f1541ced7c87da9133c12d85bfa5ca2c8c6795b9c3874ace
  • kernel-core-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:0e5840103ae4ff565ab0f874853cf5a7080a027da28ea0ec9f4ec82ce0bb6a92
  • kernel-cross-headers-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:3fa95949f05935d47d34e4155f93bd717efb7e9f048a0c1f0336841b0c7a085f
  • kernel-debug-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:61b052702a6b65babf5da7c97eb42e9207b8f1518b1150cd1984539bc7d85a36
  • kernel-debug-core-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:7f47451d596bd3c3a3b1613382b53af95421c12cb602dd50b11e50980d7d07f2
  • kernel-debug-devel-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:3bd8d12ea571aa031bf45c521ecba926d921408d2942e053c4e6a976db1f4eeb
  • kernel-debug-modules-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:69357a92d6db8f07e784412afa98a314dd25063aa75bccbd3fee35c80c809eb9
  • kernel-debug-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:0337bffebd56a446d89c348a6fd8996979f6ec6809a9489140799814cb156369
  • kernel-debug-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:e7142fecbd12b3becedf419263ab1947d4efe837a39dcc1037bb51d5ebfc9ebd
  • kernel-devel-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:1def5ea776f706c037febb7b381bb87beca4b5e34c3b05bb1508ab18babc0b3e
  • kernel-headers-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:09b628cd3b7fca98d41b5fc889bf5f1cc0e00f222d6e40ddf9dd971f393de43f
  • kernel-ipaclones-internal-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:3f9111207281e986e0e96df0cb1b4c1d10804f2ae54bf271967d7c07b8bfb556
  • kernel-modules-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:d2765c477f80123a516abe0259ddbebc2762f52c25b6ebe4b02e426e9f598b97
  • kernel-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:a674cfeb86c423c263f736d0dacaf4881b60ec80f01e684319faaea155fe679f
  • kernel-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:c1108fc7373449b7c4f2a22a69f603c77f864840551b1661feedf6a7848d70ff
  • kernel-selftests-internal-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:343576fba8a21b3909c4b32bd17b34387c924ccd17a438b76bd136190cbad2bf
  • kernel-tools-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:2835910f9c1750bf193f965f3d4593f943a8b251b474d3844917608c264ec3c8
  • kernel-tools-libs-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:8fc273732f0dd76ea70345fa72bf088fd4e585f276e16d4e3e0fe369afafd9d8
  • kernel-tools-libs-devel-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:865eab12d64843cf323fb3179c86a48b102cec19d1bf7c7dffdc0416e92155d4
  • perf-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:a1c215680701dfac6736a740810b09b93f9fec4a75002ec79e65bd7568d4b8f5
  • python3-perf-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm
    sha:ccf9e336c7b55b4acd1820bd251d32a20af39722396cf599b4abd19201f288ec
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.