[CLSA-2024:1712263970] kernel: Fix of 48 CVEs
Type:
security
Severity:
Critical
Release date:
2024-04-08 07:48:46 UTC
Description:
- bpf: Fix re-attachment branch in bpf_tracing_prog_attach {CVE-2024-26591} - ext4: improve error recovery code paths in __ext4_remount() {CVE-2024-0775} - smb: client: fix OOB in receive_encrypted_standard() {CVE-2024-0565} - mtd: Fix gluebi NULL pointer dereference caused by ftl notifier {CVE-2023-52449} - net: prevent mss overflow in skb_segment() {CVE-2023-52435} - smb: client: fix potential OOBs in smb2_parse_contexts() {CVE-2023-52434} - atm: Fix Use-After-Free in do_vcc_ioctl {CVE-2023-51780} - ida: Fix crash in ida_free when the bitmap is empty {CVE-2023-6915} - nvmet: nul-terminate the NQNs passed in the connect command {CVE-2023-6121} - netfilter: nf_tables: Reject tables of unsupported family {CVE-2023-6040} - Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work {CVE-2023-1989} - NFSD: fix use-after-free in nfsd4_ssc_setup_dul() {CVE-2023-1652} - x86/bugs: Flush IBP in ib_prctl_set() {CVE-2023-0045} - Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934} - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm {CVE-2022-42896} - x86: Clear .brk area at early boot {CVE-2022-36123} - misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os {CVE-2022-3424} - Fix double fget() in vhost_net_set_backend() {CVE-2023-1838} - wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380} - netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one {CVE-2023-39197} - relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268} - ipv6: rpl: Fix Route of Death. {CVE-2023-2156} - ipv6: Fix out-of-bounds access in ipv6_find_tlv() {CVE-2023-2156} - net: rpl: fix rpl header size calculation {CVE-2023-2156} - memstick: r592: Fix UAF bug in r592_remove due to race condition {CVE-2023-3141} - ovl: fix use after free in struct ovl_aio_req {CVE-2023-1252} - drm/amdgpu: Fix potential fence use-after-free v2 {CVE-2023-51042} - netfilter: nf_tables: reject QUEUE/DROP verdict parameters {CVE-2024-1086} - perf: Fix perf_event_validate_size() lockdep splat {CVE-2023-6931} - perf: Fix perf_event_validate_size() {CVE-2023-6931} - drm/atomic: Fix potential use-after-free in nonblocking commits {CVE-2023-51043} - nvmet-tcp: Fix the H2C expected PDU len calculation {CVE-2023-6356} - nvmet-tcp: remove boilerplate code {CVE-2023-6356} - nvmet-tcp: fix a crash in nvmet_req_complete() {CVE-2023-6356} - nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length {CVE-2023-6356} - net: tls, update curr on splice as well {CVE-2024-0646} - smb: client: fix potential OOB in smb2_dump_detail() {CVE-2023-6610} - smb: client: fix potential OOB in cifs_dump_detail() {CVE-2023-6610} - smb: client: fix OOB in smbCalcSize() {CVE-2023-6606} - ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932} - RDMA/core: Update CMA destination address on rdma_resolve_addr {CVE-2023-2176} - RDMA/core: Refactor rdma_bind_addr {CVE-2023-2176} - nfp: fix use-after-free in area_cache_get() {CVE-2022-3545} - netfilter: nf_tables: skip bound chain on rule flush {CVE-2023-3777} - Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283} - drivers: net: slip: fix NPD bug in sl_tx_timeout() {CVE-2022-41858} - net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve {CVE-2023-4623} - net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623} - vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567} - nvmet-tcp: Fix a possible UAF in queue intialization setup {CVE-2023-5178} - net: tun: fix bugs for oversize packet when napi frags enabled {CVE-2023-3812} - netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c {CVE-2023-42753} - bpf: Fix incorrect verifier pruning due to missing register precision taints {CVE-2023-2163} - net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4206} - net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4207} - net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4208} - net/sched: cls_u32: Fix reference counter leak leading to overflow {CVE-2023-3609}
Updated packages:
  • bpftool-7.0.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:23e4d0d0b4e436f45e51e428d09d0c8fa9da3e65
  • kernel-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:b4f80a99627fe74a56d10c538b4e5436cee65c47
  • kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els2.noarch.rpm
    sha:d373e18ed631f21b15f8254f7f66d3c2814aa720
  • kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:05484b11cfdb1964a980f508df17ecef051ea8d6
  • kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:feb96991bd501c4e23e4b0ffd9d62b1a0b3f3a77
  • kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:3809ad5dfbb4328a3aca74a54b2060a907e537ea
  • kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:fd9d3d802cd9dbaf7917e4974ba05b68f5634d63
  • kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:78ccd46cd1cea67cb6a0d6978c265c2a6e20ce83
  • kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:94ba293abe9f33eba88e0fb4b789e5f9276a39ad
  • kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:c353dce64621d05e874fb31605715ff10192bdc3
  • kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:1e48bbdd4c8319cff5210dd93c9ec71ec06bf4a8
  • kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:82edb4ac6ec1dce4ccd1a90f005cf47c87514c74
  • kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:938d2ee2fec1b8aea3fa1c0ee77622c21f79befb
  • kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:be33a54ea53dde914589eb441a0386a221af235b
  • kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:7793f3f0e6837430ed3cb9005bc35d6117ffa722
  • kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:400b6dd47bcd2d5f7f54711293f01481ec6f77b6
  • kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:14a1bb4904ff07c4207963017ae9358d11fa3c94
  • kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els2.noarch.rpm
    sha:5858feba19277fa5b70ea9b7d50c226303252836
  • kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:9a3f5996e0d13f2dd01e1a267ad8766b13e20c08
  • kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:73db7042ae1561a51a8a90ddd684ba11cbfa9276
  • kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:c5e2f5332469bb1a508d1efd32bdfe5d8bcd7e9d
  • kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:df5853ca914b89ee3b09f4a826323e1d669a66c1
  • kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:d614c269054154d79c87472fb53090663b33c8b2
  • kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:8bc5e6abbbf3f70527d07dae033dd85f9df20f96
  • kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:b833eb3f6945d793bc21686d13053008ef291dfd
  • kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:cdfd665ad074e064942b290d8846eec6adb5e2f9
  • kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:f1a4363ec584256b71f6e61c90db2566b6c9207c
  • kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:32006cce633427eb7072d12c801e31cae836876b
  • kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:bf68ad689472de690255f5adbb08acf1f1187856
  • kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:c9b4916637c2306dbf400f5dbfb85d87002e6ffd
  • perf-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:27008e4ac076840f7976f6bdc43e797dd81ebc0b
  • python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:6468fb03c63613b688c24c93658ee5c317ddf1a0
  • rtla-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
    sha:5cf0f2aaafc194ee47f3f2d63dd3ea14793b3e20
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.