Release date:
2024-04-08 07:48:46 UTC
Description:
- bpf: Fix re-attachment branch in bpf_tracing_prog_attach {CVE-2024-26591}
- ext4: improve error recovery code paths in __ext4_remount() {CVE-2024-0775}
- smb: client: fix OOB in receive_encrypted_standard() {CVE-2024-0565}
- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier {CVE-2023-52449}
- net: prevent mss overflow in skb_segment() {CVE-2023-52435}
- smb: client: fix potential OOBs in smb2_parse_contexts() {CVE-2023-52434}
- atm: Fix Use-After-Free in do_vcc_ioctl {CVE-2023-51780}
- ida: Fix crash in ida_free when the bitmap is empty {CVE-2023-6915}
- nvmet: nul-terminate the NQNs passed in the connect command {CVE-2023-6121}
- netfilter: nf_tables: Reject tables of unsupported family {CVE-2023-6040}
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work {CVE-2023-1989}
- NFSD: fix use-after-free in nfsd4_ssc_setup_dul() {CVE-2023-1652}
- x86/bugs: Flush IBP in ib_prctl_set() {CVE-2023-0045}
- Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934}
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm {CVE-2022-42896}
- x86: Clear .brk area at early boot {CVE-2022-36123}
- misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os {CVE-2022-3424}
- Fix double fget() in vhost_net_set_backend() {CVE-2023-1838}
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380}
- netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one {CVE-2023-39197}
- relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268}
- ipv6: rpl: Fix Route of Death. {CVE-2023-2156}
- ipv6: Fix out-of-bounds access in ipv6_find_tlv() {CVE-2023-2156}
- net: rpl: fix rpl header size calculation {CVE-2023-2156}
- memstick: r592: Fix UAF bug in r592_remove due to race condition {CVE-2023-3141}
- ovl: fix use after free in struct ovl_aio_req {CVE-2023-1252}
- drm/amdgpu: Fix potential fence use-after-free v2 {CVE-2023-51042}
- netfilter: nf_tables: reject QUEUE/DROP verdict parameters {CVE-2024-1086}
- perf: Fix perf_event_validate_size() lockdep splat {CVE-2023-6931}
- perf: Fix perf_event_validate_size() {CVE-2023-6931}
- drm/atomic: Fix potential use-after-free in nonblocking commits {CVE-2023-51043}
- nvmet-tcp: Fix the H2C expected PDU len calculation {CVE-2023-6356}
- nvmet-tcp: remove boilerplate code {CVE-2023-6356}
- nvmet-tcp: fix a crash in nvmet_req_complete() {CVE-2023-6356}
- nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length {CVE-2023-6356}
- net: tls, update curr on splice as well {CVE-2024-0646}
- smb: client: fix potential OOB in smb2_dump_detail() {CVE-2023-6610}
- smb: client: fix potential OOB in cifs_dump_detail() {CVE-2023-6610}
- smb: client: fix OOB in smbCalcSize() {CVE-2023-6606}
- ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932}
- RDMA/core: Update CMA destination address on rdma_resolve_addr {CVE-2023-2176}
- RDMA/core: Refactor rdma_bind_addr {CVE-2023-2176}
- nfp: fix use-after-free in area_cache_get() {CVE-2022-3545}
- netfilter: nf_tables: skip bound chain on rule flush {CVE-2023-3777}
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283}
- drivers: net: slip: fix NPD bug in sl_tx_timeout() {CVE-2022-41858}
- net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve {CVE-2023-4623}
- net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623}
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567}
- nvmet-tcp: Fix a possible UAF in queue intialization setup {CVE-2023-5178}
- net: tun: fix bugs for oversize packet when napi frags enabled {CVE-2023-3812}
- netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c {CVE-2023-42753}
- bpf: Fix incorrect verifier pruning due to missing register precision taints {CVE-2023-2163}
- net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4206}
- net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4207}
- net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4208}
- net/sched: cls_u32: Fix reference counter leak leading to overflow {CVE-2023-3609}
Updated packages:
-
bpftool-7.0.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:23e4d0d0b4e436f45e51e428d09d0c8fa9da3e65
-
kernel-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:b4f80a99627fe74a56d10c538b4e5436cee65c47
-
kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els2.noarch.rpm
sha:d373e18ed631f21b15f8254f7f66d3c2814aa720
-
kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:05484b11cfdb1964a980f508df17ecef051ea8d6
-
kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:feb96991bd501c4e23e4b0ffd9d62b1a0b3f3a77
-
kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:3809ad5dfbb4328a3aca74a54b2060a907e537ea
-
kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:fd9d3d802cd9dbaf7917e4974ba05b68f5634d63
-
kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:78ccd46cd1cea67cb6a0d6978c265c2a6e20ce83
-
kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:94ba293abe9f33eba88e0fb4b789e5f9276a39ad
-
kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:c353dce64621d05e874fb31605715ff10192bdc3
-
kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:1e48bbdd4c8319cff5210dd93c9ec71ec06bf4a8
-
kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:82edb4ac6ec1dce4ccd1a90f005cf47c87514c74
-
kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:938d2ee2fec1b8aea3fa1c0ee77622c21f79befb
-
kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:be33a54ea53dde914589eb441a0386a221af235b
-
kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:7793f3f0e6837430ed3cb9005bc35d6117ffa722
-
kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:400b6dd47bcd2d5f7f54711293f01481ec6f77b6
-
kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:14a1bb4904ff07c4207963017ae9358d11fa3c94
-
kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els2.noarch.rpm
sha:5858feba19277fa5b70ea9b7d50c226303252836
-
kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:9a3f5996e0d13f2dd01e1a267ad8766b13e20c08
-
kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:73db7042ae1561a51a8a90ddd684ba11cbfa9276
-
kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:c5e2f5332469bb1a508d1efd32bdfe5d8bcd7e9d
-
kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:df5853ca914b89ee3b09f4a826323e1d669a66c1
-
kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:d614c269054154d79c87472fb53090663b33c8b2
-
kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:8bc5e6abbbf3f70527d07dae033dd85f9df20f96
-
kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:b833eb3f6945d793bc21686d13053008ef291dfd
-
kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:cdfd665ad074e064942b290d8846eec6adb5e2f9
-
kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:f1a4363ec584256b71f6e61c90db2566b6c9207c
-
kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:32006cce633427eb7072d12c801e31cae836876b
-
kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:bf68ad689472de690255f5adbb08acf1f1187856
-
kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:c9b4916637c2306dbf400f5dbfb85d87002e6ffd
-
perf-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:27008e4ac076840f7976f6bdc43e797dd81ebc0b
-
python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:6468fb03c63613b688c24c93658ee5c317ddf1a0
-
rtla-5.14.0-284.30.1.el9_2.tuxcare.els2.x86_64.rpm
sha:5cf0f2aaafc194ee47f3f2d63dd3ea14793b3e20
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.