Release date:
2024-05-06 13:00:25 UTC
Description:
- IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests {CVE-2023-52474}
- af_unix: Fix null-ptr-deref in unix_stream_sendpage(). {CVE-2023-4622}
- sched/rt: pick_next_rt_entity(): check list_entry {CVE-2023-1077}
- RDMA/irdma: Prevent zero-length STAG registration {CVE-2023-25775}
- block: add check that partition length needs to be aligned with block size {CVE-2023-52458}
- bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS {CVE-2024-26589}
- bpf: fix check for attempt to corrupt spilled pointer {CVE-2023-52462}
- KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache {CVE-2024-26598}
- ext4: regenerate buddy after block freeing failed if under fc replay {CVE-2024-26601}
- ext4: allow ext4_get_group_info() to fail {CVE-2024-26601}
- mlxsw: spectrum_acl_tcam: Fix stack corruption {CVE-2024-26586}
- EDAC/thunderx: Fix possible out-of-bounds string access {CVE-2023-52464}
- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() {CVE-2023-52470}
- drivers/amd/pm: fix a use-after-free in kv_parse_power_table {CVE-2023-52469}
- md/raid5: fix atomicity violation in raid5_cache_count {CVE-2024-23307}
- igb: set max size RX buffer when store bad packet is enabled {CVE-2023-45871}
- netfilter: nft_set_rbtree: skip end interval element from gc {CVE-2024-26581}
- netfilter: nf_tables: check if catch-all set element is active in next generation {CVE-2024-1085}
- netfilter: nf_tables: skip set commit for deleted/destroyed sets {CVE-2024-0193}
- netfilter: nft_set_pipapo: skip inactive elements during set walk {CVE-2023-6817}
- netfilter: nf_tables: split async and sync catchall in two functions {CVE-2023-4244}
- netfilter: nf_tables: remove catchall element in GC sync path {CVE-2023-4244}
- netfilter: nf_tables: expose opaque set element as struct nft_elem_priv {CVE-2023-4244}
- netfilter: nf_tables: set backend .flush always succeeds {CVE-2023-4244}
- netfilter: nft_set_pipapo: no need to call pipapo_deactivate() from flush {CVE-2023-4244}
- netfilter: nf_tables: work around newrule after chain binding {CVE-2023-4244}
- netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure {CVE-2023-4244}
- netfilter: nf_tables: fix memleak when more than 255 elements expired {CVE-2023-4244}
- netfilter: nf_tables: disable toggling dormant table state more than once {CVE-2023-4244}
- netfilter: nf_tables: disallow element removal on anonymous sets {CVE-2023-4244}
- netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration {CVE-2023-4244}
- netfilter: nft_set_pipapo: stop GC iteration if GC transaction allocation fails {CVE-2023-4244}
- netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention {CVE-2023-4244}
- netfilter: nft_set_pipapo: call nft_trans_gc_queue_sync() in catchall GC {CVE-2023-4244}
- netfilter: nf_tables: disallow rule removal from chain binding {CVE-2023-4244}
- netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction {CVE-2023-4244}
- netfilter: nf_tables: defer gc run if previous batch is still pending {CVE-2023-4244}
- netfilter: nf_tables: fix out of memory error handling {CVE-2023-4244}
- netfilter: nf_tables: use correct lock to protect gc_list {CVE-2023-4244}
- netfilter: nf_tables: GC transaction race with abort path {CVE-2023-4244}
- netfilter: nf_tables: flush pending destroy work before netlink notifier {CVE-2023-4244}
- netfilter: nft_dynset: disallow object maps {CVE-2023-4244}
- netfilter: nf_tables: GC transaction race with netns dismantle {CVE-2023-4244}
- netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path {CVE-2023-4244}
- netfilter: nf_tables: don't fail inserts if duplicate has expired {CVE-2023-4244}
- netfilter: nf_tables: deactivate catchall elements in next generation {CVE-2023-4244}
- netfilter: nf_tables: fix kdoc warnings after gc rework {CVE-2023-4244}
- netfilter: nf_tables: fix false-positive lockdep splat {CVE-2023-4244}
- netfilter: nf_tables: remove busy mark and gc batch API {CVE-2023-4244}
- netfilter: nft_set_hash: mark set element as dead when deleting from packet path {CVE-2023-4244}
- netfilter: nf_tables: adapt set backend to use GC transaction API {CVE-2023-4244}
- netfilter: nft_set_rbtree: fix overlap expiration walk {CVE-2023-4244}
- netfilter: nf_tables: GC transaction API to avoid race with control plane {CVE-2023-4244}
- netfilter: nf_tables: don't skip expired elements during walk {CVE-2023-4244}
- netfilter: nf_tables: skip bound chain in netns release path {CVE-2023-4244}
- netfilter: nf_tables: fix spurious set element insertion failure {CVE-2023-4244}
- netfilter: nf_tables: report use refcount overflow {CVE-2023-4244}
- netfilter: nf_tables: fix underflow in chain reference counter {CVE-2023-4244}
- netfilter: nf_tables: disallow timeout for anonymous sets {CVE-2023-4244}
- netfilter: nf_tables: disallow updates of anonymous sets {CVE-2023-4244}
- netfilter: nf_tables: reject unbound chain set before commit phase {CVE-2023-4244}
- netfilter: nf_tables: reject unbound anonymous set before commit phase {CVE-2023-4244}
- netfilter: nf_tables: disallow element updates of bound anonymous sets {CVE-2023-4244}
- netfilter: nf_tables: fix underflow in object reference counter {CVE-2023-4244}
- netfilter: nf_tables: drop map element references from preparation phase {CVE-2023-4244}
- netfilter: nf_tables: validate variable length element extension {CVE-2023-4244}
- netfilter: nft_set_pipapo: .walk does not deal with generations {CVE-2023-4244}
- netfilter: nf_tables: relax set/map validation checks {CVE-2023-4244}
- netfilter: nf_tables: integrate pipapo into commit protocol {CVE-2023-4244}
- netfilter: nf_tables: upfront validation of data via nft_data_init() {CVE-2023-4244}
- netfilter: nft_set_rbtree: fix null deref on element insertion
- netfilter: nft_set_rbtree: Switch to node list walk for overlap detection
- netfilter: nft_set_rbtree: skip elements in transaction from garbage collection
- netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR {CVE-2023-4015}
- netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() {CVE-2023-7192}
- Documentation/hw-vuln: Fix rST warning {CVE-2022-27672}
- Documentation/hw-vuln: Add documentation for Cross-Thread Return Predictions {CVE-2022-27672}
- KVM: x86: Mitigate the cross-thread return address predictions bug {CVE-2022-27672}
- x86/speculation: Identify processors vulnerable to SMT RSB predictions {CVE-2022-27672}
- uio: Fix use-after-free in uio_open {CVE-2023-52439}
- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump {CVE-2023-52448}
Updated packages:
-
bpftool-7.0.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:6442adad3f5a8ae5ea2fc2de11510bc5d659f59c
-
kernel-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:13e0cc393629b8bff94ffb95eac442b6883876ba
-
kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els3.noarch.rpm
sha:04f87a9b0b9f7d7601ff5632829a303184f1f279
-
kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:359b3ed2cf5e2463eca0fc3ed21210d73cdff35c
-
kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:39dec9b5d52f9e8c19a70b6fa958b2d4be79f802
-
kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:5d735bc3f70489c47684f39316d0715e3d6ae52f
-
kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:4141bea819737cc927ab360cc6ca0dd9c447789a
-
kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:597368cd5815f0beace3957e69e120b15c359727
-
kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:3fcc1d6d64792cf40553651818e8fb7f7edc26df
-
kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:866a73c87e08c1c61a30dd8662a2720aae2d12c2
-
kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:83c69b4937f27be59eccde49a3f9eb16be14a158
-
kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:3f9a82ab793c5c63236927eef224679c08049c83
-
kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:2b0672c8900e1f425116e1a6207711f5a35a9ea3
-
kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:380d516be11caf38e7dd3e2603dcb92dde9317dc
-
kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:52242da54d39beb385cf18ce0534f4fdbffeae11
-
kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:d811ca96f2c33f59503ddf70ebb21c2a26d54227
-
kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:5b4dda46f88fd559926b1b87f027247ce19725f3
-
kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els3.noarch.rpm
sha:786871b95d417efb95c38d6eadc86a56b43569ed
-
kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:4d883eda5d7e9ee27aa20e68a08e32d15eedeac8
-
kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:defb8fc7f865b0f1884cca8b5d983c7c896d8bf8
-
kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:32a3712fad61433a0d7880bcb0e1f464d357bee3
-
kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:fa07a13abd1558c8b95ec295ab8d605aca0b3082
-
kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:191b45e4f815acf465b9428d67fb301b6ecd51ee
-
kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:a78c5c33b3751834bab692ff2cd822775d6b95e6
-
kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:c0e12d1bd955081af93b1e0d2b857e32acdf7ba2
-
kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:90d274c4d8eb627fced2f483123b390328ae86a9
-
kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:b65546e96e236ac98d626d0093227ec139d5f408
-
kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:08aa8dda5bd137facdbe94c323ad44c459c5ea2e
-
kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:e025e0719732d2c606a30f4a0291fbdace1981af
-
kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:6bd62463f390d8d17bef21618181cc3f8631548c
-
perf-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:c0e9e3be5aa852232b446265cf526fa19c75c3b6
-
python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:30f3ed226e0b026f74f7d972e2f725d8ed519db8
-
rtla-5.14.0-284.30.1.el9_2.tuxcare.els3.x86_64.rpm
sha:694932a334553d70dd75875312bd6bfd4ebda132
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.