Release date:
2024-06-24 12:10:19 UTC
Description:
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() {CVE-2024-26882}
- tls: fix use-after-free on failed backlog decryption {CVE-2024-26800}
- tls: separate no-async decryption request handling from async {CVE-2024-26584}
- tls: decrement decrypt_pending if no async completion will be called {CVE-2024-26584}
- net: tls: fix use-after-free with partial reads and async decrypt {CVE-2024-26582}
- net: tls: handle backlogging of crypto requests {CVE-2024-26584}
- net: tls: factor out tls_*crypt_async_wait()
- tap: tap_open(): correctly initialize socket uid {CVE-2023-1076}
- tun: tun_chr_open(): correctly initialize socket uid {CVE-2023-1076}
- net: add sock_init_data_uid() {CVE-2023-1076}
- netfilter: nf_tables: bail out on mismatching dynset and set expressions {CVE-2023-6622}
- drm/qxl: fix UAF on handle creation {CVE-2023-39198}
- smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752}
- USB: core: Fix deadlock in port "disable" sysfs attribute {CVE-2024-26933}
- USB: core: Add hub_get() and hub_put() routines {CVE-2024-26933}
- USB: core: Fix deadlock in usb_deauthorize_interface() {CVE-2024-26934}
- scsi: qla2xxx: Fix double free of fcport {CVE-2024-26929}
- netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() {CVE-2024-27020}
- net: ip_tunnel: prevent perpetual headroom growth {CVE-2024-26804}
- netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout {CVE-2024-26643}
- netfilter: nf_tables: disallow anonymous set with timeout flag {CVE-2024-26642}
- netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations {CVE-2024-26673}
- ipv6: sr: fix possible use-after-free and null-ptr-deref {CVE-2024-26735}
- fs: sysfs: Fix reference leak in sysfs_break_active_protection() {CVE-2024-26993}
- cifs: fix underflow in parse_server_interfaces() {CVE-2024-26828}
- mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path {CVE-2024-26595}
- mlxsw: spectrum_acl_tcam: Move devlink param to TCAM code {CVE-2024-26595}
- mlxsw: spectrum_acl_tcam: Make fini symmetric to init {CVE-2024-26595}
- mlxsw: spectrum_acl_tcam: Add missing mutex_destroy() {CVE-2024-26595}
- net: xfrm: Fix xfrm_address_filter OOB read {CVE-2023-39194}
- exfat: check if filename entries exceeds max filename length {CVE-2023-4273}
- xfrm: add NULL check in xfrm_update_ae_params {CVE-2023-3772}
- firmware: arm_scmi: Harden accesses to the reset domains {CVE-2022-48655}
- tcp: Reduce chance of collisions in inet6_hashfn(). {CVE-2023-1206}
- ipv4: fix null-deref in ipv4_link_failure {CVE-2023-42754}
- netfilter: nfnetlink_osf: avoid OOB read {CVE-2023-39189}
- netfilter: xt_sctp: validate the flag_info count {CVE-2023-39193}
- net: qcom/emac: Fix use after free bug in emac_remove due to race condition {CVE-2023-33203}
- net/tls: tls_is_tx_ready() checked list_entry {CVE-2023-1075}
- HID: asus: use spinlock to safely schedule workers {CVE-2023-1079}
- HID: asus: use spinlock to protect concurrent accesses {CVE-2023-1079}
- HID: intel_ish-hid: Add check for ishtp_dma_tx_map {CVE-2023-3358}
- gfs2: Don't deref jdesc in evict {CVE-2023-3212}
- fbcon: Check font dimension limits {CVE-2023-3161}
- KVM: nVMX: add missing consistency checks for CR0 and CR4 {CVE-2023-30456}
- hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition {CVE-2023-1855}
- Bluetooth: HCI: Fix global-out-of-bounds {CVE-2023-28866}
- HID: check empty report_list in hid_validate_values() {CVE-2023-1073}
- net: mpls: fix stale pointer if allocation fails during device rename {CVE-2023-26545}
- r8152: Rate limit overflow messages {CVE-2022-3594}
- drm/vmwgfx: Fix shader stage validation {CVE-2022-36402}
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory {CVE-2022-42895}
- dm ioctl: fix nested locking in table_clear() to remove deadlock concern {CVE-2023-2269}
- mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy() {CVE-2023-52562}
- i2c: i801: Fix block process call transactions {CVE-2024-26593}
- bpf: Fix hashtab overflow check on 32-bit arches {CVE-2024-26884}
- bpf: Fix stackmap overflow check on 32-bit arches {CVE-2024-26883}
- x86/xen: Add some null pointer checking to smp.c {CVE-2024-26908}
- RDMA/mlx5: Fix fortify source warning while accessing Eth segment {CVE-2024-26907}
- Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security {CVE-2024-26903}
- do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak {CVE-2024-26901}
- aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts {CVE-2024-26898}
Updated packages:
-
bpftool-7.0.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:becc9ad62af9c1316ecf53bf2ccfa01adc148b17
-
kernel-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:0929a42c7a979d028b2c4c03d19fcf858b5b6a3c
-
kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els4.noarch.rpm
sha:6bb8186867ec39701322e0410617c164adf201be
-
kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:92028e585fcac1511bc67d59680da2272e272cdb
-
kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:2a2c22c03d5564cda260be621767d0b6abb06729
-
kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:cce64992dfebac081d2aabfa4e277297d058171f
-
kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:e87b80555e25189a0a661f9f40fc012e6c8f3822
-
kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:76e5a76e20e8d36f17e5ac7e58723bcf96ba01b1
-
kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:954da8dc63c6a89840ac151778e6e6ad94324f7a
-
kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:705abd7a56cdbd2c8efba356e46d0f1b5fb374b4
-
kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:1d5a7db605e40ce503a719ee7545c4a2862a4476
-
kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:d34ddcbc4e1de60fa7aae611aec863c5dd55e5e8
-
kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:60adc351d0658a7e862f63aa3fc777d88555afa7
-
kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:2ac5d962efc6b8b0edccf3081b4b91884de74d3f
-
kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:69265b08b0ce144906926938a30044b08069fe6f
-
kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:ddd17e149abe1abf1b7e4415e4b792d711cd2b91
-
kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:79d11a4ebdfab62f4e61de1bc4a3bb09d2ee1b3b
-
kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els4.noarch.rpm
sha:a72ac96d81b601bf50ea748605091210dbb1fd5d
-
kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:e6b01c9b0c8a8a12041788eab245090cff7ad77a
-
kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:1ee9d8694a136fb7ea287e4c4c35992e95c85915
-
kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:d535f4ef23dc646a31858cfe5ab0ead4b9177641
-
kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:da5c472a6e6a2f7a93704544007ef5998a9f103a
-
kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:441f9db629346b07608b10a44a3ba0fc2d4a413c
-
kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:21be679d05fe3a38ead9a7e1c34bb2eb09842249
-
kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:ec303e713bb8ded5d03f35141cd85e78666ed1a5
-
kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:f8148ef256cee2e9c404b6c49cb141e3726f7c31
-
kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:c94ddff9c4b948d2d173e9cfba23d789faa58e84
-
kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:0a02591416924272aecb9aa50dca5ea5d0e5f5f1
-
kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:e6aa7eebf03d3d6641513130e62b37312fb2a320
-
kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:30c2602ceff4c5280e117d89366f5fa0ee9b5b96
-
perf-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:fdd16f53c28ffc139c7ec7f876d2959b7d0870a5
-
python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:49d46cae109dca9608c632b85debc7e207f7bdf5
-
rtla-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
sha:3ca81b568ebc5801fc76a179eff70ba5ce1c9c92
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.