[CLSA-2024:1719231016] kernel: Fix of 52 CVEs
Type:
security
Severity:
Important
Release date:
2024-06-24 12:10:19 UTC
Description:
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() {CVE-2024-26882} - tls: fix use-after-free on failed backlog decryption {CVE-2024-26800} - tls: separate no-async decryption request handling from async {CVE-2024-26584} - tls: decrement decrypt_pending if no async completion will be called {CVE-2024-26584} - net: tls: fix use-after-free with partial reads and async decrypt {CVE-2024-26582} - net: tls: handle backlogging of crypto requests {CVE-2024-26584} - net: tls: factor out tls_*crypt_async_wait() - tap: tap_open(): correctly initialize socket uid {CVE-2023-1076} - tun: tun_chr_open(): correctly initialize socket uid {CVE-2023-1076} - net: add sock_init_data_uid() {CVE-2023-1076} - netfilter: nf_tables: bail out on mismatching dynset and set expressions {CVE-2023-6622} - drm/qxl: fix UAF on handle creation {CVE-2023-39198} - smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752} - USB: core: Fix deadlock in port "disable" sysfs attribute {CVE-2024-26933} - USB: core: Add hub_get() and hub_put() routines {CVE-2024-26933} - USB: core: Fix deadlock in usb_deauthorize_interface() {CVE-2024-26934} - scsi: qla2xxx: Fix double free of fcport {CVE-2024-26929} - netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() {CVE-2024-27020} - net: ip_tunnel: prevent perpetual headroom growth {CVE-2024-26804} - netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout {CVE-2024-26643} - netfilter: nf_tables: disallow anonymous set with timeout flag {CVE-2024-26642} - netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations {CVE-2024-26673} - ipv6: sr: fix possible use-after-free and null-ptr-deref {CVE-2024-26735} - fs: sysfs: Fix reference leak in sysfs_break_active_protection() {CVE-2024-26993} - cifs: fix underflow in parse_server_interfaces() {CVE-2024-26828} - mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path {CVE-2024-26595} - mlxsw: spectrum_acl_tcam: Move devlink param to TCAM code {CVE-2024-26595} - mlxsw: spectrum_acl_tcam: Make fini symmetric to init {CVE-2024-26595} - mlxsw: spectrum_acl_tcam: Add missing mutex_destroy() {CVE-2024-26595} - net: xfrm: Fix xfrm_address_filter OOB read {CVE-2023-39194} - exfat: check if filename entries exceeds max filename length {CVE-2023-4273} - xfrm: add NULL check in xfrm_update_ae_params {CVE-2023-3772} - firmware: arm_scmi: Harden accesses to the reset domains {CVE-2022-48655} - tcp: Reduce chance of collisions in inet6_hashfn(). {CVE-2023-1206} - ipv4: fix null-deref in ipv4_link_failure {CVE-2023-42754} - netfilter: nfnetlink_osf: avoid OOB read {CVE-2023-39189} - netfilter: xt_sctp: validate the flag_info count {CVE-2023-39193} - net: qcom/emac: Fix use after free bug in emac_remove due to race condition {CVE-2023-33203} - net/tls: tls_is_tx_ready() checked list_entry {CVE-2023-1075} - HID: asus: use spinlock to safely schedule workers {CVE-2023-1079} - HID: asus: use spinlock to protect concurrent accesses {CVE-2023-1079} - HID: intel_ish-hid: Add check for ishtp_dma_tx_map {CVE-2023-3358} - gfs2: Don't deref jdesc in evict {CVE-2023-3212} - fbcon: Check font dimension limits {CVE-2023-3161} - KVM: nVMX: add missing consistency checks for CR0 and CR4 {CVE-2023-30456} - hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition {CVE-2023-1855} - Bluetooth: HCI: Fix global-out-of-bounds {CVE-2023-28866} - HID: check empty report_list in hid_validate_values() {CVE-2023-1073} - net: mpls: fix stale pointer if allocation fails during device rename {CVE-2023-26545} - r8152: Rate limit overflow messages {CVE-2022-3594} - drm/vmwgfx: Fix shader stage validation {CVE-2022-36402} - Bluetooth: L2CAP: Fix attempting to access uninitialized memory {CVE-2022-42895} - dm ioctl: fix nested locking in table_clear() to remove deadlock concern {CVE-2023-2269} - mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy() {CVE-2023-52562} - i2c: i801: Fix block process call transactions {CVE-2024-26593} - bpf: Fix hashtab overflow check on 32-bit arches {CVE-2024-26884} - bpf: Fix stackmap overflow check on 32-bit arches {CVE-2024-26883} - x86/xen: Add some null pointer checking to smp.c {CVE-2024-26908} - RDMA/mlx5: Fix fortify source warning while accessing Eth segment {CVE-2024-26907} - Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security {CVE-2024-26903} - do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak {CVE-2024-26901} - aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts {CVE-2024-26898}
Updated packages:
  • bpftool-7.0.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:becc9ad62af9c1316ecf53bf2ccfa01adc148b17
  • kernel-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:0929a42c7a979d028b2c4c03d19fcf858b5b6a3c
  • kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els4.noarch.rpm
    sha:6bb8186867ec39701322e0410617c164adf201be
  • kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:92028e585fcac1511bc67d59680da2272e272cdb
  • kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:2a2c22c03d5564cda260be621767d0b6abb06729
  • kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:cce64992dfebac081d2aabfa4e277297d058171f
  • kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:e87b80555e25189a0a661f9f40fc012e6c8f3822
  • kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:76e5a76e20e8d36f17e5ac7e58723bcf96ba01b1
  • kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:954da8dc63c6a89840ac151778e6e6ad94324f7a
  • kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:705abd7a56cdbd2c8efba356e46d0f1b5fb374b4
  • kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:1d5a7db605e40ce503a719ee7545c4a2862a4476
  • kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:d34ddcbc4e1de60fa7aae611aec863c5dd55e5e8
  • kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:60adc351d0658a7e862f63aa3fc777d88555afa7
  • kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:2ac5d962efc6b8b0edccf3081b4b91884de74d3f
  • kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:69265b08b0ce144906926938a30044b08069fe6f
  • kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:ddd17e149abe1abf1b7e4415e4b792d711cd2b91
  • kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:79d11a4ebdfab62f4e61de1bc4a3bb09d2ee1b3b
  • kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els4.noarch.rpm
    sha:a72ac96d81b601bf50ea748605091210dbb1fd5d
  • kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:e6b01c9b0c8a8a12041788eab245090cff7ad77a
  • kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:1ee9d8694a136fb7ea287e4c4c35992e95c85915
  • kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:d535f4ef23dc646a31858cfe5ab0ead4b9177641
  • kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:da5c472a6e6a2f7a93704544007ef5998a9f103a
  • kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:441f9db629346b07608b10a44a3ba0fc2d4a413c
  • kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:21be679d05fe3a38ead9a7e1c34bb2eb09842249
  • kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:ec303e713bb8ded5d03f35141cd85e78666ed1a5
  • kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:f8148ef256cee2e9c404b6c49cb141e3726f7c31
  • kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:c94ddff9c4b948d2d173e9cfba23d789faa58e84
  • kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:0a02591416924272aecb9aa50dca5ea5d0e5f5f1
  • kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:e6aa7eebf03d3d6641513130e62b37312fb2a320
  • kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:30c2602ceff4c5280e117d89366f5fa0ee9b5b96
  • perf-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:fdd16f53c28ffc139c7ec7f876d2959b7d0870a5
  • python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:49d46cae109dca9608c632b85debc7e207f7bdf5
  • rtla-5.14.0-284.30.1.el9_2.tuxcare.els4.x86_64.rpm
    sha:3ca81b568ebc5801fc76a179eff70ba5ce1c9c92
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.