[CLSA-2024:1722533082] kernel: Fix of 47 CVEs
Type:
security
Severity:
Important
Release date:
2024-08-01 17:34:23 UTC
Description:
- af_unix: Fix garbage collector racing against connect() {CVE-2024-26923} - netfilter: nft_limit: reject configurations that cause integer overflow {CVE-2024-26668} - libbpf: Fix use-after-free in btf_dump_name_dups {CVE-2022-3534} - bpf: Fix partial dynptr stack slot reads/writes {CVE-2023-39191} - ima: Fix use-after-free on a dentry's dname.name {CVE-2024-39494} - ima: define ima_max_digest_data struct without a flexible array variable - ima: detect changes to the backing overlay file - tpm: fix reference counting for struct tpm_chip {CVE-2022-2977} - tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux {CVE-2023-6546} - tty: n_gsm: fix restart handling via CLD command - r8169: Fix possible ring buffer corruption on fragmented Tx packets. {CVE-2024-38586} - netfilter: tproxy: bail out if IP has been disabled on the device {CVE-2024-36270} - tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). {CVE-2024-36904} - Bluetooth: Fix double free in hci_conn_cleanup {CVE-2023-28464} - fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super {CVE-2024-0841} - net/ipv6: avoid possible UAF in ip6_route_mpath_notify() {CVE-2024-26852} - tipc: fix UAF in error path {CVE-2024-36886} - Bluetooth: af_bluetooth: Fix deadlock {CVE-2024-26886} - Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg {CVE-2023-51779} - dma-mapping: benchmark: handle NUMA_NO_NODE correctly {CVE-2024-39277} - net/mlx5e: Prevent deadlock while disabling aRFS {CVE-2024-27014} - net/mlx5e: Introduce flow steering API {CVE-2024-27014} - x86/sev: Harden #VC instruction emulation somewhat {CVE-2024-25742} - x86/coco: Disable 32-bit emulation by default on TDX and SEV {CVE-2024-25742} - x86: Introduce ia32_enabled() {CVE-2024-25742} - x86/entry: Do not allow external 0x80 interrupts {CVE-2024-25742} - x86/entry: Convert INT 0x80 emulation to IDTENTRY {CVE-2024-25742} - RDMA/srpt: Support specifying the srpt_service_guid parameter {CVE-2024-26744} - platform/x86: think-lmi: Fix reference leak {CVE-2023-52520} - USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command {CVE-2024-27059} - fat: fix uninitialized field in nostale filehandles {CVE-2024-26973} - usb: xhci: Add error handling in xhci_map_urb_for_dma {CVE-2024-26964} - wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete {CVE-2024-26897} - wifi: mac80211: fix race condition on enabling fast-xmit {CVE-2024-26779} - RDMA/qedr: Fix qedr_create_user_qp error flow {CVE-2024-26743} - wifi: iwlwifi: fix a memory corruption {CVE-2024-26610} - x86/fpu: Stop relying on userspace for info to fault in xsave buffer {CVE-2024-26603} - wifi: rt2x00: restart beacon queue when hardware reset {CVE-2023-52595} - wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594} - net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg {CVE-2023-52528} - RDMA/siw: Fix connection failure handling {CVE-2023-52513} - usb: hub: Guard against accesses to uninitialized BOS descriptors {CVE-2023-52477} - tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc {CVE-2021-47185} - sctp: fail if no bound addresses can be used for a given scope {CVE-2023-1074} - memcg: enable accounting for file lock caches {CVE-2022-0480} - net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() {CVE-2023-6176} - RDMA/srpt: Do not register event handler until srpt device is fully setup {CVE-2024-26872} - drm/amd/display: Atom Integrated System Info v2_2 for DCN35 {CVE-2024-36897} - net/mlx5e: fix a potential double-free in fs_any_create_groups {CVE-2023-52667} - ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() {CVE-2024-36902} - ipv6: prevent NULL dereference in ip6_output() {CVE-2024-36901} - vt: fix memory overlapping when deleting chars in the buffer {CVE-2022-48627} - hwmon: (coretemp) Fix out-of-bounds memory access {CVE-2024-26664} - i2c: Fix a potential use after free {CVE-2019-25162} - net/smc: fix illegal rmb_desc access in SMC-D connection dump {CVE-2024-26615}
Updated packages:
  • bpftool-7.0.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:21d40bbb4c1e1aee8f93f806899841ab18e03d13
  • kernel-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:876d6e29ee7de52a2bbdf11e45252528c4c495c3
  • kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els5.noarch.rpm
    sha:ea78562fd642bb755289c4b1b6cff24a08ec6c51
  • kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:35ce1dd58aa6ba442a97492795889a8ab0ecc86d
  • kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:031c5edb78a239fca5028bc3726b9db9c76d29a2
  • kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:b46d88415990ce95e2d735ccc0df7f13c878e9f6
  • kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:b83f632cc5c96126d8092f4df62f4680e74e5fee
  • kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:106a5edca300498ac51377b8f6a5710451ca3c4a
  • kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:47f79dd89ca4a8b8ad26cc86da39685ff7e3896e
  • kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:55ca846a5b3334be664da5e26274a14fa799fd2f
  • kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:2490771fc847b54d9284356fb9bf7715a5433744
  • kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:ae9e8218813104019477a7c1569be18abd80bafe
  • kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:7330cf66b1401c363ab0cc22169cd522eca81112
  • kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:bbc0fd2f86776f9cdd3fe6797302d2cddde4accc
  • kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:3e1e9d721f39942b94cdcf11df3e93070315a712
  • kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:1c4c23703a92f8e743f7d7c1da64ef4e0e3f8188
  • kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:396172e4e785fe7d38e4ff24f47bf9bb290c88a0
  • kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els5.noarch.rpm
    sha:fc22db82e4a51ff9d79aceff3d88be9fc07954b6
  • kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:8f0c06cfbace893d07edb972718a7f58eadf7bd3
  • kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:05e0efe0e594cd13fd537e0341f62a6db2ec0489
  • kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:01abf4e6f14cfd853cdb7b35649eb817b8a04633
  • kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:f04989bd444d0dbf9e6b1b39c7400f281cb7655c
  • kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:8697ef993da585850a19bf543cf50764adcb58b4
  • kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:3177d17a2906814d8122b4e73c625cf4800e26f0
  • kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:0fc6a5118f66f37a090b1c5e7d076157ece37ebf
  • kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:0cf8d2167bc53f9f61a322430c8e63436436a963
  • kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:979d56c45d5b8d9d0e0bb9d78f90d0720f1977f0
  • kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:687f44f760ff9194b75198dfde9f9ad0993bd259
  • kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:24d81fb2e52974870cf6325b0b2074ebdb838ac3
  • kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:75ee6f2ac698cd63cec37af76612c49654504e5d
  • perf-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:dcea07178e520e118da10a6b1ec66c931b7e148f
  • python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:9575be8d9ee6235ec41596ea90485c9f2be6e21b
  • rtla-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
    sha:5c6e016058bb30388246945847a1e2613fe78a3f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.