Release date:
2024-08-01 17:34:23 UTC
Description:
- af_unix: Fix garbage collector racing against connect() {CVE-2024-26923}
- netfilter: nft_limit: reject configurations that cause integer overflow {CVE-2024-26668}
- libbpf: Fix use-after-free in btf_dump_name_dups {CVE-2022-3534}
- bpf: Fix partial dynptr stack slot reads/writes {CVE-2023-39191}
- ima: Fix use-after-free on a dentry's dname.name {CVE-2024-39494}
- ima: define ima_max_digest_data struct without a flexible array variable
- ima: detect changes to the backing overlay file
- tpm: fix reference counting for struct tpm_chip {CVE-2022-2977}
- tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux {CVE-2023-6546}
- tty: n_gsm: fix restart handling via CLD command
- r8169: Fix possible ring buffer corruption on fragmented Tx packets. {CVE-2024-38586}
- netfilter: tproxy: bail out if IP has been disabled on the device {CVE-2024-36270}
- tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). {CVE-2024-36904}
- Bluetooth: Fix double free in hci_conn_cleanup {CVE-2023-28464}
- fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super {CVE-2024-0841}
- net/ipv6: avoid possible UAF in ip6_route_mpath_notify() {CVE-2024-26852}
- tipc: fix UAF in error path {CVE-2024-36886}
- Bluetooth: af_bluetooth: Fix deadlock {CVE-2024-26886}
- Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg {CVE-2023-51779}
- dma-mapping: benchmark: handle NUMA_NO_NODE correctly {CVE-2024-39277}
- net/mlx5e: Prevent deadlock while disabling aRFS {CVE-2024-27014}
- net/mlx5e: Introduce flow steering API {CVE-2024-27014}
- x86/sev: Harden #VC instruction emulation somewhat {CVE-2024-25742}
- x86/coco: Disable 32-bit emulation by default on TDX and SEV {CVE-2024-25742}
- x86: Introduce ia32_enabled() {CVE-2024-25742}
- x86/entry: Do not allow external 0x80 interrupts {CVE-2024-25742}
- x86/entry: Convert INT 0x80 emulation to IDTENTRY {CVE-2024-25742}
- RDMA/srpt: Support specifying the srpt_service_guid parameter {CVE-2024-26744}
- platform/x86: think-lmi: Fix reference leak {CVE-2023-52520}
- USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command {CVE-2024-27059}
- fat: fix uninitialized field in nostale filehandles {CVE-2024-26973}
- usb: xhci: Add error handling in xhci_map_urb_for_dma {CVE-2024-26964}
- wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete {CVE-2024-26897}
- wifi: mac80211: fix race condition on enabling fast-xmit {CVE-2024-26779}
- RDMA/qedr: Fix qedr_create_user_qp error flow {CVE-2024-26743}
- wifi: iwlwifi: fix a memory corruption {CVE-2024-26610}
- x86/fpu: Stop relying on userspace for info to fault in xsave buffer {CVE-2024-26603}
- wifi: rt2x00: restart beacon queue when hardware reset {CVE-2023-52595}
- wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594}
- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg {CVE-2023-52528}
- RDMA/siw: Fix connection failure handling {CVE-2023-52513}
- usb: hub: Guard against accesses to uninitialized BOS descriptors {CVE-2023-52477}
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc {CVE-2021-47185}
- sctp: fail if no bound addresses can be used for a given scope {CVE-2023-1074}
- memcg: enable accounting for file lock caches {CVE-2022-0480}
- net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() {CVE-2023-6176}
- RDMA/srpt: Do not register event handler until srpt device is fully setup {CVE-2024-26872}
- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 {CVE-2024-36897}
- net/mlx5e: fix a potential double-free in fs_any_create_groups {CVE-2023-52667}
- ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() {CVE-2024-36902}
- ipv6: prevent NULL dereference in ip6_output() {CVE-2024-36901}
- vt: fix memory overlapping when deleting chars in the buffer {CVE-2022-48627}
- hwmon: (coretemp) Fix out-of-bounds memory access {CVE-2024-26664}
- i2c: Fix a potential use after free {CVE-2019-25162}
- net/smc: fix illegal rmb_desc access in SMC-D connection dump {CVE-2024-26615}
Updated packages:
-
bpftool-7.0.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:21d40bbb4c1e1aee8f93f806899841ab18e03d13
-
kernel-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:876d6e29ee7de52a2bbdf11e45252528c4c495c3
-
kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els5.noarch.rpm
sha:ea78562fd642bb755289c4b1b6cff24a08ec6c51
-
kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:35ce1dd58aa6ba442a97492795889a8ab0ecc86d
-
kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:031c5edb78a239fca5028bc3726b9db9c76d29a2
-
kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:b46d88415990ce95e2d735ccc0df7f13c878e9f6
-
kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:b83f632cc5c96126d8092f4df62f4680e74e5fee
-
kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:106a5edca300498ac51377b8f6a5710451ca3c4a
-
kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:47f79dd89ca4a8b8ad26cc86da39685ff7e3896e
-
kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:55ca846a5b3334be664da5e26274a14fa799fd2f
-
kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:2490771fc847b54d9284356fb9bf7715a5433744
-
kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:ae9e8218813104019477a7c1569be18abd80bafe
-
kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:7330cf66b1401c363ab0cc22169cd522eca81112
-
kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:bbc0fd2f86776f9cdd3fe6797302d2cddde4accc
-
kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:3e1e9d721f39942b94cdcf11df3e93070315a712
-
kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:1c4c23703a92f8e743f7d7c1da64ef4e0e3f8188
-
kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:396172e4e785fe7d38e4ff24f47bf9bb290c88a0
-
kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els5.noarch.rpm
sha:fc22db82e4a51ff9d79aceff3d88be9fc07954b6
-
kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:8f0c06cfbace893d07edb972718a7f58eadf7bd3
-
kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:05e0efe0e594cd13fd537e0341f62a6db2ec0489
-
kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:01abf4e6f14cfd853cdb7b35649eb817b8a04633
-
kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:f04989bd444d0dbf9e6b1b39c7400f281cb7655c
-
kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:8697ef993da585850a19bf543cf50764adcb58b4
-
kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:3177d17a2906814d8122b4e73c625cf4800e26f0
-
kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:0fc6a5118f66f37a090b1c5e7d076157ece37ebf
-
kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:0cf8d2167bc53f9f61a322430c8e63436436a963
-
kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:979d56c45d5b8d9d0e0bb9d78f90d0720f1977f0
-
kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:687f44f760ff9194b75198dfde9f9ad0993bd259
-
kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:24d81fb2e52974870cf6325b0b2074ebdb838ac3
-
kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:75ee6f2ac698cd63cec37af76612c49654504e5d
-
perf-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:dcea07178e520e118da10a6b1ec66c931b7e148f
-
python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:9575be8d9ee6235ec41596ea90485c9f2be6e21b
-
rtla-5.14.0-284.30.1.el9_2.tuxcare.els5.x86_64.rpm
sha:5c6e016058bb30388246945847a1e2613fe78a3f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.