[CLSA-2024:1725293298] kernel: Fix of 37 CVEs
Type:
security
Severity:
Critical
Release date:
2024-09-02 16:08:22 UTC
Description:
- tun: add missing verification for short frame {CVE-2024-41091} - tap: add missing verification for short frame {CVE-2024-41090} - drm/amd/display: Fix potential index out of bounds in color transformation function {CVE-2024-38552} - net: fix __dst_negative_advice() race {CVE-2024-36971} - net: annotate data-races around sk->sk_dst_pending_confirm {CVE-2024-36971} - net: fix out-of-bounds access in ops_init {CVE-2024-36883} - net/sched: flower: Fix chain template offload {CVE-2024-26669} - netfilter: nf_tables: use timestamp to check for set element timeout {CVE-2024-27397} - netfilter: nft_set_rbtree: Remove unused variable nft_net {CVE-2024-27397} - netfilter: nft_set_rbtree: prefer sync gc to async worker {CVE-2024-27397} - netfilter: nft_set_rbtree: rename gc deactivate+erase function {CVE-2024-27397} - netfilter: nf_tables: de-constify set commit ops function argument {CVE-2024-27397} - netfilter: nft_set_rbtree: .deactivate fails if element has expired {CVE-2024-27397} - sched/membarrier: reduce the ability to hammer on sys_membarrier {CVE-2024-26602} - drm/vmwgfx: Fix possible null pointer derefence with invalid contexts {CVE-2022-38096} - sched/psi: Fix use-after-free in ep_remove_wait_queue() {CVE-2023-52707} - wait: add wake_up_pollfree() {CVE-2023-52707} - x86/sev: Check for user-space IOIO pointing to kernel space {CVE-2023-46813} - x86/sev: Check IOBM for IOIO exceptions from user-space {CVE-2023-46813} - x86/sev: Disable MMIO emulation from user mode {CVE-2023-46813} - tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). {CVE-2024-37356} - blk-cgroup: fix list corruption from reorder of WRITE ->lqueued {CVE-2024-38384} - netfilter: complete validation of user input {CVE-2024-35962} - SUNRPC: Fix UAF in svc_tcp_listen_data_ready() {CVE-2023-52885} - PM / devfreq: Synchronize devfreq_monitor_[start/stop] {CVE-2023-52635} - netfilter: validate user input for expected length {CVE-2024-35896} - virtio: delete vq in vp_find_vqs_msix() when request_irq() fails {CVE-2024-37353} - bnxt: prevent skb UAF after handing over to PTP worker {CVE-2022-48637} - net: openvswitch: fix overwriting ct original tuple for ICMPv6 {CVE-2024-38558} - net: core: reject skb_copy(_expand) for fraglist GSO skbs {CVE-2024-36929} - rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation {CVE-2024-36017} - ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound {CVE-2024-33621} - drm/vmwgfx: Fix invalid reads in fence signaled events {CVE-2024-36960} - gro: fix ownership transfer {CVE-2024-35890} - mlxbf_gige: stop interface during shutdown {CVE-2024-35885} - scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() {CVE-2023-52809} - wifi: mt76: replace skb_put with skb_put_zero {CVE-2024-42225} - drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc {CVE-2024-42228} - scsi: mpi3mr: Sanitise num_phys {CVE-2024-42159} - bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD {CVE-2024-42161} - drm/amdgpu/mes: fix use-after-free issue {CVE-2024-38581} - i40e: fix vf may be used uninitialized in this function warning {CVE-2024-36020} - vt: fix unicode buffer corruption when deleting characters {CVE-2024-35823} - ata: libata-core: Fix double free on error {CVE-2024-41087} - netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path {CVE-2024-26925} - tcp_metrics: validate source addr length {CVE-2024-42154}
Updated packages:
  • bpftool-7.0.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:4be750583dd26d5059d9de5ef0c44cf390d2279f0fbf7cbdcb5aa06dccfe6489
  • kernel-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:08df26b90cdfea7e43b6c9328856f6c67b1f6e6d9955dc6051680297e5b3f848
  • kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els6.noarch.rpm
    sha:3fd73616c17d074ab39f4ac3980204382fa757183b130bf00e5d7cfcbe75415a
  • kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:32630864cc1f73a82ec1504a469b5030ca9090b4022bc98f175ba81c1a9fd39d
  • kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:caf96e19cd47c58c889fa54babea94a7145dcab9d45177cf3abbb6ea88228653
  • kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:39a25cd648180ea60df1799fd60ca319371c735a386644d50ae18b77581af0e6
  • kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:e9fcf9d15fcbadfec49f684ed92bc700f6889808921356bc24d9fbdec16c718c
  • kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:36c6aba4754159ecdd4aa12c5819128e903a6583b4791edff7c0a9d393ea98d5
  • kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:3604559218d283f9f4028a065c786ec450bdf832195bdc7eb691bdc2040df361
  • kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:31cfcba5b23d4406d65ad9dc59d94fc52ed7dd8782c2b7c2712038cf42074fd9
  • kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:cea05cc65ba2f3d55e7ab6c24d34af29dde348c53a3841f69c51573a19c3aca1
  • kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:5496cfcf52d6abf6dbd0b7042810fd528093a81e924f4bc59ab6f3758a7d85ae
  • kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:0018e116450b63ac1aa087e27a4b2a1deff7d8e0ff964b60eec432453fff616a
  • kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:713783a122d1132bd030354b47c05e62780f295fc44b3da6fccdb7e29cf3fbb3
  • kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:29baea48a3c5dea8653f2df34730f1b0bde0c6a6f336bc8cc2f6dee3ee3c3aa7
  • kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:31df3a599da87d538839260370409c93c11eaae744d10edc5a25851857fe85f2
  • kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:b7cba3ea79717c86b073e445b197d79a6881a6c7668b8a3dbc72a6f0a9724293
  • kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els6.noarch.rpm
    sha:21241ed2ccff7e37c088a45addfc4eb798dffe52394417f30fdb2e640a048fd4
  • kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:d639f941e82481e47c6ef647bdd6fa17ae819d1bea37dac05718b5b3065c7c0b
  • kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:76e006bff3fd5610650515fab0013602306ee3c3ab3186bba3eb335d89a189b4
  • kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:fba46103d6f591f8e74cd0b3643d7ed19a29a39032f599ffa71ad6c14296a4c1
  • kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:1ff932227e74c3fba6e0ae5e6e4d973ea154af9c468d746ef6b8bbd2e4578f8c
  • kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:c64fafb509c18ea5fd86da14fb13d6aba79dc12d60d6736dccb35816a018d18d
  • kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:18fa07a8ea45250e5eb203a07e72859be1e5067b18292f8d9f80cad668933959
  • kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:59209a77a1d3e3a038d5701815da404b5473cb356c674b1b94275a34c1b40ed8
  • kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:35ed44e8ea5b29a0bdf3b9ee7eedddc6863b85ccc94ad31b40d89c0889a5d190
  • kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:458e3e81d6b940c89df144e87dc9d15f09211f2eb2b6cb06a914ef696b3a2f97
  • kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:5d6dee428800214028061d39d437b2b90cb8101be7153beef31db5babf65aefe
  • kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:d4a6735a90a6d2b7574e31ee3a6bb923cd1df1a186ca3330dcc2df987bd69d68
  • kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:88b5197223618417f5e13acf9b29202c8e8d81bf9b9c29b79840fcb2be37a2e7
  • perf-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:e6ea01b792dbf5898b0f6f7b86a03cbce612195d46215ce1d5f4f6290d56812b
  • python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:8ddb2003844a940e6b9385f5cc519c6732436fdad7abd678aa2f1746ea39a120
  • rtla-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
    sha:5fec51700a0d73b365658fd15fdea0565337121391f696d0497221d1085c98b8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.