Release date:
2024-09-02 16:08:22 UTC
Description:
- tun: add missing verification for short frame {CVE-2024-41091}
- tap: add missing verification for short frame {CVE-2024-41090}
- drm/amd/display: Fix potential index out of bounds in color transformation function {CVE-2024-38552}
- net: fix __dst_negative_advice() race {CVE-2024-36971}
- net: annotate data-races around sk->sk_dst_pending_confirm {CVE-2024-36971}
- net: fix out-of-bounds access in ops_init {CVE-2024-36883}
- net/sched: flower: Fix chain template offload {CVE-2024-26669}
- netfilter: nf_tables: use timestamp to check for set element timeout {CVE-2024-27397}
- netfilter: nft_set_rbtree: Remove unused variable nft_net {CVE-2024-27397}
- netfilter: nft_set_rbtree: prefer sync gc to async worker {CVE-2024-27397}
- netfilter: nft_set_rbtree: rename gc deactivate+erase function {CVE-2024-27397}
- netfilter: nf_tables: de-constify set commit ops function argument {CVE-2024-27397}
- netfilter: nft_set_rbtree: .deactivate fails if element has expired {CVE-2024-27397}
- sched/membarrier: reduce the ability to hammer on sys_membarrier {CVE-2024-26602}
- drm/vmwgfx: Fix possible null pointer derefence with invalid contexts {CVE-2022-38096}
- sched/psi: Fix use-after-free in ep_remove_wait_queue() {CVE-2023-52707}
- wait: add wake_up_pollfree() {CVE-2023-52707}
- x86/sev: Check for user-space IOIO pointing to kernel space {CVE-2023-46813}
- x86/sev: Check IOBM for IOIO exceptions from user-space {CVE-2023-46813}
- x86/sev: Disable MMIO emulation from user mode {CVE-2023-46813}
- tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). {CVE-2024-37356}
- blk-cgroup: fix list corruption from reorder of WRITE ->lqueued {CVE-2024-38384}
- netfilter: complete validation of user input {CVE-2024-35962}
- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() {CVE-2023-52885}
- PM / devfreq: Synchronize devfreq_monitor_[start/stop] {CVE-2023-52635}
- netfilter: validate user input for expected length {CVE-2024-35896}
- virtio: delete vq in vp_find_vqs_msix() when request_irq() fails {CVE-2024-37353}
- bnxt: prevent skb UAF after handing over to PTP worker {CVE-2022-48637}
- net: openvswitch: fix overwriting ct original tuple for ICMPv6 {CVE-2024-38558}
- net: core: reject skb_copy(_expand) for fraglist GSO skbs {CVE-2024-36929}
- rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation {CVE-2024-36017}
- ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound {CVE-2024-33621}
- drm/vmwgfx: Fix invalid reads in fence signaled events {CVE-2024-36960}
- gro: fix ownership transfer {CVE-2024-35890}
- mlxbf_gige: stop interface during shutdown {CVE-2024-35885}
- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() {CVE-2023-52809}
- wifi: mt76: replace skb_put with skb_put_zero {CVE-2024-42225}
- drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc {CVE-2024-42228}
- scsi: mpi3mr: Sanitise num_phys {CVE-2024-42159}
- bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD {CVE-2024-42161}
- drm/amdgpu/mes: fix use-after-free issue {CVE-2024-38581}
- i40e: fix vf may be used uninitialized in this function warning {CVE-2024-36020}
- vt: fix unicode buffer corruption when deleting characters {CVE-2024-35823}
- ata: libata-core: Fix double free on error {CVE-2024-41087}
- netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path {CVE-2024-26925}
- tcp_metrics: validate source addr length {CVE-2024-42154}
Updated packages:
-
bpftool-7.0.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:4be750583dd26d5059d9de5ef0c44cf390d2279f0fbf7cbdcb5aa06dccfe6489
-
kernel-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:08df26b90cdfea7e43b6c9328856f6c67b1f6e6d9955dc6051680297e5b3f848
-
kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els6.noarch.rpm
sha:3fd73616c17d074ab39f4ac3980204382fa757183b130bf00e5d7cfcbe75415a
-
kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:32630864cc1f73a82ec1504a469b5030ca9090b4022bc98f175ba81c1a9fd39d
-
kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:caf96e19cd47c58c889fa54babea94a7145dcab9d45177cf3abbb6ea88228653
-
kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:39a25cd648180ea60df1799fd60ca319371c735a386644d50ae18b77581af0e6
-
kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:e9fcf9d15fcbadfec49f684ed92bc700f6889808921356bc24d9fbdec16c718c
-
kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:36c6aba4754159ecdd4aa12c5819128e903a6583b4791edff7c0a9d393ea98d5
-
kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:3604559218d283f9f4028a065c786ec450bdf832195bdc7eb691bdc2040df361
-
kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:31cfcba5b23d4406d65ad9dc59d94fc52ed7dd8782c2b7c2712038cf42074fd9
-
kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:cea05cc65ba2f3d55e7ab6c24d34af29dde348c53a3841f69c51573a19c3aca1
-
kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:5496cfcf52d6abf6dbd0b7042810fd528093a81e924f4bc59ab6f3758a7d85ae
-
kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:0018e116450b63ac1aa087e27a4b2a1deff7d8e0ff964b60eec432453fff616a
-
kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:713783a122d1132bd030354b47c05e62780f295fc44b3da6fccdb7e29cf3fbb3
-
kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:29baea48a3c5dea8653f2df34730f1b0bde0c6a6f336bc8cc2f6dee3ee3c3aa7
-
kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:31df3a599da87d538839260370409c93c11eaae744d10edc5a25851857fe85f2
-
kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:b7cba3ea79717c86b073e445b197d79a6881a6c7668b8a3dbc72a6f0a9724293
-
kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els6.noarch.rpm
sha:21241ed2ccff7e37c088a45addfc4eb798dffe52394417f30fdb2e640a048fd4
-
kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:d639f941e82481e47c6ef647bdd6fa17ae819d1bea37dac05718b5b3065c7c0b
-
kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:76e006bff3fd5610650515fab0013602306ee3c3ab3186bba3eb335d89a189b4
-
kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:fba46103d6f591f8e74cd0b3643d7ed19a29a39032f599ffa71ad6c14296a4c1
-
kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:1ff932227e74c3fba6e0ae5e6e4d973ea154af9c468d746ef6b8bbd2e4578f8c
-
kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:c64fafb509c18ea5fd86da14fb13d6aba79dc12d60d6736dccb35816a018d18d
-
kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:18fa07a8ea45250e5eb203a07e72859be1e5067b18292f8d9f80cad668933959
-
kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:59209a77a1d3e3a038d5701815da404b5473cb356c674b1b94275a34c1b40ed8
-
kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:35ed44e8ea5b29a0bdf3b9ee7eedddc6863b85ccc94ad31b40d89c0889a5d190
-
kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:458e3e81d6b940c89df144e87dc9d15f09211f2eb2b6cb06a914ef696b3a2f97
-
kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:5d6dee428800214028061d39d437b2b90cb8101be7153beef31db5babf65aefe
-
kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:d4a6735a90a6d2b7574e31ee3a6bb923cd1df1a186ca3330dcc2df987bd69d68
-
kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:88b5197223618417f5e13acf9b29202c8e8d81bf9b9c29b79840fcb2be37a2e7
-
perf-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:e6ea01b792dbf5898b0f6f7b86a03cbce612195d46215ce1d5f4f6290d56812b
-
python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:8ddb2003844a940e6b9385f5cc519c6732436fdad7abd678aa2f1746ea39a120
-
rtla-5.14.0-284.30.1.el9_2.tuxcare.els6.x86_64.rpm
sha:5fec51700a0d73b365658fd15fdea0565337121391f696d0497221d1085c98b8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.