[CLSA-2024:1727352561] kernel: Fix of 19 CVEs
Type:
security
Severity:
Important
Release date:
2024-09-26 12:09:25 UTC
Description:
- tipc: Return non-zero value from tipc_udp_addr2str() on error {CVE-2024-42284} - dev/parport: fix the array out-of-bounds risk {CVE-2024-42301} - RDMA/iwcm: Fix a use-after-free related to destroying CM IDs {CVE-2024-42285} - scsi: aacraid: Fix double-free on probe failure {CVE-2024-46673} - ipv6: prevent UAF in ip6_send_skb() {CVE-2024-44987} - block/ioctl: prefer different overflow check {CVE-2024-41000} - ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." {CVE-2024-40984} - net/sched: Fix UAF when resolving a clash {CVE-2024-41040} - nvme: avoid double free special payload {CVE-2024-41073} - x86/tdx: Allow 32-bit emulation by default {CVE-2024-25744} - x86/entry: Do not allow external 0x80 interrupts {CVE-2024-25742} - x86/entry: Convert INT 0x80 emulation to IDTENTRY {CVE-2024-25742} - x86/coco: Disable 32-bit emulation by default on TDX and SEV {CVE-2024-25742} - x86: Make IA32_EMULATION boot time configurable {CVE-2024-25744} - x86/entry: Make IA32 syscalls' availability depend on ia32_enabled() {CVE-2024-25744} - x86/elf: Make loading of 32bit processes depend on ia32_enabled() {CVE-2024-25744} - x86/entry: Compile entry_SYSCALL32_ignore() unconditionally {CVE-2024-25744} - x86/entry: Rename ignore_sysret() {CVE-2024-25744} - x86/cpu: Don't write CSTAR MSR on Intel CPUs {CVE-2024-25744} - x86: Introduce ia32_enabled() {CVE-2024-25742} - x86: Fix misspelled Kconfig symbols {CVE-2024-25744} - x86/sev: Harden #VC instruction emulation somewhat {CVE-2024-25742} - objtool: Add entry UNRET validation {CVE-2024-25744} - x86/cpu: Switch to arch_cpu_finalize_init() {CVE-2022-40982} - init: Provide arch_cpu_finalize_init() {CVE-2022-40982} - gfs2: Fix potential glock use-after-free on unmount {CVE-2024-38570} - gfs2: Rename sd_{ glock => kill }_wait {CVE-2024-38570} - gfs2: Remove ill-placed consistency check {CVE-2024-38570} - gfs2: simplify gdlm_put_lock with out_free label {CVE-2024-38570} - dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list {CVE-2024-40956} - drm/amdgpu: add error handle to avoid out-of-bounds {CVE-2024-39471} - net/mlx5: Discard command completions in internal error {CVE-2024-38555} - net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538} - netfilter: nftables: exthdr: fix 4-byte stack OOB write {CVE-2023-52628} - perf/core: Fix potential NULL deref {CVE-2023-5717} - perf: Disallow mis-matched inherited group reads {CVE-2023-5717}
Updated packages:
  • bpftool-7.0.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:01d85e8896374a18358904f85fe1c0f4dae76c113e197e272fed40059cc17e15
  • kernel-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:7fc1bfc880f8b1583f4407d1b67d2acace526d7ea920ab4315bed0d4a1b91d04
  • kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els7.noarch.rpm
    sha:740577cdf033e0f4340628f51c6ed6c8ddb0966275a487c9d60c58768498710a
  • kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:baf3bda3ecef6d3b8de55538bd472ae018e01f7a41004fce4cb1961f18f39e37
  • kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:0b5a241e4a9c86a475abb44eae03300e475af6f27c6209086a19f28e513f311d
  • kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:fd8c1b2a4ddf1a325bc1d8e6cb2c5e92d552f0602e35fc227694a5c7a4a1cafe
  • kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:8fca58ed9fb2eb31a16831e047cf4d4d33a4c66a5bc22714e783a15559466cfd
  • kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:89aaeaf5a4bef9bb82de95145318282a362f80ee1ded54b2168cdd7ba9b69cef
  • kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:b57b37a27ad7b34325170099175d64ba960b86a011417f7e8c7f2ae619c970ad
  • kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:afff7b0afe30b8a4a3fe3dd70a6003ec205e73aa19d3c6b8e90007239dbc40b0
  • kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:0a45434ed8044404812f77baf52bbaa7db86aaea7eb78303410a223ad19b7cc6
  • kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:446048beaa298e579b29969b4f4e7a62d212eebd1da833f393d9597fa608791b
  • kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:64bedcb4a87be7c1face7608782e6c9f0ab12884257a7ded5e7cec414fc7c7d2
  • kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:310f641c1ea381cee7501ffa8ed296bf85b5c0add86b39db9e692ab0a14b3019
  • kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:f7baacda1f6c1eb3947e65814dc9d5bc4f48775f4ddedf7d870fa9a7945db147
  • kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:a5146d26e9fa86ebe51316c56a60a6871f08373d2b65346ec3a078007079cc44
  • kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:ce7d4ad49e168b0a02a2d5992ea0ee4ccc839daa18d9a440f4d636230d11644a
  • kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els7.noarch.rpm
    sha:15812e90d0b4d77d850b6331c629c107e17d76d96fc396c373c8057c26c77c85
  • kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:3bcc8b17c928fbaf77ca56af8983b6146786aecc92b1fc34274835aec4846d8b
  • kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:c60680720d5fa820524df4cabfae39d8ed52d69c301b86a834127f24fc4c8e09
  • kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:4f6d6bea43a72efa1daedd7572b2cb035155a8976e68453a73f0c6fa2b7ee82e
  • kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:76a8856a3c52c887518c892e7dd178480d60805f1359a3d1ab4728e10f0306a8
  • kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:c8dee712569262f23c49248eed8ca47aa336a8f37cfdb8ea13969d9759d8c37e
  • kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:36c616faf94b65b583dd464e630ab9087af7db4ba60372062e4caa9d1025897d
  • kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:9613a8f40b8786495c9f0958d1ab88056c538c65159c841043b0cbc8ea6354e2
  • kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:9ce02ee119f0ebbce9907de0b2c07240b93222272a26f91cff02483b410d3c9a
  • kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:4ef88d8264e62cedec359ccad57b60a28f30b887528e2a393b770e265c4549f0
  • kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:d8ed3ce0fde1693b8b65565c688e9c681819bdf682a3a6aaa7637d93f6e3d7f9
  • kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:434f1f8128342c98d55821a73c5a15c60415058afb93ab144f0c69ae156becb2
  • kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:053aab438be3943ebed04f05893caf9a0da587546e8652431c88667bea0932d0
  • perf-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:2040d8c011aaa42885c7e54e6aa69782b17ee931ef37d25c0f35852d9fc0d878
  • python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:3a96280ca9c2a6476890ffba66b5cbbd466cf655902c9a0bee7e98a6e81011f2
  • rtla-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
    sha:c777048f9a1e1b88a49612f5614f98e1ccee09844c9bd1cf3fe4114cd8872d13
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.