Release date:
2024-09-26 12:09:25 UTC
Description:
- tipc: Return non-zero value from tipc_udp_addr2str() on error {CVE-2024-42284}
- dev/parport: fix the array out-of-bounds risk {CVE-2024-42301}
- RDMA/iwcm: Fix a use-after-free related to destroying CM IDs {CVE-2024-42285}
- scsi: aacraid: Fix double-free on probe failure {CVE-2024-46673}
- ipv6: prevent UAF in ip6_send_skb() {CVE-2024-44987}
- block/ioctl: prefer different overflow check {CVE-2024-41000}
- ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." {CVE-2024-40984}
- net/sched: Fix UAF when resolving a clash {CVE-2024-41040}
- nvme: avoid double free special payload {CVE-2024-41073}
- x86/tdx: Allow 32-bit emulation by default {CVE-2024-25744}
- x86/entry: Do not allow external 0x80 interrupts {CVE-2024-25742}
- x86/entry: Convert INT 0x80 emulation to IDTENTRY {CVE-2024-25742}
- x86/coco: Disable 32-bit emulation by default on TDX and SEV {CVE-2024-25742}
- x86: Make IA32_EMULATION boot time configurable {CVE-2024-25744}
- x86/entry: Make IA32 syscalls' availability depend on ia32_enabled() {CVE-2024-25744}
- x86/elf: Make loading of 32bit processes depend on ia32_enabled() {CVE-2024-25744}
- x86/entry: Compile entry_SYSCALL32_ignore() unconditionally {CVE-2024-25744}
- x86/entry: Rename ignore_sysret() {CVE-2024-25744}
- x86/cpu: Don't write CSTAR MSR on Intel CPUs {CVE-2024-25744}
- x86: Introduce ia32_enabled() {CVE-2024-25742}
- x86: Fix misspelled Kconfig symbols {CVE-2024-25744}
- x86/sev: Harden #VC instruction emulation somewhat {CVE-2024-25742}
- objtool: Add entry UNRET validation {CVE-2024-25744}
- x86/cpu: Switch to arch_cpu_finalize_init() {CVE-2022-40982}
- init: Provide arch_cpu_finalize_init() {CVE-2022-40982}
- gfs2: Fix potential glock use-after-free on unmount {CVE-2024-38570}
- gfs2: Rename sd_{ glock => kill }_wait {CVE-2024-38570}
- gfs2: Remove ill-placed consistency check {CVE-2024-38570}
- gfs2: simplify gdlm_put_lock with out_free label {CVE-2024-38570}
- dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list {CVE-2024-40956}
- drm/amdgpu: add error handle to avoid out-of-bounds {CVE-2024-39471}
- net/mlx5: Discard command completions in internal error {CVE-2024-38555}
- net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538}
- netfilter: nftables: exthdr: fix 4-byte stack OOB write {CVE-2023-52628}
- perf/core: Fix potential NULL deref {CVE-2023-5717}
- perf: Disallow mis-matched inherited group reads {CVE-2023-5717}
Updated packages:
-
bpftool-7.0.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:01d85e8896374a18358904f85fe1c0f4dae76c113e197e272fed40059cc17e15
-
kernel-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:7fc1bfc880f8b1583f4407d1b67d2acace526d7ea920ab4315bed0d4a1b91d04
-
kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els7.noarch.rpm
sha:740577cdf033e0f4340628f51c6ed6c8ddb0966275a487c9d60c58768498710a
-
kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:baf3bda3ecef6d3b8de55538bd472ae018e01f7a41004fce4cb1961f18f39e37
-
kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:0b5a241e4a9c86a475abb44eae03300e475af6f27c6209086a19f28e513f311d
-
kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:fd8c1b2a4ddf1a325bc1d8e6cb2c5e92d552f0602e35fc227694a5c7a4a1cafe
-
kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:8fca58ed9fb2eb31a16831e047cf4d4d33a4c66a5bc22714e783a15559466cfd
-
kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:89aaeaf5a4bef9bb82de95145318282a362f80ee1ded54b2168cdd7ba9b69cef
-
kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:b57b37a27ad7b34325170099175d64ba960b86a011417f7e8c7f2ae619c970ad
-
kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:afff7b0afe30b8a4a3fe3dd70a6003ec205e73aa19d3c6b8e90007239dbc40b0
-
kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:0a45434ed8044404812f77baf52bbaa7db86aaea7eb78303410a223ad19b7cc6
-
kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:446048beaa298e579b29969b4f4e7a62d212eebd1da833f393d9597fa608791b
-
kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:64bedcb4a87be7c1face7608782e6c9f0ab12884257a7ded5e7cec414fc7c7d2
-
kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:310f641c1ea381cee7501ffa8ed296bf85b5c0add86b39db9e692ab0a14b3019
-
kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:f7baacda1f6c1eb3947e65814dc9d5bc4f48775f4ddedf7d870fa9a7945db147
-
kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:a5146d26e9fa86ebe51316c56a60a6871f08373d2b65346ec3a078007079cc44
-
kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:ce7d4ad49e168b0a02a2d5992ea0ee4ccc839daa18d9a440f4d636230d11644a
-
kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els7.noarch.rpm
sha:15812e90d0b4d77d850b6331c629c107e17d76d96fc396c373c8057c26c77c85
-
kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:3bcc8b17c928fbaf77ca56af8983b6146786aecc92b1fc34274835aec4846d8b
-
kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:c60680720d5fa820524df4cabfae39d8ed52d69c301b86a834127f24fc4c8e09
-
kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:4f6d6bea43a72efa1daedd7572b2cb035155a8976e68453a73f0c6fa2b7ee82e
-
kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:76a8856a3c52c887518c892e7dd178480d60805f1359a3d1ab4728e10f0306a8
-
kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:c8dee712569262f23c49248eed8ca47aa336a8f37cfdb8ea13969d9759d8c37e
-
kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:36c616faf94b65b583dd464e630ab9087af7db4ba60372062e4caa9d1025897d
-
kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:9613a8f40b8786495c9f0958d1ab88056c538c65159c841043b0cbc8ea6354e2
-
kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:9ce02ee119f0ebbce9907de0b2c07240b93222272a26f91cff02483b410d3c9a
-
kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:4ef88d8264e62cedec359ccad57b60a28f30b887528e2a393b770e265c4549f0
-
kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:d8ed3ce0fde1693b8b65565c688e9c681819bdf682a3a6aaa7637d93f6e3d7f9
-
kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:434f1f8128342c98d55821a73c5a15c60415058afb93ab144f0c69ae156becb2
-
kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:053aab438be3943ebed04f05893caf9a0da587546e8652431c88667bea0932d0
-
perf-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:2040d8c011aaa42885c7e54e6aa69782b17ee931ef37d25c0f35852d9fc0d878
-
python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:3a96280ca9c2a6476890ffba66b5cbbd466cf655902c9a0bee7e98a6e81011f2
-
rtla-5.14.0-284.30.1.el9_2.tuxcare.els7.x86_64.rpm
sha:c777048f9a1e1b88a49612f5614f98e1ccee09844c9bd1cf3fe4114cd8872d13
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.