Release date:
2025-03-24 09:01:54 UTC
Description:
- HID: core: zero-initialize the report buffer {CVE-2024-50302}
- net: defer final 'struct net' free in netns dismantle {CVE-2024-56658}
- bus: mhi: host: Add alignment check for event ring read pointer {CVE-2023-52494}
- net: sched: fix ets qdisc OOB Indexing {CVE-2025-21692}
- parport: Proper fix for array out-of-bounds access {CVE-2024-50074}
- udf: fix uninit-value use in udf_get_fileshortad {CVE-2024-50143}
- security/keys: fix slab-out-of-bounds in key_task_permission {CVE-2024-50301}
- usb: typec: altmode should keep reference to parent {CVE-2024-50150}
- dm cache: fix potential out-of-bounds access on the first resume {CVE-2024-50278}
- dm cache: optimize dirty bit checking with find_next_bit when resizing {CVE-2024-50278}
- dm cache: fix out-of-bounds access to the dirty bitset when resizing {CVE-2024-50279}
- spi: nxp-fspi: fix the KASAN report out-of-bounds bug {CVE-2024-46853}
- smb: client: fix OOBs when building SMB2_IOCTL request {CVE-2024-50151}
- net: sched: fix use-after-free in taprio_change() {CVE-2024-50127}
- USB: serial: io_edgeport: fix use after free in debug printk {CVE-2024-50267}
- wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() {CVE-2024-53059}
- wifi: iwlwifi: mvm: disconnect station vifs if recovery failed {CVE-2024-53059}
- tracing: Consider the NULL character when validating the event length {CVE-2024-50131}
- crypto: scomp - fix req->dst buffer overflow {CVE-2023-52612}
- NFSD: fix hang in nfsd4_shutdown_callback {CVE-2025-21795}
- NFSD: add courteous server support for thread with only delegation {CVE-2025-21795}
- mptcp: refactor passive socket initialization {CVE-2024-26782}
- mptcp: implement delayed seq generation for passive fastopen {CVE-2024-26782}
- smb: client: fix potential UAF in smb2_is_valid_lease_break() {CVE-2024-35864}
- smb: client: fix potential UAF in cifs_dump_full_key() {CVE-2024-35866}
- cifs: fix session state check in reconnect to avoid use-after-free issue {CVE-2024-35866}
- smb: client: fix potential UAF in smb2_is_network_name_deleted() {CVE-2024-35862}
- smb: client: fix potential UAF in is_valid_oplock_break() {CVE-2024-35863}
- smb: client: fix potential UAF in cifs_stats_proc_show() {CVE-2024-35867}
- bpf: Protect against int overflow for stack access size {CVE-2024-35905}
- bpf: Fix verification of indirect var-off stack access {CVE-2024-35905}
- devlink: fix possible use-after-free and memory leaks in devlink_init() {CVE-2024-26734}
- leds: trigger: Unregister sysfs attributes before calling deactivate() {CVE-2024-43830}
- ionic: fix use after netif_napi_del() {CVE-2024-39502}
- ionic: clean interrupt before enabling queue to avoid credit race {CVE-2024-39502}
- net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink {CVE-2024-44970}
- vt_ioctl: fix array_index_nospec in vt_setactivate {CVE-2022-48804}
- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() {CVE-2022-49011}
- raid1: fix use-after-free for original bio in raid1_write_request() {CVE-2024-35979}
- md/raid1: free the r1bio before waiting for blocked rdev {CVE-2024-35979}
- drm/amdgpu: fix usage slab after free {CVE-2024-56551}
- drm/amd: Use `amdgpu_ucode_*` helpers for GPU info bin {CVE-2024-56551}
- drm/amd: Add a new helper for loading/validating microcode {CVE-2024-56551}
- drm/amd: check num of link levels when update pcie param {CVE-2023-52812}
- drm/amd: Update `update_pcie_parameters` functions to use uint8_t arguments {CVE-2023-52812}
- drm/amd: Disable PP_PCIE_DPM_MASK when dynamic speed switching not supported {CVE-2023-52812}
- drm/amd: Fix logic error in sienna_cichlid_update_pcie_parameters() {CVE-2023-52812}
- drm/amd: Use amdgpu_device_pcie_dynamic_switching_supported() for SMU7 {CVE-2023-52812}
- drm/amd: Align SMU11 SMU_MSG_OverridePcieParameters implementation with SMU13 {CVE-2023-52812}
- drm/amd/pm: conditionally disable pcie lane switching for some sienna_cichlid SKUs {CVE-2023-52812}
- drm/amd: Move helper for dynamic speed switch check out of smu13 {CVE-2023-52812}
- drm/amd/pm: conditionally disable pcie lane/speed switching for SMU13 {CVE-2023-52812}
- drm/amd/pm: share the code around SMU13 pcie parameters update {CVE-2023-52812}
- drm: zynqmp_kms: Unplug DRM device before removal {CVE-2024-56538}
- padata: Fix refcnt handling in padata_free_shell() {CVE-2023-52854}
- padata: Convert from atomic_t to refcount_t on parallel_data->refcnt {CVE-2023-52854}
- drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() {CVE-2024-57798}
- drm/dp_mst: Skip CSN if topology probing is not done yet {CVE-2024-57798}
Updated packages:
-
bpftool-7.0.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:36a75a5867d269baef3f26a401ded27764ee79a50138ecaaad83ebf8e423eb67
-
kernel-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:91c9bbd8239e17b2687dd5b56e298e4d93ffcb7350a878bae1445e969040bb5f
-
kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els12.noarch.rpm
sha:ea77a8b14a1c63378c39f09fbd0369bf6ef6223c2a57c77ea7c4e10d153fe177
-
kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:bbde3038880e4af533092293201d120e68b2b412c0ff07e9b0493aec1b67100e
-
kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:aab985127908907cdf7a326f434a3a64213af741cf882ea4e66129074f55d46d
-
kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:2bbfd4dd6312ab7aac211930171770c4f06b4911fbb85bfa10b9cdc09460613d
-
kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:795202e5cb76afab9fa7c5906187c47b0f5600616a772a243395ff54b71bc4bd
-
kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:0b89017faaca8102496f2261be42e676122be5bff3c3c6ba7bab000b2e8216c1
-
kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:af7415e2e54ffba3d64641cafa09c3a6efda079756d7cae46b2677f4d55e9539
-
kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:9d55d72e88ea033e29820635d94fd3cd31410e5da252a7bdfa4b02ecc3c1d98e
-
kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:5912a624625767b39f24539c3d25bb923807281e52ce11df9e9cfcf44c4366fc
-
kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:c736117451e7a41cd058a0601d95404b1f38b5c748abb77b1809a435f89d42e0
-
kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:c6894db8c25d575d36ddbb5006a1187a72a2357236bca9946042e95474c1d448
-
kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:857e4490f8449b5db2133fcc9e785250224819a220957d865ed074f45a0e0f8a
-
kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:7152c65353646f11347a81585fbbceeda49e806c828c7f97f1263abed3e6c55e
-
kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:13810313063fca412438b3e21bef54d280db5b3517a6fc7ee03dfedc837c5115
-
kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:4a9cc79b76a65f3476dcb7a66632089e976535a29668968f20ca9eb13964c0ff
-
kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els12.noarch.rpm
sha:adf56a48749c70b1af7aa63a7f8c8de688d3d5c7cffee852275d04fe0309fb36
-
kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:cab03640f831e12fc542f3fc6b4456fae3414b53e69f06e93ecc7da18c125664
-
kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:32da61df0be61709843a20d4a933259031d8314cc8a3a5c34e7f9bf8bf8fb0e0
-
kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:025beccf71c84703de7e7bf50166d7743ea304e407cff0638d37ef3c7651466f
-
kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:4bda211a7b7de806613b51ed9df067acbf7b552b63f1b093b4ce3f6fede2b71a
-
kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:6dfcc6f9d9af5534f838d3ad2f27dcd818fcd13acfdfb8506faa80179d6be2a5
-
kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:7ec4eb3d93227d373802daddff84504d5a3c468b338a490f73f0ed3135d8f10a
-
kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:d989f87220ed5193fa68afb8ecedd2989685e0d7480700c484240bd3c87a8c39
-
kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:81d3dd196b5066bd13242727e85c18078a06b1b40cabd1f84c888ef71587f9ac
-
kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:f0280b213a1a3bce6f6e7c1908d7838dff47364adfbe54a2a39296d340d556e3
-
kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:ee0f1f9eb9e8e28ea4afee9f1b64f9ab5e9bef332a2b2654bc680e0b77d41070
-
kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:3d6c3d7f0bbf7b1109ebacef5bbef0c4bf3b7ed569b30ac4b5e9a27c9243760d
-
kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:4be1324e2f9326b4b75d4a28066a5f9b159c4a86f9590f72791c021773475563
-
perf-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:45f6cb893c5436ec75b49e1bfecec4c9104966c414c030c8c80c9d165438e25a
-
python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:a1f6b632b94e91aca0064b85336b6588cd72123066c8e2a883bfee7f3876b145
-
rtla-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
sha:1365e242f9e9a94fa273f2b4b9807b4a196653eb91f93ac42faa125558ac12f6
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.