[CLSA-2025:1742806909] kernel: Fix of 37 CVEs
Type:
security
Severity:
Important
Release date:
2025-03-24 09:01:54 UTC
Description:
- HID: core: zero-initialize the report buffer {CVE-2024-50302} - net: defer final 'struct net' free in netns dismantle {CVE-2024-56658} - bus: mhi: host: Add alignment check for event ring read pointer {CVE-2023-52494} - net: sched: fix ets qdisc OOB Indexing {CVE-2025-21692} - parport: Proper fix for array out-of-bounds access {CVE-2024-50074} - udf: fix uninit-value use in udf_get_fileshortad {CVE-2024-50143} - security/keys: fix slab-out-of-bounds in key_task_permission {CVE-2024-50301} - usb: typec: altmode should keep reference to parent {CVE-2024-50150} - dm cache: fix potential out-of-bounds access on the first resume {CVE-2024-50278} - dm cache: optimize dirty bit checking with find_next_bit when resizing {CVE-2024-50278} - dm cache: fix out-of-bounds access to the dirty bitset when resizing {CVE-2024-50279} - spi: nxp-fspi: fix the KASAN report out-of-bounds bug {CVE-2024-46853} - smb: client: fix OOBs when building SMB2_IOCTL request {CVE-2024-50151} - net: sched: fix use-after-free in taprio_change() {CVE-2024-50127} - USB: serial: io_edgeport: fix use after free in debug printk {CVE-2024-50267} - wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() {CVE-2024-53059} - wifi: iwlwifi: mvm: disconnect station vifs if recovery failed {CVE-2024-53059} - tracing: Consider the NULL character when validating the event length {CVE-2024-50131} - crypto: scomp - fix req->dst buffer overflow {CVE-2023-52612} - NFSD: fix hang in nfsd4_shutdown_callback {CVE-2025-21795} - NFSD: add courteous server support for thread with only delegation {CVE-2025-21795} - mptcp: refactor passive socket initialization {CVE-2024-26782} - mptcp: implement delayed seq generation for passive fastopen {CVE-2024-26782} - smb: client: fix potential UAF in smb2_is_valid_lease_break() {CVE-2024-35864} - smb: client: fix potential UAF in cifs_dump_full_key() {CVE-2024-35866} - cifs: fix session state check in reconnect to avoid use-after-free issue {CVE-2024-35866} - smb: client: fix potential UAF in smb2_is_network_name_deleted() {CVE-2024-35862} - smb: client: fix potential UAF in is_valid_oplock_break() {CVE-2024-35863} - smb: client: fix potential UAF in cifs_stats_proc_show() {CVE-2024-35867} - bpf: Protect against int overflow for stack access size {CVE-2024-35905} - bpf: Fix verification of indirect var-off stack access {CVE-2024-35905} - devlink: fix possible use-after-free and memory leaks in devlink_init() {CVE-2024-26734} - leds: trigger: Unregister sysfs attributes before calling deactivate() {CVE-2024-43830} - ionic: fix use after netif_napi_del() {CVE-2024-39502} - ionic: clean interrupt before enabling queue to avoid credit race {CVE-2024-39502} - net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink {CVE-2024-44970} - vt_ioctl: fix array_index_nospec in vt_setactivate {CVE-2022-48804} - hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() {CVE-2022-49011} - raid1: fix use-after-free for original bio in raid1_write_request() {CVE-2024-35979} - md/raid1: free the r1bio before waiting for blocked rdev {CVE-2024-35979} - drm/amdgpu: fix usage slab after free {CVE-2024-56551} - drm/amd: Use `amdgpu_ucode_*` helpers for GPU info bin {CVE-2024-56551} - drm/amd: Add a new helper for loading/validating microcode {CVE-2024-56551} - drm/amd: check num of link levels when update pcie param {CVE-2023-52812} - drm/amd: Update `update_pcie_parameters` functions to use uint8_t arguments {CVE-2023-52812} - drm/amd: Disable PP_PCIE_DPM_MASK when dynamic speed switching not supported {CVE-2023-52812} - drm/amd: Fix logic error in sienna_cichlid_update_pcie_parameters() {CVE-2023-52812} - drm/amd: Use amdgpu_device_pcie_dynamic_switching_supported() for SMU7 {CVE-2023-52812} - drm/amd: Align SMU11 SMU_MSG_OverridePcieParameters implementation with SMU13 {CVE-2023-52812} - drm/amd/pm: conditionally disable pcie lane switching for some sienna_cichlid SKUs {CVE-2023-52812} - drm/amd: Move helper for dynamic speed switch check out of smu13 {CVE-2023-52812} - drm/amd/pm: conditionally disable pcie lane/speed switching for SMU13 {CVE-2023-52812} - drm/amd/pm: share the code around SMU13 pcie parameters update {CVE-2023-52812} - drm: zynqmp_kms: Unplug DRM device before removal {CVE-2024-56538} - padata: Fix refcnt handling in padata_free_shell() {CVE-2023-52854} - padata: Convert from atomic_t to refcount_t on parallel_data->refcnt {CVE-2023-52854} - drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() {CVE-2024-57798} - drm/dp_mst: Skip CSN if topology probing is not done yet {CVE-2024-57798}
Updated packages:
  • bpftool-7.0.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:36a75a5867d269baef3f26a401ded27764ee79a50138ecaaad83ebf8e423eb67
  • kernel-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:91c9bbd8239e17b2687dd5b56e298e4d93ffcb7350a878bae1445e969040bb5f
  • kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els12.noarch.rpm
    sha:ea77a8b14a1c63378c39f09fbd0369bf6ef6223c2a57c77ea7c4e10d153fe177
  • kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:bbde3038880e4af533092293201d120e68b2b412c0ff07e9b0493aec1b67100e
  • kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:aab985127908907cdf7a326f434a3a64213af741cf882ea4e66129074f55d46d
  • kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:2bbfd4dd6312ab7aac211930171770c4f06b4911fbb85bfa10b9cdc09460613d
  • kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:795202e5cb76afab9fa7c5906187c47b0f5600616a772a243395ff54b71bc4bd
  • kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:0b89017faaca8102496f2261be42e676122be5bff3c3c6ba7bab000b2e8216c1
  • kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:af7415e2e54ffba3d64641cafa09c3a6efda079756d7cae46b2677f4d55e9539
  • kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:9d55d72e88ea033e29820635d94fd3cd31410e5da252a7bdfa4b02ecc3c1d98e
  • kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:5912a624625767b39f24539c3d25bb923807281e52ce11df9e9cfcf44c4366fc
  • kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:c736117451e7a41cd058a0601d95404b1f38b5c748abb77b1809a435f89d42e0
  • kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:c6894db8c25d575d36ddbb5006a1187a72a2357236bca9946042e95474c1d448
  • kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:857e4490f8449b5db2133fcc9e785250224819a220957d865ed074f45a0e0f8a
  • kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:7152c65353646f11347a81585fbbceeda49e806c828c7f97f1263abed3e6c55e
  • kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:13810313063fca412438b3e21bef54d280db5b3517a6fc7ee03dfedc837c5115
  • kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:4a9cc79b76a65f3476dcb7a66632089e976535a29668968f20ca9eb13964c0ff
  • kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els12.noarch.rpm
    sha:adf56a48749c70b1af7aa63a7f8c8de688d3d5c7cffee852275d04fe0309fb36
  • kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:cab03640f831e12fc542f3fc6b4456fae3414b53e69f06e93ecc7da18c125664
  • kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:32da61df0be61709843a20d4a933259031d8314cc8a3a5c34e7f9bf8bf8fb0e0
  • kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:025beccf71c84703de7e7bf50166d7743ea304e407cff0638d37ef3c7651466f
  • kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:4bda211a7b7de806613b51ed9df067acbf7b552b63f1b093b4ce3f6fede2b71a
  • kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:6dfcc6f9d9af5534f838d3ad2f27dcd818fcd13acfdfb8506faa80179d6be2a5
  • kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:7ec4eb3d93227d373802daddff84504d5a3c468b338a490f73f0ed3135d8f10a
  • kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:d989f87220ed5193fa68afb8ecedd2989685e0d7480700c484240bd3c87a8c39
  • kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:81d3dd196b5066bd13242727e85c18078a06b1b40cabd1f84c888ef71587f9ac
  • kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:f0280b213a1a3bce6f6e7c1908d7838dff47364adfbe54a2a39296d340d556e3
  • kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:ee0f1f9eb9e8e28ea4afee9f1b64f9ab5e9bef332a2b2654bc680e0b77d41070
  • kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:3d6c3d7f0bbf7b1109ebacef5bbef0c4bf3b7ed569b30ac4b5e9a27c9243760d
  • kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:4be1324e2f9326b4b75d4a28066a5f9b159c4a86f9590f72791c021773475563
  • perf-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:45f6cb893c5436ec75b49e1bfecec4c9104966c414c030c8c80c9d165438e25a
  • python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:a1f6b632b94e91aca0064b85336b6588cd72123066c8e2a883bfee7f3876b145
  • rtla-5.14.0-284.30.1.el9_2.tuxcare.els12.x86_64.rpm
    sha:1365e242f9e9a94fa273f2b4b9807b4a196653eb91f93ac42faa125558ac12f6
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.