Release date:
2024-04-08 10:57:57 UTC
Description:
- bpf: Fix re-attachment branch in bpf_tracing_prog_attach {CVE-2024-26591}
- ext4: improve error recovery code paths in __ext4_remount() {CVE-2024-0775}
- smb: client: fix OOB in receive_encrypted_standard() {CVE-2024-0565}
- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier {CVE-2023-52449}
- net: prevent mss overflow in skb_segment() {CVE-2023-52435}
- smb: client: fix potential OOBs in smb2_parse_contexts() {CVE-2023-52434}
- atm: Fix Use-After-Free in do_vcc_ioctl {CVE-2023-51780}
- ida: Fix crash in ida_free when the bitmap is empty {CVE-2023-6915}
- nvmet: nul-terminate the NQNs passed in the connect command {CVE-2023-6121}
- netfilter: nf_tables: Reject tables of unsupported family {CVE-2023-6040}
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work {CVE-2023-1989}
- NFSD: fix use-after-free in nfsd4_ssc_setup_dul() {CVE-2023-1652}
- x86/bugs: Flush IBP in ib_prctl_set() {CVE-2023-0045}
- Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934}
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm {CVE-2022-42896}
- x86: Clear .brk area at early boot {CVE-2022-36123}
- misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os {CVE-2022-3424}
- Fix double fget() in vhost_net_set_backend() {CVE-2023-1838}
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380}
- netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one {CVE-2023-39197}
- relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268}
- ipv6: rpl: Fix Route of Death. {CVE-2023-2156}
- ipv6: Fix out-of-bounds access in ipv6_find_tlv() {CVE-2023-2156}
- net: rpl: fix rpl header size calculation {CVE-2023-2156}
- memstick: r592: Fix UAF bug in r592_remove due to race condition {CVE-2023-3141}
- ovl: fix use after free in struct ovl_aio_req {CVE-2023-1252}
- drm/amdgpu: Fix potential fence use-after-free v2 {CVE-2023-51042}
- netfilter: nf_tables: reject QUEUE/DROP verdict parameters {CVE-2024-1086}
- perf: Fix perf_event_validate_size() lockdep splat {CVE-2023-6931}
- perf: Fix perf_event_validate_size() {CVE-2023-6931}
- drm/atomic: Fix potential use-after-free in nonblocking commits {CVE-2023-51043}
- nvmet-tcp: Fix the H2C expected PDU len calculation {CVE-2023-6356}
- nvmet-tcp: remove boilerplate code {CVE-2023-6356}
- nvmet-tcp: fix a crash in nvmet_req_complete() {CVE-2023-6356}
- nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length {CVE-2023-6356}
- net: tls, update curr on splice as well {CVE-2024-0646}
- smb: client: fix potential OOB in smb2_dump_detail() {CVE-2023-6610}
- smb: client: fix potential OOB in cifs_dump_detail() {CVE-2023-6610}
- smb: client: fix OOB in smbCalcSize() {CVE-2023-6606}
- ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932}
- RDMA/core: Update CMA destination address on rdma_resolve_addr {CVE-2023-2176}
- RDMA/core: Refactor rdma_bind_addr {CVE-2023-2176}
- nfp: fix use-after-free in area_cache_get() {CVE-2022-3545}
- netfilter: nf_tables: skip bound chain on rule flush {CVE-2023-3777}
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283}
- drivers: net: slip: fix NPD bug in sl_tx_timeout() {CVE-2022-41858}
- net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve {CVE-2023-4623}
- net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623}
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567}
- nvmet-tcp: Fix a possible UAF in queue intialization setup {CVE-2023-5178}
- net: tun: fix bugs for oversize packet when napi frags enabled {CVE-2023-3812}
- netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c {CVE-2023-42753}
- bpf: Fix incorrect verifier pruning due to missing register precision taints {CVE-2023-2163}
- net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4206}
- net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4207}
- net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4208}
- net/sched: cls_u32: Fix reference counter leak leading to overflow {CVE-2023-3609}
- libceph: harden msgr2.1 frame segment length checks {CVE-2023-44466}
Updated packages:
-
bpftool-7.0.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:b8ddebb4dd7597d11107fa9bd6ce8d827a7135f0
-
kernel-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:ff68c4ffbc704ab7f98587d82058f6bd2d086761
-
kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.5.els2.noarch.rpm
sha:b3a5a21d3d79a871192859273f64793c2b7a002c
-
kernel-core-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:c331d4f9b260f37f0f925ae09c06b2ff7d26a0ee
-
kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:ae6cd5865e7db11377dd37cba78cb1cd2c35af48
-
kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:f50bb976d2b0c7ba0fa86c03d73cdd8711f4e030
-
kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:28990be2ae0c04f8b81112c454c45ad7d6b792dc
-
kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:5d9829ec064c49d33c7569de10d03a58bafd7be1
-
kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:45fd67cd1c5cf6c42b33246c7dd6b9ff9dae21c2
-
kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:512b3972b64339f89a3650e8664c9ecd62d7e8ad
-
kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:1be7e23d811dee4ecbacf74105ab8185a4aaa3fd
-
kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:46723b5ffec823c177ee4eeb58f172ebe3b66d64
-
kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:d508ad1bea7f363dcd8ba0401f091f575fcc8d77
-
kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:6d81f95f3a306a01b48ed0280952677aaa73f79c
-
kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:5d1bdbebdb8eb468283440f1df7b4b0f510d732c
-
kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:e51a7bdf2fa3c160cee90c35fafdb18fd762ac77
-
kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:d82ec7a77f0647fc0e1b267e3c847246bf2b780c
-
kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.5.els2.noarch.rpm
sha:3a0feb03ab30f8c7166ec07c31f9633f83955749
-
kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:da369b39459ceebf8f11f9ae87744d1ffe55571f
-
kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:259212649fede00891c786ed67a7252cac53b494
-
kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:3da891111be801fb6c8c73233d67f0772f40b76d
-
kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:1a6df0dc744f339342af1d427d238024ba88b0e0
-
kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:c2c25145d047627e4eb4adec2864f5a2cf172347
-
kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:82c87dad9dc2d8047d243bac06cee014ae137223
-
kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:c9fa8421f0d1168fc6aeae2f0d4cae28fa3d4ced
-
kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:ef120e9bb5abea2c58011d50c70eea87167bd980
-
kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:349a5a4031c8b709a882cf70527bd7f5bbbfae33
-
kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:9408efd7703201a3594346842f627dd48fe8bf65
-
kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:276860e73ff2398cdb50ba1e2c03cd4c54e58219
-
kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:0eea080bbb8dad6c3bb21bda878f172fa8d4235e
-
perf-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:8f08b7c5e17dd40e4299a5085049050b4496fa10
-
python3-perf-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:aec6031ae12310b4e2f9c8946d7b0b0a1f58519b
-
rtla-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
sha:c4625152968b10c710675f10ce5331662c6b982e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.