[CLSA-2024:1712570434] kernel: Fix of 49 CVEs
Type:
security
Severity:
Critical
Release date:
2024-04-08 10:57:57 UTC
Description:
- bpf: Fix re-attachment branch in bpf_tracing_prog_attach {CVE-2024-26591} - ext4: improve error recovery code paths in __ext4_remount() {CVE-2024-0775} - smb: client: fix OOB in receive_encrypted_standard() {CVE-2024-0565} - mtd: Fix gluebi NULL pointer dereference caused by ftl notifier {CVE-2023-52449} - net: prevent mss overflow in skb_segment() {CVE-2023-52435} - smb: client: fix potential OOBs in smb2_parse_contexts() {CVE-2023-52434} - atm: Fix Use-After-Free in do_vcc_ioctl {CVE-2023-51780} - ida: Fix crash in ida_free when the bitmap is empty {CVE-2023-6915} - nvmet: nul-terminate the NQNs passed in the connect command {CVE-2023-6121} - netfilter: nf_tables: Reject tables of unsupported family {CVE-2023-6040} - Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work {CVE-2023-1989} - NFSD: fix use-after-free in nfsd4_ssc_setup_dul() {CVE-2023-1652} - x86/bugs: Flush IBP in ib_prctl_set() {CVE-2023-0045} - Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934} - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm {CVE-2022-42896} - x86: Clear .brk area at early boot {CVE-2022-36123} - misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os {CVE-2022-3424} - Fix double fget() in vhost_net_set_backend() {CVE-2023-1838} - wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380} - netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one {CVE-2023-39197} - relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268} - ipv6: rpl: Fix Route of Death. {CVE-2023-2156} - ipv6: Fix out-of-bounds access in ipv6_find_tlv() {CVE-2023-2156} - net: rpl: fix rpl header size calculation {CVE-2023-2156} - memstick: r592: Fix UAF bug in r592_remove due to race condition {CVE-2023-3141} - ovl: fix use after free in struct ovl_aio_req {CVE-2023-1252} - drm/amdgpu: Fix potential fence use-after-free v2 {CVE-2023-51042} - netfilter: nf_tables: reject QUEUE/DROP verdict parameters {CVE-2024-1086} - perf: Fix perf_event_validate_size() lockdep splat {CVE-2023-6931} - perf: Fix perf_event_validate_size() {CVE-2023-6931} - drm/atomic: Fix potential use-after-free in nonblocking commits {CVE-2023-51043} - nvmet-tcp: Fix the H2C expected PDU len calculation {CVE-2023-6356} - nvmet-tcp: remove boilerplate code {CVE-2023-6356} - nvmet-tcp: fix a crash in nvmet_req_complete() {CVE-2023-6356} - nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length {CVE-2023-6356} - net: tls, update curr on splice as well {CVE-2024-0646} - smb: client: fix potential OOB in smb2_dump_detail() {CVE-2023-6610} - smb: client: fix potential OOB in cifs_dump_detail() {CVE-2023-6610} - smb: client: fix OOB in smbCalcSize() {CVE-2023-6606} - ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932} - RDMA/core: Update CMA destination address on rdma_resolve_addr {CVE-2023-2176} - RDMA/core: Refactor rdma_bind_addr {CVE-2023-2176} - nfp: fix use-after-free in area_cache_get() {CVE-2022-3545} - netfilter: nf_tables: skip bound chain on rule flush {CVE-2023-3777} - Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283} - drivers: net: slip: fix NPD bug in sl_tx_timeout() {CVE-2022-41858} - net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve {CVE-2023-4623} - net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623} - vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567} - nvmet-tcp: Fix a possible UAF in queue intialization setup {CVE-2023-5178} - net: tun: fix bugs for oversize packet when napi frags enabled {CVE-2023-3812} - netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c {CVE-2023-42753} - bpf: Fix incorrect verifier pruning due to missing register precision taints {CVE-2023-2163} - net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4206} - net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4207} - net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4208} - net/sched: cls_u32: Fix reference counter leak leading to overflow {CVE-2023-3609} - libceph: harden msgr2.1 frame segment length checks {CVE-2023-44466}
Updated packages:
  • bpftool-7.0.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:b8ddebb4dd7597d11107fa9bd6ce8d827a7135f0
  • kernel-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:ff68c4ffbc704ab7f98587d82058f6bd2d086761
  • kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.5.els2.noarch.rpm
    sha:b3a5a21d3d79a871192859273f64793c2b7a002c
  • kernel-core-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:c331d4f9b260f37f0f925ae09c06b2ff7d26a0ee
  • kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:ae6cd5865e7db11377dd37cba78cb1cd2c35af48
  • kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:f50bb976d2b0c7ba0fa86c03d73cdd8711f4e030
  • kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:28990be2ae0c04f8b81112c454c45ad7d6b792dc
  • kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:5d9829ec064c49d33c7569de10d03a58bafd7be1
  • kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:45fd67cd1c5cf6c42b33246c7dd6b9ff9dae21c2
  • kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:512b3972b64339f89a3650e8664c9ecd62d7e8ad
  • kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:1be7e23d811dee4ecbacf74105ab8185a4aaa3fd
  • kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:46723b5ffec823c177ee4eeb58f172ebe3b66d64
  • kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:d508ad1bea7f363dcd8ba0401f091f575fcc8d77
  • kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:6d81f95f3a306a01b48ed0280952677aaa73f79c
  • kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:5d1bdbebdb8eb468283440f1df7b4b0f510d732c
  • kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:e51a7bdf2fa3c160cee90c35fafdb18fd762ac77
  • kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:d82ec7a77f0647fc0e1b267e3c847246bf2b780c
  • kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.5.els2.noarch.rpm
    sha:3a0feb03ab30f8c7166ec07c31f9633f83955749
  • kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:da369b39459ceebf8f11f9ae87744d1ffe55571f
  • kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:259212649fede00891c786ed67a7252cac53b494
  • kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:3da891111be801fb6c8c73233d67f0772f40b76d
  • kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:1a6df0dc744f339342af1d427d238024ba88b0e0
  • kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:c2c25145d047627e4eb4adec2864f5a2cf172347
  • kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:82c87dad9dc2d8047d243bac06cee014ae137223
  • kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:c9fa8421f0d1168fc6aeae2f0d4cae28fa3d4ced
  • kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:ef120e9bb5abea2c58011d50c70eea87167bd980
  • kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:349a5a4031c8b709a882cf70527bd7f5bbbfae33
  • kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:9408efd7703201a3594346842f627dd48fe8bf65
  • kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:276860e73ff2398cdb50ba1e2c03cd4c54e58219
  • kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:0eea080bbb8dad6c3bb21bda878f172fa8d4235e
  • perf-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:8f08b7c5e17dd40e4299a5085049050b4496fa10
  • python3-perf-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:aec6031ae12310b4e2f9c8946d7b0b0a1f58519b
  • rtla-5.14.0-284.11.1.el9_2.tuxcare.5.els2.x86_64.rpm
    sha:c4625152968b10c710675f10ce5331662c6b982e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.