Release date:
2024-05-06 13:05:52 UTC
Description:
- IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests {CVE-2023-52474}
- af_unix: Fix null-ptr-deref in unix_stream_sendpage(). {CVE-2023-4622}
- sched/rt: pick_next_rt_entity(): check list_entry {CVE-2023-1077}
- RDMA/irdma: Prevent zero-length STAG registration {CVE-2023-25775}
- block: add check that partition length needs to be aligned with block size {CVE-2023-52458}
- bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS {CVE-2024-26589}
- bpf: fix check for attempt to corrupt spilled pointer {CVE-2023-52462}
- KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache {CVE-2024-26598}
- ext4: regenerate buddy after block freeing failed if under fc replay {CVE-2024-26601}
- ext4: allow ext4_get_group_info() to fail {CVE-2024-26601}
- mlxsw: spectrum_acl_tcam: Fix stack corruption {CVE-2024-26586}
- EDAC/thunderx: Fix possible out-of-bounds string access {CVE-2023-52464}
- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() {CVE-2023-52470}
- drivers/amd/pm: fix a use-after-free in kv_parse_power_table {CVE-2023-52469}
- md/raid5: fix atomicity violation in raid5_cache_count {CVE-2024-23307}
- igb: set max size RX buffer when store bad packet is enabled {CVE-2023-45871}
- netfilter: nft_set_rbtree: skip end interval element from gc {CVE-2024-26581}
- netfilter: nf_tables: check if catch-all set element is active in next generation {CVE-2024-1085}
- netfilter: nf_tables: skip set commit for deleted/destroyed sets {CVE-2024-0193}
- netfilter: nft_set_pipapo: skip inactive elements during set walk {CVE-2023-6817}
- netfilter: nf_tables: split async and sync catchall in two functions {CVE-2023-4244}
- netfilter: nf_tables: remove catchall element in GC sync path {CVE-2023-4244}
- netfilter: nf_tables: expose opaque set element as struct nft_elem_priv {CVE-2023-4244}
- netfilter: nf_tables: set backend .flush always succeeds {CVE-2023-4244}
- netfilter: nft_set_pipapo: no need to call pipapo_deactivate() from flush {CVE-2023-4244}
- netfilter: nf_tables: work around newrule after chain binding {CVE-2023-4244}
- netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure {CVE-2023-4244}
- netfilter: nf_tables: fix memleak when more than 255 elements expired {CVE-2023-4244}
- netfilter: nf_tables: disable toggling dormant table state more than once {CVE-2023-4244}
- netfilter: nf_tables: disallow element removal on anonymous sets {CVE-2023-4244}
- netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration {CVE-2023-4244}
- netfilter: nft_set_pipapo: stop GC iteration if GC transaction allocation fails {CVE-2023-4244}
- netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention {CVE-2023-4244}
- netfilter: nft_set_pipapo: call nft_trans_gc_queue_sync() in catchall GC {CVE-2023-4244}
- netfilter: nf_tables: disallow rule removal from chain binding {CVE-2023-4244}
- netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction {CVE-2023-4244}
- netfilter: nf_tables: defer gc run if previous batch is still pending {CVE-2023-4244}
- netfilter: nf_tables: fix out of memory error handling {CVE-2023-4244}
- netfilter: nf_tables: use correct lock to protect gc_list {CVE-2023-4244}
- netfilter: nf_tables: GC transaction race with abort path {CVE-2023-4244}
- netfilter: nf_tables: flush pending destroy work before netlink notifier {CVE-2023-4244}
- netfilter: nft_dynset: disallow object maps {CVE-2023-4244}
- netfilter: nf_tables: GC transaction race with netns dismantle {CVE-2023-4244}
- netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path {CVE-2023-4244}
- netfilter: nf_tables: don't fail inserts if duplicate has expired {CVE-2023-4244}
- netfilter: nf_tables: deactivate catchall elements in next generation {CVE-2023-4244}
- netfilter: nf_tables: fix kdoc warnings after gc rework {CVE-2023-4244}
- netfilter: nf_tables: fix false-positive lockdep splat {CVE-2023-4244}
- netfilter: nf_tables: remove busy mark and gc batch API {CVE-2023-4244}
- netfilter: nft_set_hash: mark set element as dead when deleting from packet path {CVE-2023-4244}
- netfilter: nf_tables: adapt set backend to use GC transaction API {CVE-2023-4244}
- netfilter: nft_set_rbtree: fix overlap expiration walk {CVE-2023-4244}
- netfilter: nf_tables: GC transaction API to avoid race with control plane {CVE-2023-4244}
- netfilter: nf_tables: don't skip expired elements during walk {CVE-2023-4244}
- netfilter: nf_tables: skip bound chain in netns release path {CVE-2023-4244}
- netfilter: nf_tables: fix spurious set element insertion failure {CVE-2023-4244}
- netfilter: nf_tables: report use refcount overflow {CVE-2023-4244}
- netfilter: nf_tables: fix underflow in chain reference counter {CVE-2023-4244}
- netfilter: nf_tables: disallow timeout for anonymous sets {CVE-2023-4244}
- netfilter: nf_tables: disallow updates of anonymous sets {CVE-2023-4244}
- netfilter: nf_tables: reject unbound chain set before commit phase {CVE-2023-4244}
- netfilter: nf_tables: reject unbound anonymous set before commit phase {CVE-2023-4244}
- netfilter: nf_tables: disallow element updates of bound anonymous sets {CVE-2023-4244}
- netfilter: nf_tables: fix underflow in object reference counter {CVE-2023-4244}
- netfilter: nf_tables: drop map element references from preparation phase {CVE-2023-4244}
- netfilter: nf_tables: validate variable length element extension {CVE-2023-4244}
- netfilter: nft_set_pipapo: .walk does not deal with generations {CVE-2023-4244}
- netfilter: nf_tables: relax set/map validation checks {CVE-2023-4244}
- netfilter: nf_tables: integrate pipapo into commit protocol {CVE-2023-4244}
- netfilter: nf_tables: upfront validation of data via nft_data_init() {CVE-2023-4244}
- netfilter: nft_set_rbtree: fix null deref on element insertion
- netfilter: nft_set_rbtree: Switch to node list walk for overlap detection
- netfilter: nft_set_rbtree: skip elements in transaction from garbage collection
- netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR {CVE-2023-4015}
- netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() {CVE-2023-7192}
- Documentation/hw-vuln: Fix rST warning {CVE-2022-27672}
- Documentation/hw-vuln: Add documentation for Cross-Thread Return Predictions {CVE-2022-27672}
- KVM: x86: Mitigate the cross-thread return address predictions bug {CVE-2022-27672}
- x86/speculation: Identify processors vulnerable to SMT RSB predictions {CVE-2022-27672}
- uio: Fix use-after-free in uio_open {CVE-2023-52439}
- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump {CVE-2023-52448}
Updated packages:
-
bpftool-7.0.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:679d556dad00c309289b088f2d8fb4f5c763e156
-
kernel-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:8b990a690a6f3e6317a1e58bf4562f424a48951e
-
kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.5.els3.noarch.rpm
sha:ea6b2b1c494cd310af91bd51839c25bae1a005e0
-
kernel-core-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:217db2a9c22c409603b951bc67f7797aee08e5e1
-
kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:079bcf28fe55d4074ffb2cf40b77b11ad5c5912c
-
kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:92ae3b9efbeeadefb3a1b8ab6e4230d4165207da
-
kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:2ceabc0ebfcdde86d9d5eb20be85a1e12ecf1290
-
kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:0499829541bbb6c7d79dd502049af2ac65f004d8
-
kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:bd071f0dd1b5be661550eab21c753c57e0515e5e
-
kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:1338828ff5dd97b975cbac84f5bb69ef9c396b67
-
kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:325b4858704075b6267c3e792b134a990e436da7
-
kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:d750deb6b114cab7884f38f2ea74d0e127b93f36
-
kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:e29fccc5be60d138c1d63029c0089927e58f96f4
-
kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:b5dedd93e949ced07b29f015019062c30b1f62ef
-
kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:30ba498eece5352803fc6a619dff5ed6bad03568
-
kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:ed0ec921e430a8f8dca23738df7dafd6bb18e7dd
-
kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:eab2b8de4e66e33e7e615ebf286f41b25806f429
-
kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.5.els3.noarch.rpm
sha:09908c415fcede8df133271cfd07d9a98bb5e80d
-
kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:f8809afc8ebbeabbcd5acaf5901fb98110226e62
-
kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:a545d508dc6df44616a16b3e5ad7b341e37f5f5a
-
kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:ce281f82ed31444ba38df54ee286a817ebd56001
-
kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:5c72736a5d3df79bdd181be16f09190614c90055
-
kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:8008d8ce513fe3fc5ec7e73b766a52c78f84e23d
-
kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:fd899a611299d9a8ba581ed40ff4bdd75d232650
-
kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:5d62563df09d047efdcaec11eea0c119b48eb1fe
-
kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:f63c0a36422d0566bd3a1da96cb837468cdf0971
-
kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:44395251f3097de4bf1867ac4aae6bf9a6aaf6c9
-
kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:8ec8f3732976a90358f27a902807383efda01a34
-
kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:511c660fb992c67a7b68c6282a41b55798e87213
-
kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:f239c77febcb31588ff21a48e19c5ea156a74c73
-
perf-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:9eeea5333da719cce4be6af3eeea7d443ad7d3da
-
python3-perf-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:b3d24b6962dd6fc17b3f817c6519f3341b9afae1
-
rtla-5.14.0-284.11.1.el9_2.tuxcare.5.els3.x86_64.rpm
sha:618c4db41ee57e9e8fcc8c8c40127fcbb1859ad0
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.