Release date:
2024-06-24 15:06:09 UTC
Description:
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() {CVE-2024-26882}
- tls: fix use-after-free on failed backlog decryption {CVE-2024-26800}
- tls: separate no-async decryption request handling from async {CVE-2024-26584}
- tls: decrement decrypt_pending if no async completion will be called {CVE-2024-26584}
- net: tls: fix use-after-free with partial reads and async decrypt {CVE-2024-26582}
- net: tls: handle backlogging of crypto requests {CVE-2024-26584}
- net: tls: factor out tls_*crypt_async_wait()
- tap: tap_open(): correctly initialize socket uid {CVE-2023-1076}
- tun: tun_chr_open(): correctly initialize socket uid {CVE-2023-1076}
- net: add sock_init_data_uid() {CVE-2023-1076}
- netfilter: nf_tables: bail out on mismatching dynset and set expressions {CVE-2023-6622}
- drm/qxl: fix UAF on handle creation {CVE-2023-39198}
- smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752}
- USB: core: Fix deadlock in port "disable" sysfs attribute {CVE-2024-26933}
- USB: core: Add hub_get() and hub_put() routines {CVE-2024-26933}
- USB: core: Fix deadlock in usb_deauthorize_interface() {CVE-2024-26934}
- scsi: qla2xxx: Fix double free of fcport {CVE-2024-26929}
- netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() {CVE-2024-27020}
- net: ip_tunnel: prevent perpetual headroom growth {CVE-2024-26804}
- netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout {CVE-2024-26643}
- netfilter: nf_tables: disallow anonymous set with timeout flag {CVE-2024-26642}
- netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations {CVE-2024-26673}
- ipv6: sr: fix possible use-after-free and null-ptr-deref {CVE-2024-26735}
- fs: sysfs: Fix reference leak in sysfs_break_active_protection() {CVE-2024-26993}
- cifs: fix underflow in parse_server_interfaces() {CVE-2024-26828}
- mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path {CVE-2024-26595}
- mlxsw: spectrum_acl_tcam: Move devlink param to TCAM code {CVE-2024-26595}
- mlxsw: spectrum_acl_tcam: Make fini symmetric to init {CVE-2024-26595}
- mlxsw: spectrum_acl_tcam: Add missing mutex_destroy() {CVE-2024-26595}
- net: xfrm: Fix xfrm_address_filter OOB read {CVE-2023-39194}
- exfat: check if filename entries exceeds max filename length {CVE-2023-4273}
- xfrm: add NULL check in xfrm_update_ae_params {CVE-2023-3772}
- firmware: arm_scmi: Harden accesses to the reset domains {CVE-2022-48655}
- tcp: Reduce chance of collisions in inet6_hashfn(). {CVE-2023-1206}
- ipv4: fix null-deref in ipv4_link_failure {CVE-2023-42754}
- netfilter: nfnetlink_osf: avoid OOB read {CVE-2023-39189}
- netfilter: xt_sctp: validate the flag_info count {CVE-2023-39193}
- net: qcom/emac: Fix use after free bug in emac_remove due to race condition {CVE-2023-33203}
- net/tls: tls_is_tx_ready() checked list_entry {CVE-2023-1075}
- HID: asus: use spinlock to safely schedule workers {CVE-2023-1079}
- HID: asus: use spinlock to protect concurrent accesses {CVE-2023-1079}
- HID: intel_ish-hid: Add check for ishtp_dma_tx_map {CVE-2023-3358}
- gfs2: Don't deref jdesc in evict {CVE-2023-3212}
- fbcon: Check font dimension limits {CVE-2023-3161}
- KVM: nVMX: add missing consistency checks for CR0 and CR4 {CVE-2023-30456}
- hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition {CVE-2023-1855}
- Bluetooth: HCI: Fix global-out-of-bounds {CVE-2023-28866}
- HID: check empty report_list in hid_validate_values() {CVE-2023-1073}
- net: mpls: fix stale pointer if allocation fails during device rename {CVE-2023-26545}
- r8152: Rate limit overflow messages {CVE-2022-3594}
- drm/vmwgfx: Fix shader stage validation {CVE-2022-36402}
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory {CVE-2022-42895}
- dm ioctl: fix nested locking in table_clear() to remove deadlock concern {CVE-2023-2269}
- mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy() {CVE-2023-52562}
- i2c: i801: Fix block process call transactions {CVE-2024-26593}
- bpf: Fix hashtab overflow check on 32-bit arches {CVE-2024-26884}
- bpf: Fix stackmap overflow check on 32-bit arches {CVE-2024-26883}
- x86/xen: Add some null pointer checking to smp.c {CVE-2024-26908}
- RDMA/mlx5: Fix fortify source warning while accessing Eth segment {CVE-2024-26907}
- Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security {CVE-2024-26903}
- do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak {CVE-2024-26901}
- aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts {CVE-2024-26898}
Updated packages:
-
bpftool-7.0.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:bec31f35c48346445eac4c002145986848461396
-
kernel-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:9ef7b65c1a9073ac3d630225443bec856ef5f06e
-
kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.5.els4.noarch.rpm
sha:527cd446c7c2d5bf449160f2b6f1e470869cd46c
-
kernel-core-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:e858fca7e15e0aba867569521409785c632af910
-
kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:f03b858c0fcb674b5639e73a49342dee908d850f
-
kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:97fd4fba91c14cccb927548a484453dd41f4a7f6
-
kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:2c7938b014813ad2354311ec7d9230dc590156d4
-
kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:a102d23008eeb0d2c2478b5526a7fe64faf20bbb
-
kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:4346ec9a54498431379ce3cf53ddccc086edbd8b
-
kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:50961a8eccbe43b2935a1a7fe7a8e11e4a224f7c
-
kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:16d4d1c0dcab1baead15d99f940904fc06fa8b93
-
kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:441c1c403a59dcfa2ed70a11d527ab6cfe4ce0b4
-
kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:b6aeb70c10d930f32a9f67edf290f8e468df4cee
-
kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:3bc45e751156c0e8dccb2308e7314becd9780e7c
-
kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:a78c98bd25d563e085e468313dd3df6887a8df97
-
kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:0a63f3ba57c8908a20f1afcab3d0e3a3b4218c05
-
kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:58330058457b1cb99ab8ec74aab440629a82243f
-
kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.5.els4.noarch.rpm
sha:6d9bbbb9f0ef85d5d649758cef706305f2a969f4
-
kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:366850ee37078ec4463577b2db378d6ff8cf1686
-
kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:b4b6450ca0b0b53b1f6ebd794b91378875fe57a4
-
kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:d1dce465075d171682bb18d47524b60f00dec08f
-
kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:5aff60748ac52ad4dd8206c36a274d5331244395
-
kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:665b3475778f2be9c55a28c2f04092cd3b0a6d6b
-
kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:cb1bd481d96a3e9d957ad1c959c75e54847b6fef
-
kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:7037e116f5a1a8f44ef9b89b81e22005d53d0a14
-
kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:c289b17db525f24dc7b21c1b46578eedc514c8d5
-
kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:cc0e5df26fc5728ab4cef5a765420c876aa41355
-
kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:baf9fefd58bb89f1aec52a67ca67ee91ccb9867e
-
kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:6baf8c6680a5c905ba57b029867d358f1d79d3dd
-
kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:13d8dc5aa488ff426346b52e9c8e8bbe2eca57d9
-
perf-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:886942931151f9ce59973350750c440334b211cb
-
python3-perf-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:ff993a61cb19d5c4c14af93c5127e6f752334e77
-
rtla-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
sha:60dd2656ace239ec1822dfbf3dd1693526ec2b91
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.