[CLSA-2024:1719241565] kernel: Fix of 52 CVEs
Type:
security
Severity:
Important
Release date:
2024-06-24 15:06:09 UTC
Description:
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() {CVE-2024-26882} - tls: fix use-after-free on failed backlog decryption {CVE-2024-26800} - tls: separate no-async decryption request handling from async {CVE-2024-26584} - tls: decrement decrypt_pending if no async completion will be called {CVE-2024-26584} - net: tls: fix use-after-free with partial reads and async decrypt {CVE-2024-26582} - net: tls: handle backlogging of crypto requests {CVE-2024-26584} - net: tls: factor out tls_*crypt_async_wait() - tap: tap_open(): correctly initialize socket uid {CVE-2023-1076} - tun: tun_chr_open(): correctly initialize socket uid {CVE-2023-1076} - net: add sock_init_data_uid() {CVE-2023-1076} - netfilter: nf_tables: bail out on mismatching dynset and set expressions {CVE-2023-6622} - drm/qxl: fix UAF on handle creation {CVE-2023-39198} - smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752} - USB: core: Fix deadlock in port "disable" sysfs attribute {CVE-2024-26933} - USB: core: Add hub_get() and hub_put() routines {CVE-2024-26933} - USB: core: Fix deadlock in usb_deauthorize_interface() {CVE-2024-26934} - scsi: qla2xxx: Fix double free of fcport {CVE-2024-26929} - netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() {CVE-2024-27020} - net: ip_tunnel: prevent perpetual headroom growth {CVE-2024-26804} - netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout {CVE-2024-26643} - netfilter: nf_tables: disallow anonymous set with timeout flag {CVE-2024-26642} - netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations {CVE-2024-26673} - ipv6: sr: fix possible use-after-free and null-ptr-deref {CVE-2024-26735} - fs: sysfs: Fix reference leak in sysfs_break_active_protection() {CVE-2024-26993} - cifs: fix underflow in parse_server_interfaces() {CVE-2024-26828} - mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path {CVE-2024-26595} - mlxsw: spectrum_acl_tcam: Move devlink param to TCAM code {CVE-2024-26595} - mlxsw: spectrum_acl_tcam: Make fini symmetric to init {CVE-2024-26595} - mlxsw: spectrum_acl_tcam: Add missing mutex_destroy() {CVE-2024-26595} - net: xfrm: Fix xfrm_address_filter OOB read {CVE-2023-39194} - exfat: check if filename entries exceeds max filename length {CVE-2023-4273} - xfrm: add NULL check in xfrm_update_ae_params {CVE-2023-3772} - firmware: arm_scmi: Harden accesses to the reset domains {CVE-2022-48655} - tcp: Reduce chance of collisions in inet6_hashfn(). {CVE-2023-1206} - ipv4: fix null-deref in ipv4_link_failure {CVE-2023-42754} - netfilter: nfnetlink_osf: avoid OOB read {CVE-2023-39189} - netfilter: xt_sctp: validate the flag_info count {CVE-2023-39193} - net: qcom/emac: Fix use after free bug in emac_remove due to race condition {CVE-2023-33203} - net/tls: tls_is_tx_ready() checked list_entry {CVE-2023-1075} - HID: asus: use spinlock to safely schedule workers {CVE-2023-1079} - HID: asus: use spinlock to protect concurrent accesses {CVE-2023-1079} - HID: intel_ish-hid: Add check for ishtp_dma_tx_map {CVE-2023-3358} - gfs2: Don't deref jdesc in evict {CVE-2023-3212} - fbcon: Check font dimension limits {CVE-2023-3161} - KVM: nVMX: add missing consistency checks for CR0 and CR4 {CVE-2023-30456} - hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition {CVE-2023-1855} - Bluetooth: HCI: Fix global-out-of-bounds {CVE-2023-28866} - HID: check empty report_list in hid_validate_values() {CVE-2023-1073} - net: mpls: fix stale pointer if allocation fails during device rename {CVE-2023-26545} - r8152: Rate limit overflow messages {CVE-2022-3594} - drm/vmwgfx: Fix shader stage validation {CVE-2022-36402} - Bluetooth: L2CAP: Fix attempting to access uninitialized memory {CVE-2022-42895} - dm ioctl: fix nested locking in table_clear() to remove deadlock concern {CVE-2023-2269} - mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy() {CVE-2023-52562} - i2c: i801: Fix block process call transactions {CVE-2024-26593} - bpf: Fix hashtab overflow check on 32-bit arches {CVE-2024-26884} - bpf: Fix stackmap overflow check on 32-bit arches {CVE-2024-26883} - x86/xen: Add some null pointer checking to smp.c {CVE-2024-26908} - RDMA/mlx5: Fix fortify source warning while accessing Eth segment {CVE-2024-26907} - Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security {CVE-2024-26903} - do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak {CVE-2024-26901} - aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts {CVE-2024-26898}
Updated packages:
  • bpftool-7.0.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:bec31f35c48346445eac4c002145986848461396
  • kernel-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:9ef7b65c1a9073ac3d630225443bec856ef5f06e
  • kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.5.els4.noarch.rpm
    sha:527cd446c7c2d5bf449160f2b6f1e470869cd46c
  • kernel-core-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:e858fca7e15e0aba867569521409785c632af910
  • kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:f03b858c0fcb674b5639e73a49342dee908d850f
  • kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:97fd4fba91c14cccb927548a484453dd41f4a7f6
  • kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:2c7938b014813ad2354311ec7d9230dc590156d4
  • kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:a102d23008eeb0d2c2478b5526a7fe64faf20bbb
  • kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:4346ec9a54498431379ce3cf53ddccc086edbd8b
  • kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:50961a8eccbe43b2935a1a7fe7a8e11e4a224f7c
  • kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:16d4d1c0dcab1baead15d99f940904fc06fa8b93
  • kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:441c1c403a59dcfa2ed70a11d527ab6cfe4ce0b4
  • kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:b6aeb70c10d930f32a9f67edf290f8e468df4cee
  • kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:3bc45e751156c0e8dccb2308e7314becd9780e7c
  • kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:a78c98bd25d563e085e468313dd3df6887a8df97
  • kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:0a63f3ba57c8908a20f1afcab3d0e3a3b4218c05
  • kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:58330058457b1cb99ab8ec74aab440629a82243f
  • kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.5.els4.noarch.rpm
    sha:6d9bbbb9f0ef85d5d649758cef706305f2a969f4
  • kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:366850ee37078ec4463577b2db378d6ff8cf1686
  • kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:b4b6450ca0b0b53b1f6ebd794b91378875fe57a4
  • kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:d1dce465075d171682bb18d47524b60f00dec08f
  • kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:5aff60748ac52ad4dd8206c36a274d5331244395
  • kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:665b3475778f2be9c55a28c2f04092cd3b0a6d6b
  • kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:cb1bd481d96a3e9d957ad1c959c75e54847b6fef
  • kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:7037e116f5a1a8f44ef9b89b81e22005d53d0a14
  • kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:c289b17db525f24dc7b21c1b46578eedc514c8d5
  • kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:cc0e5df26fc5728ab4cef5a765420c876aa41355
  • kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:baf9fefd58bb89f1aec52a67ca67ee91ccb9867e
  • kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:6baf8c6680a5c905ba57b029867d358f1d79d3dd
  • kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:13d8dc5aa488ff426346b52e9c8e8bbe2eca57d9
  • perf-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:886942931151f9ce59973350750c440334b211cb
  • python3-perf-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:ff993a61cb19d5c4c14af93c5127e6f752334e77
  • rtla-5.14.0-284.11.1.el9_2.tuxcare.5.els4.x86_64.rpm
    sha:60dd2656ace239ec1822dfbf3dd1693526ec2b91
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.