[CLSA-2024:1722530110] kernel: Fix of 47 CVEs
Type:
security
Severity:
Important
Release date:
2024-08-01 16:47:23 UTC
Description:
- af_unix: Fix garbage collector racing against connect() {CVE-2024-26923} - netfilter: nft_limit: reject configurations that cause integer overflow {CVE-2024-26668} - libbpf: Fix use-after-free in btf_dump_name_dups {CVE-2022-3534} - bpf: Fix partial dynptr stack slot reads/writes {CVE-2023-39191} - ima: Fix use-after-free on a dentry's dname.name {CVE-2024-39494} - ima: define ima_max_digest_data struct without a flexible array variable - ima: detect changes to the backing overlay file - tpm: fix reference counting for struct tpm_chip {CVE-2022-2977} - tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux {CVE-2023-6546} - tty: n_gsm: fix restart handling via CLD command {CVE-2023-6546} - r8169: Fix possible ring buffer corruption on fragmented Tx packets. {CVE-2024-38586} - netfilter: tproxy: bail out if IP has been disabled on the device {CVE-2024-36270} - tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). {CVE-2024-36904} - Bluetooth: Fix double free in hci_conn_cleanup {CVE-2023-28464} - fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super {CVE-2024-0841} - net/ipv6: avoid possible UAF in ip6_route_mpath_notify() {CVE-2024-26852} - tipc: fix UAF in error path {CVE-2024-36886} - Bluetooth: af_bluetooth: Fix deadlock {CVE-2024-26886} - Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg {CVE-2023-51779} - dma-mapping: benchmark: handle NUMA_NO_NODE correctly {CVE-2024-39277} - net/mlx5e: Prevent deadlock while disabling aRFS {CVE-2024-27014} - net/mlx5e: Introduce flow steering API {CVE-2024-27014} - x86/sev: Harden #VC instruction emulation somewhat {CVE-2024-25742} - x86/coco: Disable 32-bit emulation by default on TDX and SEV {CVE-2024-25742} - x86: Introduce ia32_enabled() {CVE-2024-25742} - x86/entry: Do not allow external 0x80 interrupts {CVE-2024-25742} - x86/entry: Convert INT 0x80 emulation to IDTENTRY {CVE-2024-25742} - RDMA/srpt: Support specifying the srpt_service_guid parameter {CVE-2024-26744} - platform/x86: think-lmi: Fix reference leak {CVE-2023-52520} - USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command {CVE-2024-27059} - fat: fix uninitialized field in nostale filehandles {CVE-2024-26973} - usb: xhci: Add error handling in xhci_map_urb_for_dma {CVE-2024-26964} - wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete {CVE-2024-26897} - wifi: mac80211: fix race condition on enabling fast-xmit {CVE-2024-26779} - RDMA/qedr: Fix qedr_create_user_qp error flow {CVE-2024-26743} - wifi: iwlwifi: fix a memory corruption {CVE-2024-26610} - x86/fpu: Stop relying on userspace for info to fault in xsave buffer {CVE-2024-26603} - wifi: rt2x00: restart beacon queue when hardware reset {CVE-2023-52595} - wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594} - net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg {CVE-2023-52528} - RDMA/siw: Fix connection failure handling {CVE-2023-52513} - usb: hub: Guard against accesses to uninitialized BOS descriptors {CVE-2023-52477} - tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc {CVE-2021-47185} - sctp: fail if no bound addresses can be used for a given scope {CVE-2023-1074} - memcg: enable accounting for file lock caches {CVE-2022-0480} - net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() {CVE-2023-6176} - RDMA/srpt: Do not register event handler until srpt device is fully setup {CVE-2024-26872} - drm/amd/display: Atom Integrated System Info v2_2 for DCN35 {CVE-2024-36897} - net/mlx5e: fix a potential double-free in fs_any_create_groups {CVE-2023-52667} - ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() {CVE-2024-36902} - ipv6: prevent NULL dereference in ip6_output() {CVE-2024-36901} - vt: fix memory overlapping when deleting chars in the buffer {CVE-2022-48627} - hwmon: (coretemp) Fix out-of-bounds memory access {CVE-2024-26664} - i2c: Fix a potential use after free {CVE-2019-25162} - net/smc: fix illegal rmb_desc access in SMC-D connection dump {CVE-2024-26615}
Updated packages:
  • bpftool-7.0.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:4f73f41b1862c822d0691446dabed21085ab1731
  • kernel-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:2e588c5c372716f414ab09bcdf2961bd972e3dda
  • kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.6.els5.noarch.rpm
    sha:562403121ce8e4cbc35f561bc699290b208e2dff
  • kernel-core-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:31fa8534a9a08e4235d0a8ab6d9e9c97c0c12408
  • kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:9b434b249cc1b2606a25087fc3ec2e564a187421
  • kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:8973339f568c1c190248f2aafb0fa5e6c687a4b3
  • kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:975fb35439242dc30239ec522a8bfcedfac8d162
  • kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:1536b24df12d3d51da549623cac8260bdffae3c3
  • kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:5fcbf2dee2042a05fcd678d9189a0b770ad3e6a5
  • kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:04d791ea2c43fa07616da828b4810b967a7826e1
  • kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:c5ce4f0f617bd28e88d239286faf500e0ff029ee
  • kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:58e716f7560e00e092dbf3a557c03b60cf9595a5
  • kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:205c0d3d4ae94a3d32b408cc94f25e8f03f4bb34
  • kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:f127c1dbd0a0b5f42716bb40f1316b7893eef702
  • kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:094746ba0a03cb5d17cc2c7e9fe851ceb77447ba
  • kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:e908d75820b63664fd483b7cdcc573b4f55b6570
  • kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:cbbe5ae4f5076c83992002600fc0a259a7244c31
  • kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.6.els5.noarch.rpm
    sha:b524b03880578eacf671fa0dc3f586f5acea2eb5
  • kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:8debce149692655f7058844c42f4f44babbe946d
  • kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:382a3c51a69958a9fc06d57b4cd5b16d468b9f17
  • kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:d203559580b88ec5d1d76c06ad017e33dad1ab62
  • kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:742fca75ca0d18357f6fc18c56cf9f202b81f156
  • kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:a1e954d8c828b6fa979042ed4e68f98b3dd56bd1
  • kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:d67c46389806c71dadbe9612ca197893bfe123a2
  • kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:4c0e1ca26b4aa9d030f57ff3bde29cbc1884d274
  • kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:e83915a909fe14bab9b33887d0107629acb12b6e
  • kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:98cf3dd0c2dccd5f5e1871445dde4c1f4d65c0c5
  • kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:8eb92c139178920959e4534b1e7dfd551965cb72
  • kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:b5400b58500f1d8966e0dd7201b5afe70c156e71
  • kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:974f3f99b8ec194dfb48695d0a410e4d18e25ce6
  • perf-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:0dd8b9d781d05a507cffa9b8ec7aa8a20f2cbbb1
  • python3-perf-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:6049c99bc3560a9fd08ace98ccb95accccfa8334
  • rtla-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
    sha:55f54837a7e3ac1359b361151d0bdc6092648639
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.