Release date:
2024-08-01 16:47:23 UTC
Description:
- af_unix: Fix garbage collector racing against connect() {CVE-2024-26923}
- netfilter: nft_limit: reject configurations that cause integer overflow {CVE-2024-26668}
- libbpf: Fix use-after-free in btf_dump_name_dups {CVE-2022-3534}
- bpf: Fix partial dynptr stack slot reads/writes {CVE-2023-39191}
- ima: Fix use-after-free on a dentry's dname.name {CVE-2024-39494}
- ima: define ima_max_digest_data struct without a flexible array variable
- ima: detect changes to the backing overlay file
- tpm: fix reference counting for struct tpm_chip {CVE-2022-2977}
- tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux {CVE-2023-6546}
- tty: n_gsm: fix restart handling via CLD command {CVE-2023-6546}
- r8169: Fix possible ring buffer corruption on fragmented Tx packets. {CVE-2024-38586}
- netfilter: tproxy: bail out if IP has been disabled on the device {CVE-2024-36270}
- tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). {CVE-2024-36904}
- Bluetooth: Fix double free in hci_conn_cleanup {CVE-2023-28464}
- fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super {CVE-2024-0841}
- net/ipv6: avoid possible UAF in ip6_route_mpath_notify() {CVE-2024-26852}
- tipc: fix UAF in error path {CVE-2024-36886}
- Bluetooth: af_bluetooth: Fix deadlock {CVE-2024-26886}
- Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg {CVE-2023-51779}
- dma-mapping: benchmark: handle NUMA_NO_NODE correctly {CVE-2024-39277}
- net/mlx5e: Prevent deadlock while disabling aRFS {CVE-2024-27014}
- net/mlx5e: Introduce flow steering API {CVE-2024-27014}
- x86/sev: Harden #VC instruction emulation somewhat {CVE-2024-25742}
- x86/coco: Disable 32-bit emulation by default on TDX and SEV {CVE-2024-25742}
- x86: Introduce ia32_enabled() {CVE-2024-25742}
- x86/entry: Do not allow external 0x80 interrupts {CVE-2024-25742}
- x86/entry: Convert INT 0x80 emulation to IDTENTRY {CVE-2024-25742}
- RDMA/srpt: Support specifying the srpt_service_guid parameter {CVE-2024-26744}
- platform/x86: think-lmi: Fix reference leak {CVE-2023-52520}
- USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command {CVE-2024-27059}
- fat: fix uninitialized field in nostale filehandles {CVE-2024-26973}
- usb: xhci: Add error handling in xhci_map_urb_for_dma {CVE-2024-26964}
- wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete {CVE-2024-26897}
- wifi: mac80211: fix race condition on enabling fast-xmit {CVE-2024-26779}
- RDMA/qedr: Fix qedr_create_user_qp error flow {CVE-2024-26743}
- wifi: iwlwifi: fix a memory corruption {CVE-2024-26610}
- x86/fpu: Stop relying on userspace for info to fault in xsave buffer {CVE-2024-26603}
- wifi: rt2x00: restart beacon queue when hardware reset {CVE-2023-52595}
- wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594}
- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg {CVE-2023-52528}
- RDMA/siw: Fix connection failure handling {CVE-2023-52513}
- usb: hub: Guard against accesses to uninitialized BOS descriptors {CVE-2023-52477}
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc {CVE-2021-47185}
- sctp: fail if no bound addresses can be used for a given scope {CVE-2023-1074}
- memcg: enable accounting for file lock caches {CVE-2022-0480}
- net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() {CVE-2023-6176}
- RDMA/srpt: Do not register event handler until srpt device is fully setup {CVE-2024-26872}
- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 {CVE-2024-36897}
- net/mlx5e: fix a potential double-free in fs_any_create_groups {CVE-2023-52667}
- ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() {CVE-2024-36902}
- ipv6: prevent NULL dereference in ip6_output() {CVE-2024-36901}
- vt: fix memory overlapping when deleting chars in the buffer {CVE-2022-48627}
- hwmon: (coretemp) Fix out-of-bounds memory access {CVE-2024-26664}
- i2c: Fix a potential use after free {CVE-2019-25162}
- net/smc: fix illegal rmb_desc access in SMC-D connection dump {CVE-2024-26615}
Updated packages:
-
bpftool-7.0.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:4f73f41b1862c822d0691446dabed21085ab1731
-
kernel-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:2e588c5c372716f414ab09bcdf2961bd972e3dda
-
kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.6.els5.noarch.rpm
sha:562403121ce8e4cbc35f561bc699290b208e2dff
-
kernel-core-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:31fa8534a9a08e4235d0a8ab6d9e9c97c0c12408
-
kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:9b434b249cc1b2606a25087fc3ec2e564a187421
-
kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:8973339f568c1c190248f2aafb0fa5e6c687a4b3
-
kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:975fb35439242dc30239ec522a8bfcedfac8d162
-
kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:1536b24df12d3d51da549623cac8260bdffae3c3
-
kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:5fcbf2dee2042a05fcd678d9189a0b770ad3e6a5
-
kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:04d791ea2c43fa07616da828b4810b967a7826e1
-
kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:c5ce4f0f617bd28e88d239286faf500e0ff029ee
-
kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:58e716f7560e00e092dbf3a557c03b60cf9595a5
-
kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:205c0d3d4ae94a3d32b408cc94f25e8f03f4bb34
-
kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:f127c1dbd0a0b5f42716bb40f1316b7893eef702
-
kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:094746ba0a03cb5d17cc2c7e9fe851ceb77447ba
-
kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:e908d75820b63664fd483b7cdcc573b4f55b6570
-
kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:cbbe5ae4f5076c83992002600fc0a259a7244c31
-
kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.6.els5.noarch.rpm
sha:b524b03880578eacf671fa0dc3f586f5acea2eb5
-
kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:8debce149692655f7058844c42f4f44babbe946d
-
kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:382a3c51a69958a9fc06d57b4cd5b16d468b9f17
-
kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:d203559580b88ec5d1d76c06ad017e33dad1ab62
-
kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:742fca75ca0d18357f6fc18c56cf9f202b81f156
-
kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:a1e954d8c828b6fa979042ed4e68f98b3dd56bd1
-
kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:d67c46389806c71dadbe9612ca197893bfe123a2
-
kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:4c0e1ca26b4aa9d030f57ff3bde29cbc1884d274
-
kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:e83915a909fe14bab9b33887d0107629acb12b6e
-
kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:98cf3dd0c2dccd5f5e1871445dde4c1f4d65c0c5
-
kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:8eb92c139178920959e4534b1e7dfd551965cb72
-
kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:b5400b58500f1d8966e0dd7201b5afe70c156e71
-
kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:974f3f99b8ec194dfb48695d0a410e4d18e25ce6
-
perf-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:0dd8b9d781d05a507cffa9b8ec7aa8a20f2cbbb1
-
python3-perf-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:6049c99bc3560a9fd08ace98ccb95accccfa8334
-
rtla-5.14.0-284.11.1.el9_2.tuxcare.6.els5.x86_64.rpm
sha:55f54837a7e3ac1359b361151d0bdc6092648639
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.