[CLSA-2024:1725304408] kernel: Fix of 37 CVEs
Type:
security
Severity:
Critical
Release date:
2024-09-02 19:13:32 UTC
Description:
- tun: add missing verification for short frame {CVE-2024-41091} - tap: add missing verification for short frame {CVE-2024-41090} - drm/amd/display: Fix potential index out of bounds in color transformation function {CVE-2024-38552} - net: fix __dst_negative_advice() race {CVE-2024-36971} - net: annotate data-races around sk->sk_dst_pending_confirm {CVE-2024-36971} - net: fix out-of-bounds access in ops_init {CVE-2024-36883} - net/sched: flower: Fix chain template offload {CVE-2024-26669} - netfilter: nf_tables: use timestamp to check for set element timeout {CVE-2024-27397} - netfilter: nft_set_rbtree: Remove unused variable nft_net {CVE-2024-27397} - netfilter: nft_set_rbtree: prefer sync gc to async worker {CVE-2024-27397} - netfilter: nft_set_rbtree: rename gc deactivate+erase function {CVE-2024-27397} - netfilter: nf_tables: de-constify set commit ops function argument {CVE-2024-27397} - netfilter: nft_set_rbtree: .deactivate fails if element has expired {CVE-2024-27397} - sched/membarrier: reduce the ability to hammer on sys_membarrier {CVE-2024-26602} - drm/vmwgfx: Fix possible null pointer derefence with invalid contexts {CVE-2022-38096} - sched/psi: Fix use-after-free in ep_remove_wait_queue() {CVE-2023-52707} - wait: add wake_up_pollfree() {CVE-2023-52707} - x86/sev: Check for user-space IOIO pointing to kernel space {CVE-2023-46813} - x86/sev: Check IOBM for IOIO exceptions from user-space {CVE-2023-46813} - x86/sev: Disable MMIO emulation from user mode {CVE-2023-46813} - tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). {CVE-2024-37356} - blk-cgroup: fix list corruption from reorder of WRITE ->lqueued {CVE-2024-38384} - netfilter: complete validation of user input {CVE-2024-35962} - SUNRPC: Fix UAF in svc_tcp_listen_data_ready() {CVE-2023-52885} - PM / devfreq: Synchronize devfreq_monitor_[start/stop] {CVE-2023-52635} - netfilter: validate user input for expected length {CVE-2024-35896} - virtio: delete vq in vp_find_vqs_msix() when request_irq() fails {CVE-2024-37353} - bnxt: prevent skb UAF after handing over to PTP worker {CVE-2022-48637} - net: openvswitch: fix overwriting ct original tuple for ICMPv6 {CVE-2024-38558} - net: core: reject skb_copy(_expand) for fraglist GSO skbs {CVE-2024-36929} - rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation {CVE-2024-36017} - ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound {CVE-2024-33621} - drm/vmwgfx: Fix invalid reads in fence signaled events {CVE-2024-36960} - gro: fix ownership transfer {CVE-2024-35890} - mlxbf_gige: stop interface during shutdown {CVE-2024-35885} - scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() {CVE-2023-52809} - wifi: mt76: replace skb_put with skb_put_zero {CVE-2024-42225} - drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc {CVE-2024-42228} - scsi: mpi3mr: Sanitise num_phys {CVE-2024-42159} - bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD {CVE-2024-42161} - drm/amdgpu/mes: fix use-after-free issue {CVE-2024-38581} - i40e: fix vf may be used uninitialized in this function warning {CVE-2024-36020} - vt: fix unicode buffer corruption when deleting characters {CVE-2024-35823} - ata: libata-core: Fix double free on error {CVE-2024-41087} - netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path {CVE-2024-26925} - tcp_metrics: validate source addr length {CVE-2024-42154}
Updated packages:
  • bpftool-7.0.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:f15eadc7a6c36a608081ef2f223b6550a41145022c423c14881ddf84d6fd5b8c
  • kernel-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:cc9827e51e8351630807998eae34cdfbfdcebc725f905e2265c26598b04f9ed8
  • kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.6.els6.noarch.rpm
    sha:ac216d5b19bb04a9c7f55c752d78cb5317564d9fcfeb9549e4e082b499fe6bf6
  • kernel-core-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:69d87a49a35ed9fde600d983e8e7376b7d7d2080c5098cdd3fe11318adbacf5c
  • kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:9c64027afaa062fbccb3e37c8b4480548f239cbdc58b6f97718be05572fb5f22
  • kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:ba8b8951f8648bbfee341fe0f721bf21d9001b9186850085539af41b706184bd
  • kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:245f75e8165931f3a01ba70dc8181aa079499be21462f3e818aca8b53f8e4d6b
  • kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:769783516c5736388142b7f7322cd82b674575adcbc5fd8fee90ae3e951b1351
  • kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:260a23cf17204e709249d75386d0569487b2ccaac800360ced4deeadac9720a5
  • kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:79de95bcf2044619a6b16587dd82065d2dad770a730c123e341db5bc7d52a8fb
  • kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:f775df16a03b70d82afcdb7e21880640c83d94249ef28d20e1be4b2983f92d1b
  • kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:a49d597186ad4505f3057c8c41add2074336a9f3ee24c4c226760a97076e77ab
  • kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:96562f0c9137e449778e5981e9495e198c5fd9cc061459c87e27bcd103c6cd50
  • kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:ec0a4d0b16680a11c5852239955beab7b6ed4bc3e4b2c185c910bb4ee9d7c12f
  • kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:97b254a0f4645ec99e7c783b494f10bd689186dde9857acb673524af943464b3
  • kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:8bb8ca935db44bcec0554792c7d9e801a356db010b32b2469b79c2e50e35e513
  • kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:90f9f939bd799a1660a32d89bee221665d0b4a39540c00e28eb193769c44e5f8
  • kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.6.els6.noarch.rpm
    sha:cda09f6f90854ee2be5848b4e9c13a1e5ae7479da0e99cbfdbc999df5f8cff00
  • kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:5ac572075ca1b68a2e8184e713da8650d4528ace4b896488f3404f792c325ed7
  • kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:022c4b479ca91d27122e5bfd7097d820a4707f4f0068571cb6d4dd4f44e03694
  • kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:3355a07978bf6af54dc4a5d346156673835c4120085326ad7b9dd9f062a8f6c5
  • kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:45a06df36b46df938042602f9d9f9db7b7386df801b6db848400b0208f99304c
  • kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:dbb64a2e61926dc7e08e56a26e88383cc12b8e8dd2cfe5fd98d648c08eb170f5
  • kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:0f837b42fbf30a859bad337f6ac802e870cce7465d157d64d0ebbbe32648e3b8
  • kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:fb867c46ab08d180e6fbd36e7fff58ec598d0c7cd689db5fc8e79637804347a1
  • kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:b3d9b75976f38199a1df1b95e1f901bc32ee912b02822dd30b49550ba9c6352c
  • kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:acf0c8c6fdafc8e1f9eb52a091d0232bdacc3c4aa3460d259da2e5755e93152d
  • kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:3896cbbec9fa27c51824906d1f2edaf197d07ea6df08f280324817fcc7b395f6
  • kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:e9803d92fdd5ca46655972bd36eead8923e89e01953dc018030d36189f8db407
  • kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:b87b3a5e78bb3bc109047a111f9180dd6f7893388a6de448648fbba92ce47466
  • perf-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:3b169afa1ee52b18472b08a52338fa02aa0b4ee4064d85325e1a991ccbcb41a8
  • python3-perf-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:435a59236d7974dcd35a73964fae1583735d7f2e71921b457a1e3478fd9a2ef9
  • rtla-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
    sha:c71481458fc3c5e281d618a66a18d4e4c29a0c37f068e4c957229d017d62f881
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.