Release date:
2024-09-02 19:13:32 UTC
Description:
- tun: add missing verification for short frame {CVE-2024-41091}
- tap: add missing verification for short frame {CVE-2024-41090}
- drm/amd/display: Fix potential index out of bounds in color transformation function {CVE-2024-38552}
- net: fix __dst_negative_advice() race {CVE-2024-36971}
- net: annotate data-races around sk->sk_dst_pending_confirm {CVE-2024-36971}
- net: fix out-of-bounds access in ops_init {CVE-2024-36883}
- net/sched: flower: Fix chain template offload {CVE-2024-26669}
- netfilter: nf_tables: use timestamp to check for set element timeout {CVE-2024-27397}
- netfilter: nft_set_rbtree: Remove unused variable nft_net {CVE-2024-27397}
- netfilter: nft_set_rbtree: prefer sync gc to async worker {CVE-2024-27397}
- netfilter: nft_set_rbtree: rename gc deactivate+erase function {CVE-2024-27397}
- netfilter: nf_tables: de-constify set commit ops function argument {CVE-2024-27397}
- netfilter: nft_set_rbtree: .deactivate fails if element has expired {CVE-2024-27397}
- sched/membarrier: reduce the ability to hammer on sys_membarrier {CVE-2024-26602}
- drm/vmwgfx: Fix possible null pointer derefence with invalid contexts {CVE-2022-38096}
- sched/psi: Fix use-after-free in ep_remove_wait_queue() {CVE-2023-52707}
- wait: add wake_up_pollfree() {CVE-2023-52707}
- x86/sev: Check for user-space IOIO pointing to kernel space {CVE-2023-46813}
- x86/sev: Check IOBM for IOIO exceptions from user-space {CVE-2023-46813}
- x86/sev: Disable MMIO emulation from user mode {CVE-2023-46813}
- tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). {CVE-2024-37356}
- blk-cgroup: fix list corruption from reorder of WRITE ->lqueued {CVE-2024-38384}
- netfilter: complete validation of user input {CVE-2024-35962}
- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() {CVE-2023-52885}
- PM / devfreq: Synchronize devfreq_monitor_[start/stop] {CVE-2023-52635}
- netfilter: validate user input for expected length {CVE-2024-35896}
- virtio: delete vq in vp_find_vqs_msix() when request_irq() fails {CVE-2024-37353}
- bnxt: prevent skb UAF after handing over to PTP worker {CVE-2022-48637}
- net: openvswitch: fix overwriting ct original tuple for ICMPv6 {CVE-2024-38558}
- net: core: reject skb_copy(_expand) for fraglist GSO skbs {CVE-2024-36929}
- rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation {CVE-2024-36017}
- ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound {CVE-2024-33621}
- drm/vmwgfx: Fix invalid reads in fence signaled events {CVE-2024-36960}
- gro: fix ownership transfer {CVE-2024-35890}
- mlxbf_gige: stop interface during shutdown {CVE-2024-35885}
- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() {CVE-2023-52809}
- wifi: mt76: replace skb_put with skb_put_zero {CVE-2024-42225}
- drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc {CVE-2024-42228}
- scsi: mpi3mr: Sanitise num_phys {CVE-2024-42159}
- bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD {CVE-2024-42161}
- drm/amdgpu/mes: fix use-after-free issue {CVE-2024-38581}
- i40e: fix vf may be used uninitialized in this function warning {CVE-2024-36020}
- vt: fix unicode buffer corruption when deleting characters {CVE-2024-35823}
- ata: libata-core: Fix double free on error {CVE-2024-41087}
- netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path {CVE-2024-26925}
- tcp_metrics: validate source addr length {CVE-2024-42154}
Updated packages:
-
bpftool-7.0.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:f15eadc7a6c36a608081ef2f223b6550a41145022c423c14881ddf84d6fd5b8c
-
kernel-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:cc9827e51e8351630807998eae34cdfbfdcebc725f905e2265c26598b04f9ed8
-
kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.6.els6.noarch.rpm
sha:ac216d5b19bb04a9c7f55c752d78cb5317564d9fcfeb9549e4e082b499fe6bf6
-
kernel-core-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:69d87a49a35ed9fde600d983e8e7376b7d7d2080c5098cdd3fe11318adbacf5c
-
kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:9c64027afaa062fbccb3e37c8b4480548f239cbdc58b6f97718be05572fb5f22
-
kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:ba8b8951f8648bbfee341fe0f721bf21d9001b9186850085539af41b706184bd
-
kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:245f75e8165931f3a01ba70dc8181aa079499be21462f3e818aca8b53f8e4d6b
-
kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:769783516c5736388142b7f7322cd82b674575adcbc5fd8fee90ae3e951b1351
-
kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:260a23cf17204e709249d75386d0569487b2ccaac800360ced4deeadac9720a5
-
kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:79de95bcf2044619a6b16587dd82065d2dad770a730c123e341db5bc7d52a8fb
-
kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:f775df16a03b70d82afcdb7e21880640c83d94249ef28d20e1be4b2983f92d1b
-
kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:a49d597186ad4505f3057c8c41add2074336a9f3ee24c4c226760a97076e77ab
-
kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:96562f0c9137e449778e5981e9495e198c5fd9cc061459c87e27bcd103c6cd50
-
kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:ec0a4d0b16680a11c5852239955beab7b6ed4bc3e4b2c185c910bb4ee9d7c12f
-
kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:97b254a0f4645ec99e7c783b494f10bd689186dde9857acb673524af943464b3
-
kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:8bb8ca935db44bcec0554792c7d9e801a356db010b32b2469b79c2e50e35e513
-
kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:90f9f939bd799a1660a32d89bee221665d0b4a39540c00e28eb193769c44e5f8
-
kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.6.els6.noarch.rpm
sha:cda09f6f90854ee2be5848b4e9c13a1e5ae7479da0e99cbfdbc999df5f8cff00
-
kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:5ac572075ca1b68a2e8184e713da8650d4528ace4b896488f3404f792c325ed7
-
kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:022c4b479ca91d27122e5bfd7097d820a4707f4f0068571cb6d4dd4f44e03694
-
kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:3355a07978bf6af54dc4a5d346156673835c4120085326ad7b9dd9f062a8f6c5
-
kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:45a06df36b46df938042602f9d9f9db7b7386df801b6db848400b0208f99304c
-
kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:dbb64a2e61926dc7e08e56a26e88383cc12b8e8dd2cfe5fd98d648c08eb170f5
-
kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:0f837b42fbf30a859bad337f6ac802e870cce7465d157d64d0ebbbe32648e3b8
-
kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:fb867c46ab08d180e6fbd36e7fff58ec598d0c7cd689db5fc8e79637804347a1
-
kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:b3d9b75976f38199a1df1b95e1f901bc32ee912b02822dd30b49550ba9c6352c
-
kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:acf0c8c6fdafc8e1f9eb52a091d0232bdacc3c4aa3460d259da2e5755e93152d
-
kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:3896cbbec9fa27c51824906d1f2edaf197d07ea6df08f280324817fcc7b395f6
-
kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:e9803d92fdd5ca46655972bd36eead8923e89e01953dc018030d36189f8db407
-
kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:b87b3a5e78bb3bc109047a111f9180dd6f7893388a6de448648fbba92ce47466
-
perf-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:3b169afa1ee52b18472b08a52338fa02aa0b4ee4064d85325e1a991ccbcb41a8
-
python3-perf-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:435a59236d7974dcd35a73964fae1583735d7f2e71921b457a1e3478fd9a2ef9
-
rtla-5.14.0-284.11.1.el9_2.tuxcare.6.els6.x86_64.rpm
sha:c71481458fc3c5e281d618a66a18d4e4c29a0c37f068e4c957229d017d62f881
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.