[CLSA-2024:1727351493] kernel: Fix of 19 CVEs
Type:
security
Severity:
Important
Release date:
2024-09-26 11:51:37 UTC
Description:
- tipc: Return non-zero value from tipc_udp_addr2str() on error {CVE-2024-42284} - dev/parport: fix the array out-of-bounds risk {CVE-2024-42301} - RDMA/iwcm: Fix a use-after-free related to destroying CM IDs {CVE-2024-42285} - scsi: aacraid: Fix double-free on probe failure {CVE-2024-46673} - ipv6: prevent UAF in ip6_send_skb() {CVE-2024-44987} - block/ioctl: prefer different overflow check {CVE-2024-41000} - ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." {CVE-2024-40984} - net/sched: Fix UAF when resolving a clash {CVE-2024-41040} - nvme: avoid double free special payload {CVE-2024-41073} - x86/tdx: Allow 32-bit emulation by default {CVE-2024-25744} - x86/entry: Do not allow external 0x80 interrupts {CVE-2024-25742} - x86/entry: Convert INT 0x80 emulation to IDTENTRY {CVE-2024-25742} - x86/coco: Disable 32-bit emulation by default on TDX and SEV {CVE-2024-25742} - x86: Make IA32_EMULATION boot time configurable {CVE-2024-25744} - x86/entry: Make IA32 syscalls' availability depend on ia32_enabled() {CVE-2024-25744} - x86/elf: Make loading of 32bit processes depend on ia32_enabled() {CVE-2024-25744} - x86/entry: Compile entry_SYSCALL32_ignore() unconditionally {CVE-2024-25744} - x86/entry: Rename ignore_sysret() {CVE-2024-25744} - x86/cpu: Don't write CSTAR MSR on Intel CPUs {CVE-2024-25744} - x86: Introduce ia32_enabled() {CVE-2024-25742} - x86: Fix misspelled Kconfig symbols {CVE-2024-25744} - x86/sev: Harden #VC instruction emulation somewhat {CVE-2024-25742} - objtool: Add entry UNRET validation {CVE-2024-25744} - x86/cpu: Switch to arch_cpu_finalize_init() {CVE-2022-40982} - init: Provide arch_cpu_finalize_init() {CVE-2022-40982} - gfs2: Fix potential glock use-after-free on unmount {CVE-2024-38570} - gfs2: Rename sd_{ glock => kill }_wait {CVE-2024-38570} - gfs2: Remove ill-placed consistency check {CVE-2024-38570} - gfs2: simplify gdlm_put_lock with out_free label {CVE-2024-38570} - dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list {CVE-2024-40956} - drm/amdgpu: add error handle to avoid out-of-bounds {CVE-2024-39471} - net/mlx5: Discard command completions in internal error {CVE-2024-38555} - net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538} - netfilter: nftables: exthdr: fix 4-byte stack OOB write {CVE-2023-52628} - perf/core: Fix potential NULL deref {CVE-2023-5717} - perf: Disallow mis-matched inherited group reads {CVE-2023-5717}
Updated packages:
  • bpftool-7.0.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:5f85c871a90cfb19777be7210a0e59fcd0e49c2b064c934963322ab527a41494
  • kernel-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:9c3ca762a2ef8683da37856d018c1069225974d17a4c9993220c003af8b5c9f1
  • kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.6.els7.noarch.rpm
    sha:075ecbee82d7123961ef872d001930fe67b03e25a379ef8db7f681d0570c0cde
  • kernel-core-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:d25d1158196747f9daa13aec7de5904956b61f865226949cf333b999d6580bd9
  • kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:32e31fec57e49f72f1f652e28b32cee6e24a8b79a9dff59b50878fcca11e95ec
  • kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:24d9e6f59ed3a6d2a2d3388473a2930ab0dd019feb31047be9f9ce6c6f45cfe8
  • kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:1b2176bc5c1ab8a42b61c04dbf3ca14f53c4002e246b20c1d1205bbce7aeca66
  • kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:84cf1b25f3e47b50520366359df845db30cc2aecc12e3cea70a8e6864f4bed8f
  • kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:17be2955afdc5e1e6ca8920c307151d51b27fb9e55fcc0c4b97417b4f579f15b
  • kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:36ab14dbc56c6436acdf0070b8e3e3de0363c18308138b7f0f2fac2600fbb451
  • kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:39bb57dc87ec42fda966aa887241c0563ae3e7f8048e6b9ae315caeb9c04db30
  • kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:2c7dbdff6be1a0e960ebed89f30a7cefabb48f0f69cd0c1395bf5a05e39d5b02
  • kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:60202febd4a7be1273f152be56d7c9eb1c399b52726c1d469edb3142e1669c82
  • kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:9dc01ae314c2129a8e7010c2cf50713225151cbbf9a00ed6d7126accc4e46713
  • kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:bd53f910f96b6d3cba777770e947d7b413f8d4b287357a3e5739748cbcb05619
  • kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:8c95920be5a6a7366e3c07c1dc6877782e8259cf89f31743bb89739c0623be30
  • kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:2d1a7f567a61babe50548b20d313972ebd4febcedc3caf7ce912266dda3f1b27
  • kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.6.els7.noarch.rpm
    sha:cbe23b505fe2d1033763b027706501426c6b8081e2148196875ed689ee6d57be
  • kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:5a8d4da57eed0a7dab10eb40cadef7ba95660c346896a698976413f7988a5dad
  • kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:478c28bebb8a4fe0e23b5e73a37f7191a6abf27f1e9d528da804bbebac56fa6e
  • kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:0e7afb0a34c93d77493f4cf946ecb2e33e5cc265dd70e21d01b0d7060c3ef5d6
  • kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:9a4dfa3a2af6f6284756ec9f5952d0ad5d4f121a0468fdb68757ffc6d5c14327
  • kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:c58002fd5238fe4c6850ab2d0d049262534b26fdddccbed88370b69bc85f6b5e
  • kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:75789039b3d0e0122f8a390332f7eb539e6af473543c97f07a6a440a34b735b1
  • kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:7fcde308c9a8e615cddd892cf2ce809d91ce7b1183e417b53c332220541a5208
  • kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:1ee4507af8d7d2913c587e97c0207a44f47a9f29ed8dda9ecaf38a38b21c8d10
  • kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:98bc235b7c6a13a4810cfa6bac23722ff147db8d82f05c0001f550fb7f615362
  • kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:b4bafa8f2b6260e684bba8d40eace01dc92143af4f56f06fb0dc0a479753f4cf
  • kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:017ce34d483b0f827fd44acaee7fc201bf0250bda1d5847d0858ddb731a23b00
  • kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:262d66482ac29e8885b8ba5d43a6bcff9f79169821dae4abbc4ee3fe0674bc32
  • perf-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:62e381188eab260221248e4507381aa67e20676c44fab197f6b1f19961063fd9
  • python3-perf-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:04f609c37eaae814c61a0680843dee37542e703652da4c4850d1fd0977bcf350
  • rtla-5.14.0-284.11.1.el9_2.tuxcare.6.els7.x86_64.rpm
    sha:e83675d21c27a2eb5df4aa8df21d47f2a8030605471b03506154965e7617ae4b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.