[CLSA-2024:1731956568] kernel: Fix of 36 CVEs
Type:
security
Severity:
Critical
Release date:
2024-11-18 19:02:54 UTC
Description:
- smb: client: fix use-after-free in smb2_query_info_compound() {CVE-2023-52751} - smb: client: prevent new fids from being removed by laundromat {CVE-2023-52751} - cifs: fix dentry lookups in directory handle cache {CVE-2023-52751} - cifs: return a single-use cfid if we did not get a lease {CVE-2023-52751} - cifs: Check the lease context if we actually got a lease {CVE-2023-52751} - cifs: set rc to -ENOENT if we can not get a dentry for the cached dir {CVE-2023-52751} - cifs: use LIST_HEAD() and list_move() to simplify code {CVE-2023-52751} - cifs: fix wrong unlock before return from cifs_tree_connect() {CVE-2023-52751} - uprobe: avoid out-of-bounds memory access of fetching args {CVE-2024-50067} - net: do not delay dst_entries_add() in dst_release() {CVE-2024-50036} - smb: client: fix UAF in async decryption {CVE-2024-50047} - smb3: rename encryption/decryption TFMs - mm: call the security_mmap_file() LSM hook in remap_file_pages() {CVE-2024-47745} - ext4: avoid OOB when system.data xattr changes underneath the filesystem {CVE-2024-47701} - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux {CVE-2024-50073} - driver core: bus: Fix double free in driver API bus_register() {CVE-2024-50055} - drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer {CVE-2024-49991} - drm/amd/display: fix double free issue during amdgpu module unload {CVE-2024-49989} - ext4: fix timer use-after-free on failed mount {CVE-2024-49960} - Bluetooth: L2CAP: Fix uaf in l2cap_connect {CVE-2024-49950} - Bluetooth: l2cap: Don't double set the HCI_CONN_MGMT_CONNECTED bit {CVE-2024-49950} - mptcp: pm: Fix uaf in __timer_delete_sync {CVE-2024-46858} - of: fdt: fix off-by-one error in unflatten_dt_nodes() {CVE-2022-48672} - filelock: fix potential use-after-free in posix_lock_inode {CVE-2024-41049} - locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock {CVE-2024-41049} - drm/i915/gt: Fix potential UAF by revoke of fence registers {CVE-2024-41092} - ext4: no need to continue when the number of entries is 1 {CVE-2024-49967} - drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation {CVE-2024-49895} - slip: make slhc_remember() more robust against malicious packets {CVE-2024-50033} - drm/amd/display: Fix index out of bounds in DCN30 color transformation {CVE-2024-49969} - drm/amd/display: Fix index out of bounds in degamma hardware format translation {CVE-2024-49894} - ext4: aovid use-after-free in ext4_ext_insert_extent() {CVE-2024-49883} - ACPI: sysfs: validate return type of _STR method {CVE-2024-49860} - ext4: fix double brelse() the buffer of the extents path {CVE-2024-49882} - tipc: guard against string buffer overrun {CVE-2024-49995} - drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error {CVE-2024-47698} - firmware_loader: Block path traversal {CVE-2024-47742} - ppp: fix ppp_async_encode() illegal access {CVE-2024-50035} - netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() {CVE-2024-47685} - ext4: fix slab-use-after-free in ext4_split_extent_at() {CVE-2024-49884} - drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX {CVE-2024-46871} - ext4: avoid use-after-free in ext4_ext_show_leaf() {CVE-2024-49889} - wifi: ath11k: fix array out-of-bound access in SoC stats {CVE-2024-49930} - net: do not leave a dangling sk pointer, when socket creation fails {CVE-2024-40954} - net: sched: sch_multiq: fix possible OOB write in multiq_tune() {CVE-2024-36978} - drm/amdgpu: Validate TA binary size {CVE-2024-44977}
Updated packages:
  • bpftool-7.0.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:12e10ab47e1e956814532d5f530f25f8cfbed6597523203582105f40475ea398
  • kernel-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:7bbf24a2f1f6081e49599cca2f3f15319542276149161d55c65e10e668027fa5
  • kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.6.els9.noarch.rpm
    sha:f1fba13efca7b3089272b8b9e4164d3bfe1e70e32131baa71626ba16091eeade
  • kernel-core-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:df208f758a1a3c25a14a2f66f3d895b5d81ba244c41a6f05e2ab1875a46912c0
  • kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:241f6472fe9c6e13a0d4d502c26c0c5760eb264f651f36c792bae8bede50732f
  • kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:91a8a2e6c9c2de5cfb539a56f8ab2f7034f8d93a83b2d4b0d2d874079458710f
  • kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:1e3238b981a4941ae60555bff3224bf1e62af8f37e8ee63ba6d75c063b0b65b5
  • kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:779a188ab4bf0a16e1d4c8f045e0638d01c5b8cad9cb4f36efb7939c94146470
  • kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:26f809f77a1083e56519662965cea11927d87f509476f1a87583bbf586821c41
  • kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:4a500b08c3109f8bb31e79fe66aae24d757223c7e9284d3a822a5376bd75bbb9
  • kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:62130a66e9c37aeff53082b215bdbbb4ec366d4bd9f098fb80a8c86b11d2006e
  • kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:aec98fc9b14f0269503722986c9f511b57c986ec52ae710b205bda2a9f999bf6
  • kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:0a4ded59196bd8381701204101b0cb99dae8a2e6178a375aa81be6bab3d23547
  • kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:23caf12b4f0c800c2e0abd3d74c7c4a0b5038d17c588dd8440f9ef46bbdfe131
  • kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:e6be6245fe2c3443399a172abb506dd2e8d12fef06688d1a7301e3b9894ca9b1
  • kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:209471cfbb9c59a511af3d96e054590247932735968ef741d110c02d291bf9b3
  • kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:acd9f27569deab3e880400aff24ede75289821c96a52efa71ef27b634c8e9084
  • kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.6.els9.noarch.rpm
    sha:c7dd1c2609229b5170696867868e7108c77122466f6f42c19fd00b80eb394427
  • kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:5a5524e199a779a6eb068066a76da1ba53a307f83f2a3c7d63a45af1d74a1d4c
  • kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:acde07df7cef3d789f334cdb11c4cafff5ad14ae05a772931d88676b96877817
  • kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:379f320fa3fb8c51612a01ee403df4e18da525f9a5303d5d743319cadde0237f
  • kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:42047800e2ebcd3fabcd1e5b18c9d8022d2086527153a96a437fbf3225669ab4
  • kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:d0b794134412603e825e00d094e149d57c37bcfd60618c7084b7dd6f2f120346
  • kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:7f48a17c32d85590f129e8ea23ff3e25d355b021415efec74c213755889d5a0a
  • kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:1a466ae3477b6c7ca06ff350f591f48ed0693c058e23b3e24c5085a1521fbba0
  • kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:ec2674ba39ca60221f4f9312ed06054585cc665723fec46fc34b0035f50e4333
  • kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:bbb673197a0e5c9753de1f499103fd4b6c10ce1565a840b2311374c71bdc204b
  • kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:f6ab4d28300d0cf551e629ada286d959942a0aca14b2224967b298f111a4fa00
  • kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:48761912ce3be87c182504dbe35d55ba4452179f4a5b6d4b52bbd9b725b442f1
  • kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:47ca1675a1e9cc8f707a3702d809e0e7c67716830de93997d28cbdaec6cd23e8
  • perf-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:a4f6e3524f40ab7d0c5653149ecd406cf3715ed037f4021e7667fce6177a51dd
  • python3-perf-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:1c773d4e50d9a6f6baa747b8c16f6b8d664616690a744ab9d15c7dbd81029b8f
  • rtla-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
    sha:5e824a7db3e87485e5be1facfed0188a7a0b1c2f5c73d25cc8efc4e7f5bc5ca5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.