Release date:
2024-11-18 19:02:54 UTC
Description:
- smb: client: fix use-after-free in smb2_query_info_compound() {CVE-2023-52751}
- smb: client: prevent new fids from being removed by laundromat {CVE-2023-52751}
- cifs: fix dentry lookups in directory handle cache {CVE-2023-52751}
- cifs: return a single-use cfid if we did not get a lease {CVE-2023-52751}
- cifs: Check the lease context if we actually got a lease {CVE-2023-52751}
- cifs: set rc to -ENOENT if we can not get a dentry for the cached dir {CVE-2023-52751}
- cifs: use LIST_HEAD() and list_move() to simplify code {CVE-2023-52751}
- cifs: fix wrong unlock before return from cifs_tree_connect() {CVE-2023-52751}
- uprobe: avoid out-of-bounds memory access of fetching args {CVE-2024-50067}
- net: do not delay dst_entries_add() in dst_release() {CVE-2024-50036}
- smb: client: fix UAF in async decryption {CVE-2024-50047}
- smb3: rename encryption/decryption TFMs
- mm: call the security_mmap_file() LSM hook in remap_file_pages() {CVE-2024-47745}
- ext4: avoid OOB when system.data xattr changes underneath the filesystem {CVE-2024-47701}
- tty: n_gsm: Fix use-after-free in gsm_cleanup_mux {CVE-2024-50073}
- driver core: bus: Fix double free in driver API bus_register() {CVE-2024-50055}
- drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer {CVE-2024-49991}
- drm/amd/display: fix double free issue during amdgpu module unload {CVE-2024-49989}
- ext4: fix timer use-after-free on failed mount {CVE-2024-49960}
- Bluetooth: L2CAP: Fix uaf in l2cap_connect {CVE-2024-49950}
- Bluetooth: l2cap: Don't double set the HCI_CONN_MGMT_CONNECTED bit {CVE-2024-49950}
- mptcp: pm: Fix uaf in __timer_delete_sync {CVE-2024-46858}
- of: fdt: fix off-by-one error in unflatten_dt_nodes() {CVE-2022-48672}
- filelock: fix potential use-after-free in posix_lock_inode {CVE-2024-41049}
- locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock {CVE-2024-41049}
- drm/i915/gt: Fix potential UAF by revoke of fence registers {CVE-2024-41092}
- ext4: no need to continue when the number of entries is 1 {CVE-2024-49967}
- drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation {CVE-2024-49895}
- slip: make slhc_remember() more robust against malicious packets {CVE-2024-50033}
- drm/amd/display: Fix index out of bounds in DCN30 color transformation {CVE-2024-49969}
- drm/amd/display: Fix index out of bounds in degamma hardware format translation {CVE-2024-49894}
- ext4: aovid use-after-free in ext4_ext_insert_extent() {CVE-2024-49883}
- ACPI: sysfs: validate return type of _STR method {CVE-2024-49860}
- ext4: fix double brelse() the buffer of the extents path {CVE-2024-49882}
- tipc: guard against string buffer overrun {CVE-2024-49995}
- drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error {CVE-2024-47698}
- firmware_loader: Block path traversal {CVE-2024-47742}
- ppp: fix ppp_async_encode() illegal access {CVE-2024-50035}
- netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() {CVE-2024-47685}
- ext4: fix slab-use-after-free in ext4_split_extent_at() {CVE-2024-49884}
- drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX {CVE-2024-46871}
- ext4: avoid use-after-free in ext4_ext_show_leaf() {CVE-2024-49889}
- wifi: ath11k: fix array out-of-bound access in SoC stats {CVE-2024-49930}
- net: do not leave a dangling sk pointer, when socket creation fails {CVE-2024-40954}
- net: sched: sch_multiq: fix possible OOB write in multiq_tune() {CVE-2024-36978}
- drm/amdgpu: Validate TA binary size {CVE-2024-44977}
Updated packages:
-
bpftool-7.0.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:12e10ab47e1e956814532d5f530f25f8cfbed6597523203582105f40475ea398
-
kernel-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:7bbf24a2f1f6081e49599cca2f3f15319542276149161d55c65e10e668027fa5
-
kernel-abi-stablelists-5.14.0-284.11.1.el9_2.tuxcare.6.els9.noarch.rpm
sha:f1fba13efca7b3089272b8b9e4164d3bfe1e70e32131baa71626ba16091eeade
-
kernel-core-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:df208f758a1a3c25a14a2f66f3d895b5d81ba244c41a6f05e2ab1875a46912c0
-
kernel-cross-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:241f6472fe9c6e13a0d4d502c26c0c5760eb264f651f36c792bae8bede50732f
-
kernel-debug-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:91a8a2e6c9c2de5cfb539a56f8ab2f7034f8d93a83b2d4b0d2d874079458710f
-
kernel-debug-core-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:1e3238b981a4941ae60555bff3224bf1e62af8f37e8ee63ba6d75c063b0b65b5
-
kernel-debug-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:779a188ab4bf0a16e1d4c8f045e0638d01c5b8cad9cb4f36efb7939c94146470
-
kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:26f809f77a1083e56519662965cea11927d87f509476f1a87583bbf586821c41
-
kernel-debug-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:4a500b08c3109f8bb31e79fe66aae24d757223c7e9284d3a822a5376bd75bbb9
-
kernel-debug-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:62130a66e9c37aeff53082b215bdbbb4ec366d4bd9f098fb80a8c86b11d2006e
-
kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:aec98fc9b14f0269503722986c9f511b57c986ec52ae710b205bda2a9f999bf6
-
kernel-debug-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:0a4ded59196bd8381701204101b0cb99dae8a2e6178a375aa81be6bab3d23547
-
kernel-debug-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:23caf12b4f0c800c2e0abd3d74c7c4a0b5038d17c588dd8440f9ef46bbdfe131
-
kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:e6be6245fe2c3443399a172abb506dd2e8d12fef06688d1a7301e3b9894ca9b1
-
kernel-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:209471cfbb9c59a511af3d96e054590247932735968ef741d110c02d291bf9b3
-
kernel-devel-matched-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:acd9f27569deab3e880400aff24ede75289821c96a52efa71ef27b634c8e9084
-
kernel-doc-5.14.0-284.11.1.el9_2.tuxcare.6.els9.noarch.rpm
sha:c7dd1c2609229b5170696867868e7108c77122466f6f42c19fd00b80eb394427
-
kernel-headers-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:5a5524e199a779a6eb068066a76da1ba53a307f83f2a3c7d63a45af1d74a1d4c
-
kernel-ipaclones-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:acde07df7cef3d789f334cdb11c4cafff5ad14ae05a772931d88676b96877817
-
kernel-modules-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:379f320fa3fb8c51612a01ee403df4e18da525f9a5303d5d743319cadde0237f
-
kernel-modules-core-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:42047800e2ebcd3fabcd1e5b18c9d8022d2086527153a96a437fbf3225669ab4
-
kernel-modules-extra-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:d0b794134412603e825e00d094e149d57c37bcfd60618c7084b7dd6f2f120346
-
kernel-modules-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:7f48a17c32d85590f129e8ea23ff3e25d355b021415efec74c213755889d5a0a
-
kernel-modules-partner-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:1a466ae3477b6c7ca06ff350f591f48ed0693c058e23b3e24c5085a1521fbba0
-
kernel-selftests-internal-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:ec2674ba39ca60221f4f9312ed06054585cc665723fec46fc34b0035f50e4333
-
kernel-tools-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:bbb673197a0e5c9753de1f499103fd4b6c10ce1565a840b2311374c71bdc204b
-
kernel-tools-libs-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:f6ab4d28300d0cf551e629ada286d959942a0aca14b2224967b298f111a4fa00
-
kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:48761912ce3be87c182504dbe35d55ba4452179f4a5b6d4b52bbd9b725b442f1
-
kernel-uki-virt-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:47ca1675a1e9cc8f707a3702d809e0e7c67716830de93997d28cbdaec6cd23e8
-
perf-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:a4f6e3524f40ab7d0c5653149ecd406cf3715ed037f4021e7667fce6177a51dd
-
python3-perf-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:1c773d4e50d9a6f6baa747b8c16f6b8d664616690a744ab9d15c7dbd81029b8f
-
rtla-5.14.0-284.11.1.el9_2.tuxcare.6.els9.x86_64.rpm
sha:5e824a7db3e87485e5be1facfed0188a7a0b1c2f5c73d25cc8efc4e7f5bc5ca5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.