[CLSA-2024:1725871927] kernel: Fix of 30 CVEs
Type:
security
Severity:
Critical
Release date:
2024-09-09 09:35:46 UTC
Description:
- gfs2: Fix potential glock use-after-free on unmount {CVE-2024-38570} - gfs2: Remove ill-placed consistency check {CVE-2024-38570} - gfs2: introduce new gfs2_glock_assert_withdraw {CVE-2024-38570} - gfs2: simplify gdlm_put_lock with out_free label {CVE-2024-38570} - wifi: mt76: replace skb_put with skb_put_zero {CVE-2024-42225} - bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD {CVE-2024-42161} - drm/amdgpu/mes: fix use-after-free issue {CVE-2024-38581} - drm/amd/display: Fix potential index out of bounds in color transformation function {CVE-2024-38552} - net: bridge: mst: fix suspicious rcu usage in br_mst_set_state {CVE-2024-36979} - net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state {CVE-2024-36979} - net: bridge: mst: fix vlan use-after-free {CVE-2024-36979} - netfilter: nft_limit: reject configurations that cause integer overflow {CVE-2024-26668} - ima: Fix use-after-free on a dentry's dname.name {CVE-2024-39494} - ima: define ima_max_digest_data struct without a flexible array variable - ima: detect changes to the backing overlay file - drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc {CVE-2024-42228} - dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list {CVE-2024-40956} - drm/amdgpu: add error handle to avoid out-of-bounds {CVE-2024-39471} - net/sched: flower: Fix chain template offload {CVE-2024-26669} - userfaultfd: fix a race between writeprotect and exit_mmap() {CVE-2021-47461} - scsi: mpi3mr: Sanitise num_phys {CVE-2024-42159} - ata: libata-core: Fix double free on error {CVE-2024-41087} - net/mlx5: Discard command completions in internal error {CVE-2024-38555} - net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538} - net: sched: sch_multiq: fix possible OOB write in multiq_tune() {CVE-2024-36978} - drm/vmwgfx: Fix invalid reads in fence signaled events {CVE-2024-36960} - tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). {CVE-2024-36904} - tipc: fix UAF in error path {CVE-2024-36886} - net: fix out-of-bounds access in ops_init {CVE-2024-36883} - tap: add missing verification for short frame {CVE-2024-41090} - tun: add missing verification for short frame {CVE-2024-41091} - netfilter: nf_tables: use timestamp to check for set element timeout {CVE-2024-27397} - netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path {CVE-2024-26925} - netfilter: nf_tables: release batch on table validation from abort path {CVE-2024-26925} - netfilter: nf_tables: discard table flag update with pending basechain deletion {CVE-2024-26925} - netfilter: nf_tables: reject table flag and netdev basechain updates {CVE-2024-26925} - af_unix: Fix garbage collector racing against connect() {CVE-2024-26923} - net/ipv6: avoid possible UAF in ip6_route_mpath_notify() {CVE-2024-26852} - sched/psi: Fix use-after-free in ep_remove_wait_queue() {CVE-2023-52707} - wait: add wake_up_pollfree() {CVE-2023-52707} - tcp_metrics: validate source addr length {CVE-2024-42154}
Updated packages:
  • bpftool-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:03a35b2c3e30f74cb3712f38fb16bb6392abb108cf86034bcb8df29082a6f23f
  • kernel-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:a406f22a79df1d7d06b150c7ba38488492c4b19deca076b339dcd3c68aa9ab8f
  • kernel-core-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:19a874ccb9419343f2aa5c37391108d0bcc465b2606e618d7be4770795eb3330
  • kernel-cross-headers-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:3a8c756083cc7224c942284d34b934edc30e8e2d9b089fe3ef126a43e1ab216f
  • kernel-debug-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:b19a84386a6943b2788bebab368ce8036231c88c1608bb52d963bff078ee4643
  • kernel-debug-core-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:f713bd15f4d3b1f416d3b5d2019d8d4f4b469520af8a5f7919f01674cfdb7535
  • kernel-debug-devel-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:7debdd7dcb3bda079e9aad0e144868207d4a1ee4c67cb132648ee8fd2b7099c3
  • kernel-debug-modules-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:12604f91d29c3583af0ce9c264d993fee8ca92a0ebcc673536e493c6872d396d
  • kernel-debug-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:dffec1bbad5b82e0c533c1a1e03c942eeec4e6aad0c09be203c4a17a9159cce4
  • kernel-debug-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:b99df4d61fc4b6ee507ed056f40146cba90f0ce08c437ad74bb713f818e8127f
  • kernel-devel-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:1577f41a209bf477529e78ffa559ca8ac2c3e19e31d62273504f6cbb52f5ef75
  • kernel-headers-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:c1339c9ea96454033bbcc0d6c9e63cb638824bea70b4b927aa592565dce312c3
  • kernel-ipaclones-internal-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:dedd05b3250f575ba97d758f7a1ecbfe1bd3c6082a3b50d76edf1b7a1281f0bf
  • kernel-modules-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:e68a6e704f79c3034c234fc2465d6132f171aef224b9dde70d324549ba804140
  • kernel-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:25ec7008b008b9dcf76d8874993ff443c68d1eb9b8992bde72ef1bf399ffcd6a
  • kernel-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:3627572d716e145f3704b4f72d706026abd38b1cc99589fedf301deb64528034
  • kernel-selftests-internal-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:cebcd99767df683401c0e309710c417c837bf29890eea7a6817bfaeac7b551c2
  • kernel-tools-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:15e254f37535417e133dc2091ac490b49ac94cdc0d548881cb1d82fddb1c5f41
  • kernel-tools-libs-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:49d6f78b84bf5b1a4f99160aeb090b7d36a61b68271adec906c28add57ccc9d3
  • kernel-tools-libs-devel-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:af20ff6fa90c7ef0c961b0e41973c9237aa8c879a5042a899b320bd485b89931
  • perf-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:a465d1f1ef8b3ac072fcbb2ad7b18dde05163e4f6435cb40d486a5b2d56334e0
  • python3-perf-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
    sha:36bfcc5e79d9c2f529f22d0afa5a695a707963c4052d5ea8850a61b309ae000d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.