Release date:
2024-09-09 09:35:46 UTC
Description:
- gfs2: Fix potential glock use-after-free on unmount {CVE-2024-38570}
- gfs2: Remove ill-placed consistency check {CVE-2024-38570}
- gfs2: introduce new gfs2_glock_assert_withdraw {CVE-2024-38570}
- gfs2: simplify gdlm_put_lock with out_free label {CVE-2024-38570}
- wifi: mt76: replace skb_put with skb_put_zero {CVE-2024-42225}
- bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD {CVE-2024-42161}
- drm/amdgpu/mes: fix use-after-free issue {CVE-2024-38581}
- drm/amd/display: Fix potential index out of bounds in color transformation function {CVE-2024-38552}
- net: bridge: mst: fix suspicious rcu usage in br_mst_set_state {CVE-2024-36979}
- net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state {CVE-2024-36979}
- net: bridge: mst: fix vlan use-after-free {CVE-2024-36979}
- netfilter: nft_limit: reject configurations that cause integer overflow {CVE-2024-26668}
- ima: Fix use-after-free on a dentry's dname.name {CVE-2024-39494}
- ima: define ima_max_digest_data struct without a flexible array variable
- ima: detect changes to the backing overlay file
- drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc {CVE-2024-42228}
- dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list {CVE-2024-40956}
- drm/amdgpu: add error handle to avoid out-of-bounds {CVE-2024-39471}
- net/sched: flower: Fix chain template offload {CVE-2024-26669}
- userfaultfd: fix a race between writeprotect and exit_mmap() {CVE-2021-47461}
- scsi: mpi3mr: Sanitise num_phys {CVE-2024-42159}
- ata: libata-core: Fix double free on error {CVE-2024-41087}
- net/mlx5: Discard command completions in internal error {CVE-2024-38555}
- net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538}
- net: sched: sch_multiq: fix possible OOB write in multiq_tune() {CVE-2024-36978}
- drm/vmwgfx: Fix invalid reads in fence signaled events {CVE-2024-36960}
- tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). {CVE-2024-36904}
- tipc: fix UAF in error path {CVE-2024-36886}
- net: fix out-of-bounds access in ops_init {CVE-2024-36883}
- tap: add missing verification for short frame {CVE-2024-41090}
- tun: add missing verification for short frame {CVE-2024-41091}
- netfilter: nf_tables: use timestamp to check for set element timeout {CVE-2024-27397}
- netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path {CVE-2024-26925}
- netfilter: nf_tables: release batch on table validation from abort path {CVE-2024-26925}
- netfilter: nf_tables: discard table flag update with pending basechain deletion {CVE-2024-26925}
- netfilter: nf_tables: reject table flag and netdev basechain updates {CVE-2024-26925}
- af_unix: Fix garbage collector racing against connect() {CVE-2024-26923}
- net/ipv6: avoid possible UAF in ip6_route_mpath_notify() {CVE-2024-26852}
- sched/psi: Fix use-after-free in ep_remove_wait_queue() {CVE-2023-52707}
- wait: add wake_up_pollfree() {CVE-2023-52707}
- tcp_metrics: validate source addr length {CVE-2024-42154}
Updated packages:
-
bpftool-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:03a35b2c3e30f74cb3712f38fb16bb6392abb108cf86034bcb8df29082a6f23f
-
kernel-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:a406f22a79df1d7d06b150c7ba38488492c4b19deca076b339dcd3c68aa9ab8f
-
kernel-core-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:19a874ccb9419343f2aa5c37391108d0bcc465b2606e618d7be4770795eb3330
-
kernel-cross-headers-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:3a8c756083cc7224c942284d34b934edc30e8e2d9b089fe3ef126a43e1ab216f
-
kernel-debug-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:b19a84386a6943b2788bebab368ce8036231c88c1608bb52d963bff078ee4643
-
kernel-debug-core-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:f713bd15f4d3b1f416d3b5d2019d8d4f4b469520af8a5f7919f01674cfdb7535
-
kernel-debug-devel-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:7debdd7dcb3bda079e9aad0e144868207d4a1ee4c67cb132648ee8fd2b7099c3
-
kernel-debug-modules-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:12604f91d29c3583af0ce9c264d993fee8ca92a0ebcc673536e493c6872d396d
-
kernel-debug-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:dffec1bbad5b82e0c533c1a1e03c942eeec4e6aad0c09be203c4a17a9159cce4
-
kernel-debug-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:b99df4d61fc4b6ee507ed056f40146cba90f0ce08c437ad74bb713f818e8127f
-
kernel-devel-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:1577f41a209bf477529e78ffa559ca8ac2c3e19e31d62273504f6cbb52f5ef75
-
kernel-headers-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:c1339c9ea96454033bbcc0d6c9e63cb638824bea70b4b927aa592565dce312c3
-
kernel-ipaclones-internal-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:dedd05b3250f575ba97d758f7a1ecbfe1bd3c6082a3b50d76edf1b7a1281f0bf
-
kernel-modules-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:e68a6e704f79c3034c234fc2465d6132f171aef224b9dde70d324549ba804140
-
kernel-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:25ec7008b008b9dcf76d8874993ff443c68d1eb9b8992bde72ef1bf399ffcd6a
-
kernel-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:3627572d716e145f3704b4f72d706026abd38b1cc99589fedf301deb64528034
-
kernel-selftests-internal-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:cebcd99767df683401c0e309710c417c837bf29890eea7a6817bfaeac7b551c2
-
kernel-tools-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:15e254f37535417e133dc2091ac490b49ac94cdc0d548881cb1d82fddb1c5f41
-
kernel-tools-libs-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:49d6f78b84bf5b1a4f99160aeb090b7d36a61b68271adec906c28add57ccc9d3
-
kernel-tools-libs-devel-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:af20ff6fa90c7ef0c961b0e41973c9237aa8c879a5042a899b320bd485b89931
-
perf-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:a465d1f1ef8b3ac072fcbb2ad7b18dde05163e4f6435cb40d486a5b2d56334e0
-
python3-perf-4.18.0-553.6.1.el8_10.tuxcare.els2.x86_64.rpm
sha:36bfcc5e79d9c2f529f22d0afa5a695a707963c4052d5ea8850a61b309ae000d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.