[CLSA-2024:1729874131] kernel: Fix of 43 CVEs
Type:
security
Severity:
Important
Release date:
2024-10-25 17:03:00 UTC
Description:
- drm/amdgpu: Validate TA binary size {CVE-2024-44977} - drm/amd/display: Avoid overflow from uint32_t to uint8_t {CVE-2024-47661} - scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info {CVE-2024-46842} - ALSA: line6: Fix racy access to midibuf {CVE-2024-44954} - exec: Fix ToCToU between perm check and set-uid/gid usage {CVE-2024-43882} - drm/amd/display: Check link_index before accessing dc->links[] {CVE-2024-46813} - drm/amdgpu/mes: fix mes ring buffer overflow {CVE-2024-46700} - RDMA/iwcm: Fix a use-after-free related to destroying CM IDs {CVE-2024-42285} - scsi: aacraid: Fix double-free on probe failure {CVE-2024-46673} - ipv6: prevent UAF in ip6_send_skb() {CVE-2024-44987} - drm/amdgpu: fix mc_data out-of-bounds read warning {CVE-2024-46722} - ftrace: Fix possible use-after-free issue in ftrace_location() {CVE-2024-38588} - ftrace: Fix possible warning on checking all pages used in ftrace_process_locs() {CVE-2024-38588} - ftrace: Store the order of pages allocated in ftrace_page {CVE-2024-38588} - ftrace: Check if pages were allocated before calling free_pages() {CVE-2024-38588} - x86/ibt,ftrace: Search for __fentry__ location {CVE-2024-38588} - drm/amdgpu: fix ucode out-of-bounds read warning {CVE-2024-46723} - VMCI: Fix use-after-free when removing resource in vmci_resource_remove() {CVE-2024-46738} - sch/netem: fix use after free in netem_dequeue {CVE-2024-46800} - drm/amdgpu: Fix out-of-bounds write warning {CVE-2024-46725} - drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number {CVE-2024-46724} - Squashfs: sanity check symbolic link size {CVE-2024-46744} - drm/amd/pm: Fix negative array index read {CVE-2024-46821} - drm/amd/display: Check gpio_id before used as array index {CVE-2024-46818} - KVM: x86: do not set st->preempted when going back to user space {CVE-2022-39189} - net: Return errno in sk->sk_prot->get_port(). {CVE-2023-0461} - drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box {CVE-2024-46811} - ext4: do not create EA inode under buffer lock {CVE-2024-40972} - ext4: fold quota accounting into ext4_xattr_inode_lookup_create() {CVE-2024-40972} - ext4: check the return value of ext4_xattr_inode_dec_ref() {CVE-2024-40972} - ext4: remove duplicate definition of ext4_xattr_ibody_inline_set() {CVE-2024-40972} - nvme: avoid double free special payload {CVE-2024-41073} - drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL {CVE-2023-52817} - wifi: mac80211: Avoid address calculations via out of bounds array indexing {CVE-2024-41071} - mISDN: Fix a use after free in hfcmulti_tx() {CVE-2024-42280} - tipc: Return non-zero value from tipc_udp_addr2str() on error {CVE-2024-42284} - dev/parport: fix the array out-of-bounds risk {CVE-2024-42301} - parport: Standardize use of printmode {CVE-2024-42301} - parport: Convert printk(KERN_ to pr_ {CVE-2024-42301} - parport: parport_pc: Mark expected switch fall-through {CVE-2024-42301} - protect the fetch of ->fd[fd] in do_dup2() from mispredictions {CVE-2024-42265} - leds: trigger: Unregister sysfs attributes before calling deactivate() {CVE-2024-43830} - hwmon: (lm95234) Fix underflows seen when writing limit attributes {CVE-2024-46758} - HID: amd_sfh: free driver_data after destroying hid device {CVE-2024-46746} - hwmon: (adc128d818) Fix underflows seen when writing limit attributes {CVE-2024-46759} - hwmon: (w83627ehf) Fix underflows seen when writing limit attributes {CVE-2024-46756} - netns: Make get_net_ns() handle zero refcount net {CVE-2024-40958} - net: make get_net_ns return error if NET_NS is disabled {CVE-2024-40958} - mm, slub: fix potential memoryleak in kmem_cache_open() {CVE-2021-47466} - slub: don't panic for memcg kmem cache creation failure {CVE-2021-47466} - tunnels: fix out of bounds access when building IPv6 PMTU error {CVE-2024-26665} - xfs: don't walk off the end of a directory data block {CVE-2024-42084} - firmware: cs_dsp: Fix overflow checking of wmfw header {CVE-2024-41039} - hwmon: (nct6775-core) Fix underflows seen when writing limit attributes {CVE-2024-46757} - drm/amd/pm: fix the Out-of-bounds read warning {CVE-2024-46731}
Updated packages:
  • bpftool-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:44237e222cb46fbc0070126eb6c90b59cb7d3dd3cf82d7df5fd1ec2f2ac57cf8
  • kernel-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:f996220cbbb4006c08532d6a961a9f49f0628f1b36c72ae06aa637690694f2ea
  • kernel-core-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:f2e12d29ef7224e5455502a54cf86ab3fcf634a770687c2b6147614a4f128842
  • kernel-cross-headers-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:43d535879aa5268217a82ddecbf7ea85a0a308554dd4cad17ad1696ed6f7c03b
  • kernel-debug-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:f45839f491d7829a8abcf3e083a591c8dac7e9bc025362e56fc661176dbd1809
  • kernel-debug-core-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:ca151ef6eb14caf467bc9adc5d436b265defd747e9834ee7045f4fac89ae7339
  • kernel-debug-devel-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:18fdadb6ab12510f6fb351f261cfce7fc93a7445e112b4c405e970f9a171804f
  • kernel-debug-modules-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:1fdef56a268b1b35fe55da333584b46f691249828627f964d08007f0bb730b7f
  • kernel-debug-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:e2387d50edcad220a22cd24725b7e3811d102cf633b3c468569ea5ec2e701f76
  • kernel-debug-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:b566aa94394b4f5b6c0323e18ef013e22a67cb872eefa814b5766e3c50040cee
  • kernel-devel-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:ad47c2e49cf0992eba3b75822e73291231e747aea7ae2dc76c460cb06cc0446d
  • kernel-headers-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:e58f6fbf8d60b9b052439668d55cba7ac3efa97f35d314cd83adcecd693505d5
  • kernel-ipaclones-internal-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:f5b8b71e0b44e5ccdf8a682f79f6d7e65a10e37b08ae6f874feeaa033274db3d
  • kernel-modules-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:24d55a28cf2160137b018e566a17ea5a288f5018a50510392eaf57720aba79ae
  • kernel-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:acf74c9fecebf3d70f240db149c81884b56ad374cde8ad7676b14709b297bedf
  • kernel-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:4bd80678471048040de8ad31aaf43f082e6838d9eb88aae94bcabdb918ea4c9a
  • kernel-selftests-internal-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:12fa8239a425b3a99c3fd5c16e1828036b40588601ab90a5581e65c67ef32822
  • kernel-tools-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:ff9c58dc687ead8c99a92f3a07450cbe898a44417759035d9db81da883064f03
  • kernel-tools-libs-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:0c0fd7ee7e223157c910e2f37fcf69b44969a9bbec7d3485c8e379a1144fba25
  • kernel-tools-libs-devel-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:ef009b12e1514ff761b80401d0581cce957b7fdf443cf065e29a19c5367a0c9a
  • perf-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:d3565d41f74dde94d997b0e51c860fe8e0c1ad798ce5f290e41b84503170f9a9
  • python3-perf-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
    sha:aaeac0d8b2a2b69278518d1323c5861e46081f92ebd13fd63537d76947729d51
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.