Release date:
2024-10-25 17:03:00 UTC
Description:
- drm/amdgpu: Validate TA binary size {CVE-2024-44977}
- drm/amd/display: Avoid overflow from uint32_t to uint8_t {CVE-2024-47661}
- scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info {CVE-2024-46842}
- ALSA: line6: Fix racy access to midibuf {CVE-2024-44954}
- exec: Fix ToCToU between perm check and set-uid/gid usage {CVE-2024-43882}
- drm/amd/display: Check link_index before accessing dc->links[] {CVE-2024-46813}
- drm/amdgpu/mes: fix mes ring buffer overflow {CVE-2024-46700}
- RDMA/iwcm: Fix a use-after-free related to destroying CM IDs {CVE-2024-42285}
- scsi: aacraid: Fix double-free on probe failure {CVE-2024-46673}
- ipv6: prevent UAF in ip6_send_skb() {CVE-2024-44987}
- drm/amdgpu: fix mc_data out-of-bounds read warning {CVE-2024-46722}
- ftrace: Fix possible use-after-free issue in ftrace_location() {CVE-2024-38588}
- ftrace: Fix possible warning on checking all pages used in ftrace_process_locs() {CVE-2024-38588}
- ftrace: Store the order of pages allocated in ftrace_page {CVE-2024-38588}
- ftrace: Check if pages were allocated before calling free_pages() {CVE-2024-38588}
- x86/ibt,ftrace: Search for __fentry__ location {CVE-2024-38588}
- drm/amdgpu: fix ucode out-of-bounds read warning {CVE-2024-46723}
- VMCI: Fix use-after-free when removing resource in vmci_resource_remove() {CVE-2024-46738}
- sch/netem: fix use after free in netem_dequeue {CVE-2024-46800}
- drm/amdgpu: Fix out-of-bounds write warning {CVE-2024-46725}
- drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number {CVE-2024-46724}
- Squashfs: sanity check symbolic link size {CVE-2024-46744}
- drm/amd/pm: Fix negative array index read {CVE-2024-46821}
- drm/amd/display: Check gpio_id before used as array index {CVE-2024-46818}
- KVM: x86: do not set st->preempted when going back to user space {CVE-2022-39189}
- net: Return errno in sk->sk_prot->get_port(). {CVE-2023-0461}
- drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box {CVE-2024-46811}
- ext4: do not create EA inode under buffer lock {CVE-2024-40972}
- ext4: fold quota accounting into ext4_xattr_inode_lookup_create() {CVE-2024-40972}
- ext4: check the return value of ext4_xattr_inode_dec_ref() {CVE-2024-40972}
- ext4: remove duplicate definition of ext4_xattr_ibody_inline_set() {CVE-2024-40972}
- nvme: avoid double free special payload {CVE-2024-41073}
- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL {CVE-2023-52817}
- wifi: mac80211: Avoid address calculations via out of bounds array indexing {CVE-2024-41071}
- mISDN: Fix a use after free in hfcmulti_tx() {CVE-2024-42280}
- tipc: Return non-zero value from tipc_udp_addr2str() on error {CVE-2024-42284}
- dev/parport: fix the array out-of-bounds risk {CVE-2024-42301}
- parport: Standardize use of printmode {CVE-2024-42301}
- parport: Convert printk(KERN_ to pr_ {CVE-2024-42301}
- parport: parport_pc: Mark expected switch fall-through {CVE-2024-42301}
- protect the fetch of ->fd[fd] in do_dup2() from mispredictions {CVE-2024-42265}
- leds: trigger: Unregister sysfs attributes before calling deactivate() {CVE-2024-43830}
- hwmon: (lm95234) Fix underflows seen when writing limit attributes {CVE-2024-46758}
- HID: amd_sfh: free driver_data after destroying hid device {CVE-2024-46746}
- hwmon: (adc128d818) Fix underflows seen when writing limit attributes {CVE-2024-46759}
- hwmon: (w83627ehf) Fix underflows seen when writing limit attributes {CVE-2024-46756}
- netns: Make get_net_ns() handle zero refcount net {CVE-2024-40958}
- net: make get_net_ns return error if NET_NS is disabled {CVE-2024-40958}
- mm, slub: fix potential memoryleak in kmem_cache_open() {CVE-2021-47466}
- slub: don't panic for memcg kmem cache creation failure {CVE-2021-47466}
- tunnels: fix out of bounds access when building IPv6 PMTU error {CVE-2024-26665}
- xfs: don't walk off the end of a directory data block {CVE-2024-42084}
- firmware: cs_dsp: Fix overflow checking of wmfw header {CVE-2024-41039}
- hwmon: (nct6775-core) Fix underflows seen when writing limit attributes {CVE-2024-46757}
- drm/amd/pm: fix the Out-of-bounds read warning {CVE-2024-46731}
Updated packages:
-
bpftool-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:44237e222cb46fbc0070126eb6c90b59cb7d3dd3cf82d7df5fd1ec2f2ac57cf8
-
kernel-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:f996220cbbb4006c08532d6a961a9f49f0628f1b36c72ae06aa637690694f2ea
-
kernel-core-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:f2e12d29ef7224e5455502a54cf86ab3fcf634a770687c2b6147614a4f128842
-
kernel-cross-headers-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:43d535879aa5268217a82ddecbf7ea85a0a308554dd4cad17ad1696ed6f7c03b
-
kernel-debug-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:f45839f491d7829a8abcf3e083a591c8dac7e9bc025362e56fc661176dbd1809
-
kernel-debug-core-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:ca151ef6eb14caf467bc9adc5d436b265defd747e9834ee7045f4fac89ae7339
-
kernel-debug-devel-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:18fdadb6ab12510f6fb351f261cfce7fc93a7445e112b4c405e970f9a171804f
-
kernel-debug-modules-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:1fdef56a268b1b35fe55da333584b46f691249828627f964d08007f0bb730b7f
-
kernel-debug-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:e2387d50edcad220a22cd24725b7e3811d102cf633b3c468569ea5ec2e701f76
-
kernel-debug-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:b566aa94394b4f5b6c0323e18ef013e22a67cb872eefa814b5766e3c50040cee
-
kernel-devel-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:ad47c2e49cf0992eba3b75822e73291231e747aea7ae2dc76c460cb06cc0446d
-
kernel-headers-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:e58f6fbf8d60b9b052439668d55cba7ac3efa97f35d314cd83adcecd693505d5
-
kernel-ipaclones-internal-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:f5b8b71e0b44e5ccdf8a682f79f6d7e65a10e37b08ae6f874feeaa033274db3d
-
kernel-modules-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:24d55a28cf2160137b018e566a17ea5a288f5018a50510392eaf57720aba79ae
-
kernel-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:acf74c9fecebf3d70f240db149c81884b56ad374cde8ad7676b14709b297bedf
-
kernel-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:4bd80678471048040de8ad31aaf43f082e6838d9eb88aae94bcabdb918ea4c9a
-
kernel-selftests-internal-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:12fa8239a425b3a99c3fd5c16e1828036b40588601ab90a5581e65c67ef32822
-
kernel-tools-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:ff9c58dc687ead8c99a92f3a07450cbe898a44417759035d9db81da883064f03
-
kernel-tools-libs-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:0c0fd7ee7e223157c910e2f37fcf69b44969a9bbec7d3485c8e379a1144fba25
-
kernel-tools-libs-devel-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:ef009b12e1514ff761b80401d0581cce957b7fdf443cf065e29a19c5367a0c9a
-
perf-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:d3565d41f74dde94d997b0e51c860fe8e0c1ad798ce5f290e41b84503170f9a9
-
python3-perf-4.18.0-553.6.1.el8_10.tuxcare.els4.x86_64.rpm
sha:aaeac0d8b2a2b69278518d1323c5861e46081f92ebd13fd63537d76947729d51
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.