[CLSA-2024:1731431756] kernel: Fix of 30 CVEs
Type:
security
Severity:
Critical
Release date:
2024-11-12 17:16:01 UTC
Description:
- tty: n_gsm: Fix use-after-free in gsm_cleanup_mux {CVE-2024-50073} - drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer {CVE-2024-49991} - ext4: fix timer use-after-free on failed mount {CVE-2024-49960} - ext4: avoid use-after-free in ext4_ext_show_leaf() {CVE-2024-49889} - ext4: fix slab-use-after-free in ext4_split_extent_at() {CVE-2024-49884} - mm: call the security_mmap_file() LSM hook in remap_file_pages() {CVE-2024-47745} - ext4: avoid OOB when system.data xattr changes underneath the filesystem {CVE-2024-47701} - drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX {CVE-2024-46871} - Bluetooth: L2CAP: Fix uaf in l2cap_connect {CVE-2024-49950} - Bluetooth: l2cap: Don't double set the HCI_CONN_MGMT_CONNECTED bit {CVE-2024-49950} - driver core: bus: Fix double free in driver API bus_register() {CVE-2024-50055} - padata: Fix possible divide-by-0 panic in padata_mt_helper() {CVE-2024-43889} - wifi: ath11k: fix array out-of-bound access in SoC stats {CVE-2024-49930} - net: tun: Fix use-after-free in tun_detach() {CVE-2022-49014} - ppp: fix ppp_async_encode() illegal access {CVE-2024-50035} - drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error {CVE-2024-47698} - hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails {CVE-2022-49029} - tipc: guard against string buffer overrun {CVE-2024-49995} - ext4: fix double brelse() the buffer of the extents path {CVE-2024-49882} - ACPI: sysfs: validate return type of _STR method {CVE-2024-49860} - ext4: aovid use-after-free in ext4_ext_insert_extent() {CVE-2024-49883} - drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error {CVE-2024-47697} - slip: make slhc_remember() more robust against malicious packets {CVE-2024-50033} - net: delete "register" keyword {CVE-2024-50033} - drm/amd/display: fix double free issue during amdgpu module unload {CVE-2024-49989} - drm/amd/display: Fix index out of bounds in degamma hardware format translation {CVE-2024-49894} - drm/amd/display: Fix index out of bounds in DCN30 color transformation {CVE-2024-49969} - drm/i915/gt: Fix potential UAF by revoke of fence registers {CVE-2024-41092} - drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation {CVE-2024-49895} - ext4: no need to continue when the number of entries is 1 {CVE-2024-49967} - netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() {CVE-2024-47685} - net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change {CVE-2021-47624}
Updated packages:
  • bpftool-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:320eefb69681dbfe187e4de3a53317b883a0fb70dae4f1c37214c65d4b3a7189
  • kernel-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:f12a55183d9951dfb3dde6ecc87f21face37288263ee947f77da0ad67a1a97e0
  • kernel-core-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:68a626c04213de30d24adbcecea4810d65866e23fc1a8485f2764e17117ad8b7
  • kernel-cross-headers-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:c80b342cb233540f3cd811885bc8cb3a9684733004b8311c3e29fd4e1b32d804
  • kernel-debug-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:b96061bc04abe770839b51c8b7cd3d588e7d48123e09f1e876ec8e01bc841964
  • kernel-debug-core-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:861ed006eaa6b6781ebfb45d4e6227ac20017d20b453f5d72642b7373af1ae2f
  • kernel-debug-devel-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:255871acfad7a5da376ee56fbbd34afedc83dcb58ddc57a0461d020af9e6bb5f
  • kernel-debug-modules-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:26e817943adc26e4c04f548531c7c28921835066142c1269b5228148ef09f881
  • kernel-debug-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:1b1d6050f7af86491b99e9abcd8fb706531d39df3bf41812aca863da9b9a4353
  • kernel-debug-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:edd97bddeedffd379714841d25a63deef2f4606ec437b2dbeeb6a06d4880bb61
  • kernel-devel-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:50ebec9f5bbdc85eaae9ee3ab26dd498742cd1a49929e637f0421a48a5db210f
  • kernel-headers-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:07dec98fb82df54347c89653725d11d81199208d8237d96f0d810e6f2b779adc
  • kernel-ipaclones-internal-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:90b780b985bab6ec96d1e6fe6bf39d1fb2dd3dff543c1be36a8f88c5eaeebc1b
  • kernel-modules-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:f85dfbab6a4b1998b91d76c3496f4caa5bcea361414236e3fe3030c25476b17f
  • kernel-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:09557769de9e57d6db2eeb0c5c8a08c3c60e73fe89f3b4a95019380c310ae103
  • kernel-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:dd25bad18a0b5132ebfb0ce8fbde3abd1fb7a3a669913a29e22400b8a8af8b2c
  • kernel-selftests-internal-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:95a7738040f4147cd46fded9b73d82e839f1a6f1965a82a4b919136f204eff9a
  • kernel-tools-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:25867d656ff71fcd38dd97dab76a43b1d142e286334755f7a6d5484eb63d6bb0
  • kernel-tools-libs-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:3694a7875a25902e5fdfda97da77cd1bb30d6473dc7f73389cf1ea5941fbc18c
  • kernel-tools-libs-devel-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:1efc3026c80a0de151b4c572fab5f11407b8e2655352889ef47ea42b881f2a97
  • perf-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:852f4647b596c76280728d2a942bc0e0918958e6231f43454e447ca15fb7c9f7
  • python3-perf-4.18.0-553.6.1.el8_10.tuxcare.els5.x86_64.rpm
    sha:98b7a2cbb7e421470ffabd34bd2fc7c178175f0f9bd01693419bc022879aac80
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.