[CLSA-2024:1705494430] kernel: Fix of 13 CVEs
Type:
security
Severity:
Important
Release date:
2024-01-17
Description:
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283} - ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932} - smb: client: fix OOB in smbCalcSize() {CVE-2023-6606} - net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623} - net/sched: cls_fw: Fix improper refcount update leads to use-after-free {CVE-2023-3776} - vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567} - relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268} - btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() {CVE-2023-3111} - xirc2ps_cs: Fix use after free bug in xirc2ps_detach {CVE-2023-1670} - Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934} - Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM {CVE-2022-42896} - tcp: Fix data races around icsk->icsk_af_ops. {CVE-2022-3566} - ipv6: use prandom_u32() for ID generation {CVE-2021-45485}
Updated packages:
  • kernel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:7a15d54de0d1296164241b93bc1822a6d934ff55
  • kernel-debug-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:0b22e2c10b02edbed22033f8e151e0f424f78e35
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els14.i686.rpm
    sha:d7c4dfa56b88c906cf00bc34a4132394df709c31
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:61fee98197256eeb813b6c30e935d7b901345a58
  • kernel-devel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:ce48c45d022eab72074d8ff5ccee1961b7bcf967
  • kernel-headers-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:0de334aa92698da5bcbfc96d119f9034d3661b76
  • perf-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:aafd97873063abe206c1a8f02a7d5a2271986aa4
  • python-perf-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:5f0e40a0990f3005cbd3f0b1630e893c197e718d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.