[CLSA-2024:1724693366] kernel: Fix of 15 CVEs
Type:
security
Severity:
Important
Release date:
2024-08-26 17:29:30 UTC
Description:
- net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() {CVE-2024-26855} - tty: Fix out-of-bound vmalloc access in imageblit {CVE-2021-47383} - drm/vmwgfx: Fix invalid reads in fence signaled events {CVE-2024-36960} - Revert: GFS2: Skip dlm_unlock calls during unmount {CVE-2024-38570} - Revert: GFS2: ignore unlock failures after withdraw {CVE-2024-38570} - Revert: GFS2: fix skip unlock condition {CVE-2024-38570} - ima: Fix use-after-free on a dentry's dname.name {CVE-2024-39494} - netfilter: nft_limit: reject configurations that cause integer overflow {CVE-2024-26668} - ipv6: remove max_size check inline with ipv4 {CVE-2023-52340} - USB: core: Fix deadlock in usb_deauthorize_interface() {CVE-2024-26934} - net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() {CVE-2024-26882} - ip: validate header length on virtual device xmit - ext4: improve error recovery code paths in __ext4_remount() {CVE-2024-0775} - drivers/amd/pm: fix a use-after-free in kv_parse_power_table {CVE-2023-52469} - drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc {CVE-2024-42228} - netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() {CVE-2024-27020} - af_unix: Fix garbage collector racing against connect() {CVE-2024-26923} - md/raid5: fix atomicity violation in raid5_cache_count {CVE-2024-23307}
Updated packages:
  • bpftool-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm
    sha:f5788de6b933519739beaf9dd076b85cbd486b1cad4dd223e01f76737a5b6f55
  • kernel-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm
    sha:8b6485df872df90f48b535531a12df5c9adef720c226880a58fd7eff68c25fc2
  • kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm
    sha:712f1ae44e958ac03e1c1b44e392d76054ff951760cd34619bf838656bdaba8e
  • kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm
    sha:befb295526a8acdb47f1d26b33ac6ce0dc21f3d5411791b845ca211cee3188c3
  • kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm
    sha:ee3ead168211e5ab1d83f8ae590ba9be52e651955d02ce26dc08630df59d42b1
  • kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm
    sha:c4a1c3392c8a0875868a7798153f8b6c17c54945954509c9e5c5e04d13d79699
  • kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm
    sha:7258aa97ff778ae1af2211e87e177e787e8027585d8ce039374438044d63863b
  • kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm
    sha:30512e28c7c5b65a3bc8f9ab14bd4b260805c6c06ab6abb6e9f580863927d147
  • kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm
    sha:5dca7f0bd25b6fb88f63cfdde5243ba04c2436c97a4a72b43c5500d1b5a44763
  • perf-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm
    sha:8b3e9a8a2ed9621456ba4b3b71f299650f4d69ba2b3c90977cc857a87bec02e6
  • python-perf-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm
    sha:a2359c448f8e5b23988c4afe9ed3c6353d187aad3ff60a56478b36de6783e18a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.