[CLSA-2024:1725882897] kernel: Fix of 4 CVEs
Type:
security
Severity:
Important
Release date:
2024-09-09 11:55:01 UTC
Description:
- media: dvb-core: Fix use-after-free due on race condition at dvb_net {CVE-2022-45886} - media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 {CVE-2022-45919} - bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() {CVE-2024-39487} - net: fix __dst_negative_advice() race {CVE-2024-36971}
Updated packages:
  • bpftool-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm
    sha:e9bb01ba9418370734f98d1e613eedec9f6b696bec2336c1491fead7bfccd5e5
  • kernel-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm
    sha:ae8ee1b6b4c54ba86778097e7bea0dc801ee85dd2122d6863f201aad05a79fe6
  • kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm
    sha:cff165a3237b06d31735cc5bd6006e920e01a3290f5147e279d1897e293aed44
  • kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm
    sha:71c1d4bfc46da248be31c3e3e5fb47d8b67f2db4149d0a2d0d9acb2c4b55d8b7
  • kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm
    sha:9352ac9acd91131641a734acbed4fe2a6f8f2aadf8c6be5efc2b80eb8c21a7ec
  • kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm
    sha:7ba1a12fcd72fcc4a9909bbef13ebecadf4fbb77db204bd4939f35004abe9f8c
  • kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm
    sha:a66a9860e7abcad4cb6ac8a4cc0212d4b90c8371b1b2b56b9d782550eb4cef0c
  • kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm
    sha:ae3daec61dc3b151e222a78bea326ab0c54ef961bc87c7aa4fc695c52e0b9e18
  • kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm
    sha:5b5e2d732f5712e633af5dbcccc5ff614bf0b0dae88b4cb07473fcd6fa9653c8
  • perf-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm
    sha:1d6a0704db8d8a7db91d432b5a4ec532f3f57cf1e51da8376ec387b746fa1e5d
  • python-perf-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm
    sha:d18068da76bf525f87c24645f6fdddcd3a8e24d6b189da2958ed5ef20f5ccf4b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.