[CLSA-2024:1726651745] kernel: Fix of 4 CVEs
Type:
security
Severity:
Important
Release date:
2024-09-18 09:29:08 UTC
Description:
- drm/vmwgfx: Validate the box size for the snooped cursor {CVE-2022-36280} - USB: ene_usb6250: Allocate enough memory for full object {CVE-2023-45862} - Bluetooth: L2CAP: Fix attempting to access uninitialized memory {CVE-2022-42895} - stm class: Fix a double free in stm_register_device() {CVE-2024-38627}
Updated packages:
  • bpftool-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm
    sha:5a704460e51250eed4c9cb125466f628e54566e8cf1948eeb6e16e2b1097f011
  • kernel-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm
    sha:df8b18201545f4c20232a3f0f2087f59392818cc9436704ed843c40b31a9f4e9
  • kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm
    sha:944d415e1a02d55fe3d81256680012875e1c4814eeeb123e5e62916994092604
  • kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm
    sha:20fc73a0c82a4e98d8ca79876680abaeb38f4ceaf13cec4e6039728819ac0420
  • kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm
    sha:271828abf3017914fb573863e28b52c3dbbf7ec09df5163dc7c0ad088776351b
  • kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm
    sha:2f75bd903e9b1404ee7d437799ee9d4a795e83f6cccd427f27487b4ad247c629
  • kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm
    sha:c02d70bc10d0ae1700513873f5c12a0dad621a27320afada1f14b746a61698ba
  • kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm
    sha:c3a6cf753d929ff41205e8e34412737ea56a6f251339d2a9bd09fdb17e1fdb72
  • kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm
    sha:86a6f5b3edc1dc132d2c78b179385feeed551921b0dc6221e14443249d5f0516
  • perf-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm
    sha:705bef00253a1f2660ff758d9586f9b27b775add9f0b6c0e72233b0be7633bcf
  • python-perf-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm
    sha:9d5004e29effa928f3a714957752c46c38e5ea0cafbdf9dfa33ba15552be8385
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.