[CLSA-2024:1727692412] kernel: Fix of 5 CVEs
Type:
security
Severity:
Important
Release date:
2024-09-30 10:33:35 UTC
Description:
- sch/netem: fix use after free in netem_dequeue {CVE-2024-46800} - VMCI: Fix use-after-free when removing resource in vmci_resource_remove() {CVE-2024-46738} - drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number {CVE-2024-46724} - drm/amdgpu: fix ucode out-of-bounds read warning {CVE-2024-46723} - drm/amdgpu: fix mc_data out-of-bounds read warning {CVE-2024-46722}
Updated packages:
  • bpftool-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm
    sha:97df0e85d02dc921e402d7cac7a8225949b5b0a0245bc6126fab143edf7b377e
  • kernel-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm
    sha:35202408c77d7b5e927c35a067fbfea716607e8e8176709feebc4069788daa5a
  • kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm
    sha:6ac9d7ce91df0264b9890dfc4dc0e046bbbb01b69cee4d3582a6659aae60d55d
  • kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm
    sha:38c751776590bd4f6695a86b157b9f9e9540bfd4cdb1ed25fd3eace03c7809d1
  • kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm
    sha:4bee98ef7aa42e117610fc61489b17d99e6d2dc6469030e29a2f92a7b96bec38
  • kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm
    sha:25346b7ba17d9aab0ab1e87fac5c793ad0704acea7f85ea29edee4f84a761d49
  • kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm
    sha:149c1b71327a7596004725dd9682e10d1211091f19ec0b3fb5689f2097bed1bd
  • kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm
    sha:a0afe2252411bd8a2b80d7c8770653502af55bd5e36df784b35b9c65c2e1e682
  • kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm
    sha:ab38a0b23c7c2952d48ae78790012b2b48053c9e7462a9d90cbe238b7da28b99
  • perf-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm
    sha:9f57debf1af47dcb0217a9d473e267b89bd1561f1e800e07b93dbb32e8ac9798
  • python-perf-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm
    sha:9c198c6778caf1c2791521085f5aadeaa403ae3f7ae7213eef64896087838ba4
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.