[CLSA-2024:1707478061] kernel: Fix of 11 CVEs
Type:
security
Severity:
Important
Release date:
2024-02-09 11:29:52 UTC
Description:
- netfilter: nf_tables: reject QUEUE/DROP verdict parameters {CVE-2024-1086} - RDMA/core: Refactor rdma_bind_addr {CVE-2023-2176} - RDMA/cma: Do not change route.addr.src_addr outside state checks - RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests - drm/amdgpu: Fix potential fence use-after-free v2 {CVE-2023-51042} - drm/atomic: Fix potential use-after-free in nonblocking commits {CVE-2023-51043} - ext4: improve error recovery code paths in __ext4_remount() {CVE-2024-0775} - net: tls, update curr on splice as well {CVE-2024-0646} - writeback: avoid use-after-free after removing device {CVE-2024-0562} - smb: client: fix OOB in receive_encrypted_standard() {CVE-2024-0565} - netfilter: nf_tables: Reject tables of unsupported family {CVE-2023-6040} - ida: Fix crash in ida_free when the bitmap is empty {CVE-2023-6915} - atm: Fix Use-After-Free in do_vcc_ioctl {CVE-2023-51780}
Updated packages:
  • bpftool-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:f5b729a4d6df5ef9172a078c9c2651ea3f111737
  • kernel-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:163ec8371c55472cb9e5df4315a7a8011a0169a8
  • kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:046f8c199a866c9294d2dea1d41f1b20614741e7
  • kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:34d7768e7430f0dc962813aa6b43f4b54362142c
  • kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:b17540475e7383856d4c9f00de10f9333f5df95c
  • kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:0bd0efbaf27be3582689ba3a931dbe3a8d93172f
  • kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:6426aae763b3282406e7e9c7fdeed6d53942fa22
  • kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:96fcd4ac3c093ad1c97f9bfd840bc363c014f5be
  • kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:db93e7463c13cf981966b2849507b37cd2358376
  • kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:a1a208ca50df1660f86ee8d93450c807a63836a0
  • kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:ffe989f104506b1f0937fd1f2ed62d4ad31f5c5e
  • kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:4ef54ddef16a0627c53b9e0085ae802c764a3ab5
  • kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:d9e3df63a524bf8e187a2745b4f4072da2709f73
  • kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:e967f877e67a0a9c5cab1a22fa15eacbff1cc18e
  • kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:e884ed1a8d223e0237e5dc90194cb5bf21c087ac
  • kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:0a342c9e7d88a55a921efb75e4419ea29d78f20f
  • kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:bf893c95de09ab73352ace287fcac0e4d65c7c9c
  • kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:9e98d2ecb110a954d26c73008ee443f3d3e290d3
  • kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:275d2d8560d3e0990af7ed778b4df409784e4e74
  • kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:1baad2ca69f932625ffde41d7822b60fd0d80f27
  • perf-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:02b1d6d95fb59c864b6a218679f30f44966211aa
  • python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els14.x86_64.rpm
    sha:befd9f881f644b0d00ae02ac6c8ac37ae495674e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.