Release date:
2024-07-02 15:02:32 UTC
Description:
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() {CVE-2024-26882}
- net: Set true network header for ECN decapsulation {CVE-2024-26882}
- media: dvb-core: Fix use-after-free due to race at dvb_register_device() {CVE-2022-45884}
- media: dvbdev: fix error logic at dvb_register_device() {CVE-2022-45884}
- media: dvbdev: Fix memleak in dvb_register_device {CVE-2022-45884}
- media: media/dvb: Use kmemdup rather than duplicating its implementation {CVE-2022-45884}
- media: dvbdev: drop refcount on error path in dvb_device_open() {CVE-2022-45884}
- media: dvbdev: fix refcnt bug {CVE-2022-45884}
- media: dvbdev: adopts refcnt to avoid UAF {CVE-2022-45884}
- netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() {CVE-2024-27020}
- netfilter: nf_tables: __nft_expr_type_get() selects specific family type {CVE-2024-27020}
- scsi: qla2xxx: Fix double free of fcport {CVE-2024-26929}
- of: fdt: fix off-by-one error in unflatten_dt_nodes() {CVE-2022-48672}
- USB: core: Fix deadlock in usb_deauthorize_interface() {CVE-2024-26934}
- smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752}
- netfilter: nf_tables: disallow anonymous set with timeout flag {CVE-2024-26642}
- media: technisat-usb2: break out of loop at end of buffer {CVE-2019-15505}
- Input: gtco - bounds check collection indent level {CVE-2019-13631}
- ext4: fix kernel infoleak via ext4_extent_header {CVE-2022-0850}
- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors {CVE-2020-0404}
- netfilter: nft_set_pipapo: skip inactive elements during set walk {CVE-2023-6817}
- libceph: harden msgr2.1 frame segment length checks {CVE-2023-44466}
- media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() {CVE-2023-31084}
- dm ioctl: fix nested locking in table_clear() to remove deadlock concern {CVE-2023-2269}
- hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition {CVE-2023-1855}
- HID: betop: check shape of output reports {CVE-2023-1073}
- RDMA/core: Don't infoleak GRH fields {CVE-2021-3923}
- HID: betop: fix slab-out-of-bounds Write in betop_probe {CVE-2023-1073}
- HID: check empty report_list in hid_validate_values() {CVE-2023-1073}
- media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() {CVE-2022-45887}
Updated packages:
-
bpftool-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:fe856ddd55789d3d09592c7dfdf85c242b2105c6
-
kernel-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:e00d2567a1c355f882318874ebec126d6ddddde9
-
kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:56022d56b5f8b2967927dd00a1df645729022451
-
kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:081a11b1a1839b762aa0d0e8a36c1370753698c6
-
kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:58ba5fdde072d4f572154d0189cbd2390d03fe6e
-
kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:2752f2abcd0366350323d0b79430d3c7368bcada
-
kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:91c2b9a21a469bb5236a0b4280e3e50c1f8b4a5c
-
kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:d72aa7fc47cafcaa4e11b6245d939a7064debd33
-
kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:dcc759582388a4c1169f78fe28e4783d0fb842ba
-
kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:61faa7bd64c425164b00859838b75bf2104cb2f8
-
kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:971f2af15704d3423ada31d64c7bfc2432de7f6d
-
kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:0a5576f8e431452e8f9c52c7ffdd32eae9529336
-
kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:f4e0f621830817d2ad0588bae3612ba3df6cf8f3
-
kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:21c958f9af3f1580a12ea862df4c4f4cb32ffa65
-
kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:daf58faf6ccc6c559742a2f1ad457b54a4b04bbd
-
kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:8af493269d8e79ac7ebaffccff4122239d76fb5b
-
kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:399d244c95e68ccca5bc8e818eacde0f9662ad3b
-
kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:cdb285b47f84591147fb16ae9979bed7ce6857a0
-
kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:012c3489099f11ab10517b8037f50bcefe6f1b7c
-
kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:630761b1e7546490cd0ba2fb3164756fdd61d422
-
perf-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:652003897906c40319a414581b298adc33cfce7d
-
python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
sha:ef468baa81066059b4710074c5847d8cf2b2044e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.