[CLSA-2024:1719932549] kernel: Fix of 20 CVEs
Type:
security
Severity:
Critical
Release date:
2024-07-02 15:02:32 UTC
Description:
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() {CVE-2024-26882} - net: Set true network header for ECN decapsulation {CVE-2024-26882} - media: dvb-core: Fix use-after-free due to race at dvb_register_device() {CVE-2022-45884} - media: dvbdev: fix error logic at dvb_register_device() {CVE-2022-45884} - media: dvbdev: Fix memleak in dvb_register_device {CVE-2022-45884} - media: media/dvb: Use kmemdup rather than duplicating its implementation {CVE-2022-45884} - media: dvbdev: drop refcount on error path in dvb_device_open() {CVE-2022-45884} - media: dvbdev: fix refcnt bug {CVE-2022-45884} - media: dvbdev: adopts refcnt to avoid UAF {CVE-2022-45884} - netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() {CVE-2024-27020} - netfilter: nf_tables: __nft_expr_type_get() selects specific family type {CVE-2024-27020} - scsi: qla2xxx: Fix double free of fcport {CVE-2024-26929} - of: fdt: fix off-by-one error in unflatten_dt_nodes() {CVE-2022-48672} - USB: core: Fix deadlock in usb_deauthorize_interface() {CVE-2024-26934} - smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752} - netfilter: nf_tables: disallow anonymous set with timeout flag {CVE-2024-26642} - media: technisat-usb2: break out of loop at end of buffer {CVE-2019-15505} - Input: gtco - bounds check collection indent level {CVE-2019-13631} - ext4: fix kernel infoleak via ext4_extent_header {CVE-2022-0850} - media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors {CVE-2020-0404} - netfilter: nft_set_pipapo: skip inactive elements during set walk {CVE-2023-6817} - libceph: harden msgr2.1 frame segment length checks {CVE-2023-44466} - media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() {CVE-2023-31084} - dm ioctl: fix nested locking in table_clear() to remove deadlock concern {CVE-2023-2269} - hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition {CVE-2023-1855} - HID: betop: check shape of output reports {CVE-2023-1073} - RDMA/core: Don't infoleak GRH fields {CVE-2021-3923} - HID: betop: fix slab-out-of-bounds Write in betop_probe {CVE-2023-1073} - HID: check empty report_list in hid_validate_values() {CVE-2023-1073} - media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() {CVE-2022-45887}
Updated packages:
  • bpftool-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:fe856ddd55789d3d09592c7dfdf85c242b2105c6
  • kernel-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:e00d2567a1c355f882318874ebec126d6ddddde9
  • kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:56022d56b5f8b2967927dd00a1df645729022451
  • kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:081a11b1a1839b762aa0d0e8a36c1370753698c6
  • kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:58ba5fdde072d4f572154d0189cbd2390d03fe6e
  • kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:2752f2abcd0366350323d0b79430d3c7368bcada
  • kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:91c2b9a21a469bb5236a0b4280e3e50c1f8b4a5c
  • kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:d72aa7fc47cafcaa4e11b6245d939a7064debd33
  • kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:dcc759582388a4c1169f78fe28e4783d0fb842ba
  • kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:61faa7bd64c425164b00859838b75bf2104cb2f8
  • kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:971f2af15704d3423ada31d64c7bfc2432de7f6d
  • kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:0a5576f8e431452e8f9c52c7ffdd32eae9529336
  • kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:f4e0f621830817d2ad0588bae3612ba3df6cf8f3
  • kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:21c958f9af3f1580a12ea862df4c4f4cb32ffa65
  • kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:daf58faf6ccc6c559742a2f1ad457b54a4b04bbd
  • kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:8af493269d8e79ac7ebaffccff4122239d76fb5b
  • kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:399d244c95e68ccca5bc8e818eacde0f9662ad3b
  • kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:cdb285b47f84591147fb16ae9979bed7ce6857a0
  • kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:012c3489099f11ab10517b8037f50bcefe6f1b7c
  • kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:630761b1e7546490cd0ba2fb3164756fdd61d422
  • perf-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:652003897906c40319a414581b298adc33cfce7d
  • python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els17.x86_64.rpm
    sha:ef468baa81066059b4710074c5847d8cf2b2044e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.