Release date:
2024-09-30 10:09:11 UTC
Description:
- sch/netem: fix use after free in netem_dequeue {CVE-2024-46800}
- VMCI: Fix use-after-free when removing resource in vmci_resource_remove() {CVE-2024-46738}
- drm/amdgpu: Fix out-of-bounds write warning {CVE-2024-46725}
- drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number {CVE-2024-46724}
- drm/amdgpu: fix ucode out-of-bounds read warning {CVE-2024-46723}
- drm/amdgpu: fix mc_data out-of-bounds read warning {CVE-2024-46722}
- scsi: aacraid: Fix double-free on probe failure {CVE-2024-46673}
- ipv6: prevent UAF in ip6_send_skb() {CVE-2024-44987}
- exec: Fix ToCToU between perm check and set-uid/gid usage {CVE-2024-43882}
- dev/parport: fix the array out-of-bounds risk {CVE-2024-42301}
- RDMA/iwcm: Fix a use-after-free related to destroying CM IDs {CVE-2024-42285}
- tipc: Return non-zero value from tipc_udp_addr2str() on error {CVE-2024-42284}
- mISDN: Fix a use after free in hfcmulti_tx() {CVE-2024-42280}
- nvme: avoid double free special payload {CVE-2024-41073}
- wifi: mac80211: Avoid address calculations via out of bounds array indexing {CVE-2024-41071}
- xfs: don't walk off the end of a directory data block {CVE-2024-41013}
- tunnels: fix out of bounds access when building IPv6 PMTU error {CVE-2024-26665}
- KVM: x86/mmu: make apf token non-zero to fix bug {CVE-2022-48943}
- cifs: fix double free race when mount fails in cifs_get_root() {CVE-2022-48919}
- netfilter: fix use-after-free in __nf_register_net_hook() {CVE-2022-48912}
- rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() {CVE-2022-48742}
- selinux: fix double free of cond_list on error paths {CVE-2022-48740}
- ALSA: hda: Fix UAF of leds class devs at unbinding {CVE-2022-48735}
- drm/nouveau: fix off by one in BIOS boundary checking {CVE-2022-48732}
- mm, slub: fix potential memoryleak in kmem_cache_open() {CVE-2021-47466}
- x86/coco: Disable 32-bit emulation by default on TDX and SEV {CVE-2024-25744}
- x86: Make IA32_EMULATION boot time configurable {CVE-2024-25744}
- x86/entry: Make IA32 syscalls' availability depend on ia32_enabled() {CVE-2024-25744}
- x86/elf: Make loading of 32bit processes depend on ia32_enabled() {CVE-2024-25744}
- x86/entry: Rename ignore_sysret() {CVE-2024-25744}
- x86/cpu: Don't write CSTAR MSR on Intel CPUs {CVE-2024-25744}
- x86: Introduce ia32_enabled() {CVE-2024-25744}
- x86/asm/64: Change all ENTRY+END to SYM_CODE_* {CVE-2024-25744}
- x86/head/64: Annotate start_cpu0() as non-callable {CVE-2024-25744}
- x86/asm: Do not annotate functions with GLOBAL {CVE-2024-25744}
- kprobes/x86/xen: blacklist non-attachable xen interrupt functions {CVE-2024-25744}
- x86/asm/64: Add ENDs to some functions and relabel with SYM_CODE_* {CVE-2024-25744}
- x86/asm: Use SYM_INNER_LABEL instead of GLOBAL {CVE-2024-25744}
- x86/asm: Annotate aliases {CVE-2024-25744}
- x86/asm/crypto: Annotate local functions {CVE-2024-25744}
- scsi: qedf: Make qedf_execute_tmf() non-preemptible {CVE-2024-42124}
- ftruncate: pass a signed offset {CVE-2024-42084}
- USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor {CVE-2024-41035}
- xfs: add bounds checking to xlog_recover_process_data {CVE-2024-41014}
- drm/radeon: fix UBSAN warning in kv_dpm.c {CVE-2024-40988}
- ring-buffer: Fix a race between readers and resize checks {CVE-2024-38601}
- Input: cyapa - add missing input core locking to suspend/resume functions {CVE-2023-52884}
- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() {CVE-2023-52840}
- wifi: ath11k: fix htt pktlog locking {CVE-2023-52800}
- wifi: ath11k: fix dfs radar event locking {CVE-2023-52798}
- ACPI: LPIT: Avoid u32 multiplication overflow {CVE-2023-52683}
- ACPI: extlog: fix NULL pointer dereference check {CVE-2023-52605}
- HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect {CVE-2023-52478}
- USB: core: Fix hang in usb_kill_urb by adding memory barriers {CVE-2022-48760}
- phylib: fix potential use-after-free {CVE-2022-48754}
- serial: core: fix transmit-buffer reset and memleak {CVE-2021-47527}
- nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells {CVE-2021-47497}
- mlxsw: thermal: Fix out-of-bounds memory accesses {CVE-2021-47441}
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs {CVE-2021-47393}
- hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field {CVE-2021-47386}
- hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field {CVE-2021-47385}
- hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field {CVE-2021-47384}
- virtio-net: Add validation for used length {CVE-2021-47352}
- watchdog: Fix possible use-after-free by calling del_timer_sync() {CVE-2021-47321}
- ACPI: fix NULL pointer dereference {CVE-2021-47289}
- ipv6: prevent possible NULL dereference in rt6_probe() {CVE-2024-40960}
- xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() {CVE-2024-40959}
- wifi: iwlwifi: mvm: don't read past the mfuart notifcation {CVE-2024-40941}
- wifi: iwlwifi: mvm: check n_ssids before accessing the ssids {CVE-2024-40929}
- wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() {CVE-2024-40912}
- USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages {CVE-2024-40904}
- scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory {CVE-2024-40901}
- liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet {CVE-2024-39506}
- vmci: prevent speculation leaks by sanitizing event in event_deliver() {CVE-2024-39499}
- crypto: bcm - Fix pointer arithmetic {CVE-2024-38579}
- scsi: qedf: Ensure the copied buf is NUL terminated {CVE-2024-38559}
- net: openvswitch: fix overwriting ct original tuple for ICMPv6 {CVE-2024-38558}
- scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload {CVE-2024-36919}
- netfilter: complete validation of user input {CVE-2024-35962}
- VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() {CVE-2024-35944}
- ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() {CVE-2024-26894}
- dm: call the resume method on internal suspend {CVE-2024-26880}
- net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() {CVE-2024-26855}
- mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again {CVE-2024-26720}
- tracing: Ensure visibility when inserting an element into tracing_map {CVE-2024-26645}
- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() {CVE-2023-52809}
- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() {CVE-2023-52470}
- Input: add bounds checking to input_set_capability() {CVE-2022-48619}
- tty: Fix out-of-bound vmalloc access in imageblit {CVE-2021-47383}
- bnx2x: Fix multiple UBSAN array-index-out-of-bounds {CVE-2024-42148}
- net: do not leave a dangling sk pointer, when socket creation fails {CVE-2024-40954}
- media: xc2028: avoid use-after-free in load_firmware_cb() {CVE-2024-43900}
- fou: remove warn in gue_gro_receive on unsupported protocol {CVE-2024-44940}
- PCI/MSI: Fix UAF in msi_capability_init {CVE-2024-41096}
Updated packages:
-
bpftool-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:5bc32575ed20abbdc8d61db7e7281efa85ae865fe386e45742b8d22186b3315a
-
kernel-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:e3fde3f3730cacaa352713d1b4e3609b92ab86a8dbff392ac003c0ea8135c0df
-
kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:9504b1c51281893fd278a8bdf5a6442aab6065be274e160ebef93df4ead43b41
-
kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:0e0bef36aa07d0795b858d657400af797f418e36b44a41c63878c9113077199c
-
kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:18f85eeabeddd34118fb032827141c6135bc902c1bb10a00491a2f162b420358
-
kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:010b6e31bb2b1944ec81baba40dbd68ff008a4d86af90c23a057a0967f0a117b
-
kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:1cce8df3d4132b9edafd0a18232ceb9d2c305e256c61610a8418a9dfdf0ce50e
-
kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:e1ce4a9858c5566694ac7e0bf5707b01453d51fcaa3711b45cd04317279f5abf
-
kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:006a13abb6c37b08c41406e9d39bebeedb4409e23728b0fc9814cafea49094d8
-
kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:e5caa402788c9f55e203fbeb12ecc813e0404cbdcd943043fea13539716c7282
-
kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:dfa9c98d8a18625eee14097407974a5294b423557b06c0551d38e0e150872e2c
-
kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:83f759d9db46a92517453bca05e7474236b9b892e0123ee8d8f14ca94459a3ef
-
kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:675185456387ddd7d55f65d16ff8f92095845686bf9065dc411911fb481fcfc4
-
kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:e8a710f40db4c13c4eeb049be91862528adb695feea2fa91163eda44a54f6900
-
kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:f1c69276d6a320730fe7909390972f4c023be06ec7569ee94a310bec2767f91e
-
kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:3455e0863aa4a7df51a562f5d772f0927f6779a724e068f823fde3baf629cd54
-
kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:30deea7b6c7186cb37fddbc80eef38051f3f7cffab7db651bee43f611a3435b8
-
kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:21ae78dc255730de860c66ba9f8b6424a93ee44fba4c035440dff75be1f1283c
-
kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:3042d3e6bb3181a85646680a15f49ff0eff75d05e3cdd887de49644082c0a68b
-
kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:385bf903c252db82a0fc7b32338924d951a02b99bfc511d40fbe65f9d7a68660
-
perf-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:c60019185bd2b2b024052e171056494e9692d96f6fd318daaa6d062b0332198a
-
python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els20.x86_64.rpm
sha:a2e80c11705b5f0e9c0e930f532e228b6893d31eea4c7bb208276a6a06d46cca
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.