[CLSA-2024:1731430561] kernel: Fix of 31 CVEs
Type:
security
Severity:
Critical
Release date:
2024-11-12 16:56:06 UTC
Description:
- driver core: bus: Fix double free in driver API bus_register() {CVE-2024-50055} - net: tun: Fix use-after-free in tun_detach() {CVE-2022-49014} - memcg: fix possible use-after-free in memcg_write_event_control() {CVE-2022-48988} - ppp: fix ppp_async_encode() illegal access {CVE-2024-50035} - drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error {CVE-2024-47698} - hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails {CVE-2022-49029} - tipc: guard against string buffer overrun {CVE-2024-49995} - ext4: fix double brelse() the buffer of the extents path {CVE-2024-49882} - ACPI: sysfs: validate return type of _STR method {CVE-2024-49860} - ext4: aovid use-after-free in ext4_ext_insert_extent() {CVE-2024-49883} - ext4: no need to continue when the number of entries is 1 {CVE-2024-49967} - padata: Fix possible divide-by-0 panic in padata_mt_helper() {CVE-2024-43889} - hwmon: (coretemp) Check for null before removing sysfs attrs {CVE-2022-49010} - drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error {CVE-2024-47697} - wifi: ath11k: fix array out-of-bound access in SoC stats {CVE-2024-49930} - ipv6: avoid use-after-free in ip6_fragment() {CVE-2022-48956} - netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() {CVE-2024-47685} - drm/i915/gt: Fix potential UAF by revoke of fence registers {CVE-2024-41092} - slip: make slhc_remember() more robust against malicious packets {CVE-2024-50033} - drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer {CVE-2024-49991} - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux {CVE-2024-50073} - ext4: fix timer use-after-free on failed mount {CVE-2024-49960} - ext4: avoid use-after-free in ext4_ext_show_leaf() {CVE-2024-49889} - mm: call the security_mmap_file() LSM hook in remap_file_pages() {CVE-2024-47745} - firmware_loader: Block path traversal {CVE-2024-47742} - ext4: avoid OOB when system.data xattr changes underneath the filesystem {CVE-2024-47701} - tcp: drop the hash_32() part from the index calculation {CVE-2022-1012} - tcp: increase source port perturb table to 2^16 {CVE-2022-1012} - tcp: dynamically allocate the perturb table used by source ports {CVE-2022-1012} - net: dccp: fix kernel crash on module load {CVE-2022-1012} - net: dccp: initialize (addr,port) listening hashtable {CVE-2022-1012} - tcp: add small random increments to the source port {CVE-2022-1012} - tcp: resalt the secret every 10 seconds {CVE-2022-1012} - tcp: use different parts of the port_offset for index and offset {CVE-2022-1012} - secure_seq: use the 64 bits of the siphash for port offset calculation {CVE-2022-1012} - Revert "[ELSCVE-6395] secure_seq: use the 64 bits of the siphash for port offset calculation" {CVE-2022-1012} - tcp: add some entropy in __inet_hash_connect() {CVE-2022-1012} - tcp: change source port randomizarion at connect() time {CVE-2022-1012} - esp: limit skb_page_frag_refill use to a single page {CVE-2022-27666} - drm/vmwgfx: Fix stale file descriptors on failed usercopy {CVE-2022-22942} - drm/i915: Fix the GT fence revocation runtime PM logic {CVE-2022-0330} - PM: runtime: Add pm_runtime_get_if_active() {CVE-2022-0330} - PM-runtime: add tracepoints for usage_count changes {CVE-2022-0330} - fget: clarify and improve __fget_files() implementation {CVE-2021-4083} - proc/fd: In proc_fd_link use fget_task {CVE-2021-4083} - kcmp: In kcmp_epoll_target use fget_task {CVE-2021-4083} - file: Rename __fcheck_files to files_lookup_fd_raw {CVE-2021-4083} - bpf: In bpf_task_fd_query use fget_task {CVE-2021-4083} - fget: check that the fd still exists after getting a ref to it {CVE-2021-4083} - Revert "[ELSCVE-2732] fget: check that the fd still exists after getting a ref to it" {CVE-2021-4083} - file: Replace fcheck_files with files_lookup_fd_rcu {CVE-2021-4083} - file: Factor files_lookup_fd_locked out of fcheck_files {CVE-2021-4083} - vfs, fdtable: Add fget_task helper {CVE-2021-4083}
Updated packages:
  • bpftool-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:eaf513cd6f0321cfe0dd7ee2f1dedff27825f5a5b0439bf9fd83a09f3176d220
  • kernel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:9bf6ad1f485f8623a0234a28f336783c2e927a6216195eb79501ad00eb496093
  • kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:579941301f89ba9fdaacef68c562eabbc6427e18fd662a19886d94b4ecc6879e
  • kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:3757f11cd1bca38ff1d65d5c5c0502c0bbaaad8a162036557b959104f2c0695a
  • kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:c55842c27a07616b9083a70750290884062cabf07484254e6e34c5efe0168bfc
  • kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:eac444e24dfb66931101b4a7bb94079f0d10f7d640e6066db0fa0457aea786f9
  • kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:8673824d9dfd18736c8e35d066cf8a71e9f0f991cc237cfa0ea834aac0c1ec0d
  • kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:bbdb3ec5f75a59fbed272ec63325db40f576bb27852216505c4ded9c3792fa69
  • kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:cbbdbb742486171d734124f10fdfe7a44549252384ebe566fefceb55e2ebcf01
  • kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:052a8aa2003e556b509e4c0f3962e8389bde0d180cf3b142437d84ad1fbc4bff
  • kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:b7e79c63a00fe1f2b09959e4160c06dc043addb28d1a8231a8ab48ae9e904766
  • kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:d44c2ab9e2e3c61f3aec3cea41b60390fe7c630547923edc26c15bad4198056b
  • kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:b1f0fea76915dcca69436f4c9ad57f992f405c657765b76585460cb9fd376921
  • kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:b76c18e140548ab4b6f12a04c11fc3111283b6eb8209f0c5e7f30730ddece9d0
  • kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:75a6b50e781fca3d44603864ed4eae41fa35307c1d2ba271136ac9ce1a93aae0
  • kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:05aec761c764fa8a748cb1c6e1aaa41b44452e940db4ba7479eb82392858ad58
  • kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:83fae7483cb096ab1c6c765c9463343af5cc9c60320a273613b5ea73d52eacc9
  • kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:0e5c614ec45014076c4b6b23f29a593513553a48ab03079197961260c736e764
  • kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:a34a30a2235b95e95bad1f1765be24be369ac4fac768c50dca2ee8426da1d551
  • kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:9463d116997717ca9dd2ce971b54865780910d3014a20ae7c91ad7dd073c9817
  • perf-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:b7bfe96877c9123d46a7f06d2be4554cfa220e30b9a44c22a3bd9c9e526e1d5c
  • python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
    sha:16174236fd0e549bc88fc49782cb53cec0d0e6a87b339c72ed412dc4992608e9
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.