Release date:
2024-11-12 16:56:06 UTC
Description:
- driver core: bus: Fix double free in driver API bus_register() {CVE-2024-50055}
- net: tun: Fix use-after-free in tun_detach() {CVE-2022-49014}
- memcg: fix possible use-after-free in memcg_write_event_control() {CVE-2022-48988}
- ppp: fix ppp_async_encode() illegal access {CVE-2024-50035}
- drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error {CVE-2024-47698}
- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails {CVE-2022-49029}
- tipc: guard against string buffer overrun {CVE-2024-49995}
- ext4: fix double brelse() the buffer of the extents path {CVE-2024-49882}
- ACPI: sysfs: validate return type of _STR method {CVE-2024-49860}
- ext4: aovid use-after-free in ext4_ext_insert_extent() {CVE-2024-49883}
- ext4: no need to continue when the number of entries is 1 {CVE-2024-49967}
- padata: Fix possible divide-by-0 panic in padata_mt_helper() {CVE-2024-43889}
- hwmon: (coretemp) Check for null before removing sysfs attrs {CVE-2022-49010}
- drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error {CVE-2024-47697}
- wifi: ath11k: fix array out-of-bound access in SoC stats {CVE-2024-49930}
- ipv6: avoid use-after-free in ip6_fragment() {CVE-2022-48956}
- netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() {CVE-2024-47685}
- drm/i915/gt: Fix potential UAF by revoke of fence registers {CVE-2024-41092}
- slip: make slhc_remember() more robust against malicious packets {CVE-2024-50033}
- drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer {CVE-2024-49991}
- tty: n_gsm: Fix use-after-free in gsm_cleanup_mux {CVE-2024-50073}
- ext4: fix timer use-after-free on failed mount {CVE-2024-49960}
- ext4: avoid use-after-free in ext4_ext_show_leaf() {CVE-2024-49889}
- mm: call the security_mmap_file() LSM hook in remap_file_pages() {CVE-2024-47745}
- firmware_loader: Block path traversal {CVE-2024-47742}
- ext4: avoid OOB when system.data xattr changes underneath the filesystem {CVE-2024-47701}
- tcp: drop the hash_32() part from the index calculation {CVE-2022-1012}
- tcp: increase source port perturb table to 2^16 {CVE-2022-1012}
- tcp: dynamically allocate the perturb table used by source ports {CVE-2022-1012}
- net: dccp: fix kernel crash on module load {CVE-2022-1012}
- net: dccp: initialize (addr,port) listening hashtable {CVE-2022-1012}
- tcp: add small random increments to the source port {CVE-2022-1012}
- tcp: resalt the secret every 10 seconds {CVE-2022-1012}
- tcp: use different parts of the port_offset for index and offset {CVE-2022-1012}
- secure_seq: use the 64 bits of the siphash for port offset calculation {CVE-2022-1012}
- Revert "[ELSCVE-6395] secure_seq: use the 64 bits of the siphash for port offset calculation" {CVE-2022-1012}
- tcp: add some entropy in __inet_hash_connect() {CVE-2022-1012}
- tcp: change source port randomizarion at connect() time {CVE-2022-1012}
- esp: limit skb_page_frag_refill use to a single page {CVE-2022-27666}
- drm/vmwgfx: Fix stale file descriptors on failed usercopy {CVE-2022-22942}
- drm/i915: Fix the GT fence revocation runtime PM logic {CVE-2022-0330}
- PM: runtime: Add pm_runtime_get_if_active() {CVE-2022-0330}
- PM-runtime: add tracepoints for usage_count changes {CVE-2022-0330}
- fget: clarify and improve __fget_files() implementation {CVE-2021-4083}
- proc/fd: In proc_fd_link use fget_task {CVE-2021-4083}
- kcmp: In kcmp_epoll_target use fget_task {CVE-2021-4083}
- file: Rename __fcheck_files to files_lookup_fd_raw {CVE-2021-4083}
- bpf: In bpf_task_fd_query use fget_task {CVE-2021-4083}
- fget: check that the fd still exists after getting a ref to it {CVE-2021-4083}
- Revert "[ELSCVE-2732] fget: check that the fd still exists after getting a ref to it" {CVE-2021-4083}
- file: Replace fcheck_files with files_lookup_fd_rcu {CVE-2021-4083}
- file: Factor files_lookup_fd_locked out of fcheck_files {CVE-2021-4083}
- vfs, fdtable: Add fget_task helper {CVE-2021-4083}
Updated packages:
-
bpftool-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:eaf513cd6f0321cfe0dd7ee2f1dedff27825f5a5b0439bf9fd83a09f3176d220
-
kernel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:9bf6ad1f485f8623a0234a28f336783c2e927a6216195eb79501ad00eb496093
-
kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:579941301f89ba9fdaacef68c562eabbc6427e18fd662a19886d94b4ecc6879e
-
kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:3757f11cd1bca38ff1d65d5c5c0502c0bbaaad8a162036557b959104f2c0695a
-
kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:c55842c27a07616b9083a70750290884062cabf07484254e6e34c5efe0168bfc
-
kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:eac444e24dfb66931101b4a7bb94079f0d10f7d640e6066db0fa0457aea786f9
-
kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:8673824d9dfd18736c8e35d066cf8a71e9f0f991cc237cfa0ea834aac0c1ec0d
-
kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:bbdb3ec5f75a59fbed272ec63325db40f576bb27852216505c4ded9c3792fa69
-
kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:cbbdbb742486171d734124f10fdfe7a44549252384ebe566fefceb55e2ebcf01
-
kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:052a8aa2003e556b509e4c0f3962e8389bde0d180cf3b142437d84ad1fbc4bff
-
kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:b7e79c63a00fe1f2b09959e4160c06dc043addb28d1a8231a8ab48ae9e904766
-
kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:d44c2ab9e2e3c61f3aec3cea41b60390fe7c630547923edc26c15bad4198056b
-
kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:b1f0fea76915dcca69436f4c9ad57f992f405c657765b76585460cb9fd376921
-
kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:b76c18e140548ab4b6f12a04c11fc3111283b6eb8209f0c5e7f30730ddece9d0
-
kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:75a6b50e781fca3d44603864ed4eae41fa35307c1d2ba271136ac9ce1a93aae0
-
kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:05aec761c764fa8a748cb1c6e1aaa41b44452e940db4ba7479eb82392858ad58
-
kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:83fae7483cb096ab1c6c765c9463343af5cc9c60320a273613b5ea73d52eacc9
-
kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:0e5c614ec45014076c4b6b23f29a593513553a48ab03079197961260c736e764
-
kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:a34a30a2235b95e95bad1f1765be24be369ac4fac768c50dca2ee8426da1d551
-
kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:9463d116997717ca9dd2ce971b54865780910d3014a20ae7c91ad7dd073c9817
-
perf-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:b7bfe96877c9123d46a7f06d2be4554cfa220e30b9a44c22a3bd9c9e526e1d5c
-
python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm
sha:16174236fd0e549bc88fc49782cb53cec0d0e6a87b339c72ed412dc4992608e9
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.