[CLSA-2025:1739525834] kernel: Fix of 24 CVEs
Type:
security
Severity:
Important
Release date:
2025-02-14 09:37:20 UTC
Description:
- media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format {CVE-2024-53104} - wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() {CVE-2024-53156} - xsk: fix OOB map writes when deleting elements {CVE-2024-56614} - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer {CVE-2024-53103} - net: inet: do not leave a dangling sk pointer in inet_create() {CVE-2024-56601} - scsi: sg: Fix slab-use-after-free read in sg_release() {CVE-2024-56631} - scsi: sg: Enable runtime power management {CVE-2024-56631} - scsi: sg: Avoid race in error handling & drop bogus warn {CVE-2024-56631} - scsi: sg: Avoid sg device teardown race {CVE-2024-56631} - initramfs: avoid filename buffer overrun {CVE-2024-53142} - Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() {CVE-2024-56604} - cifs: Fix use-after-free in rdata->read_into_pages() {CVE-2023-52741} - Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() {CVE-2024-56605} - af_packet: avoid erroring out after sock_init_data() in packet_create() {CVE-2024-56606} - net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() {CVE-2024-56602} - net: inet6: do not leave a dangling sk pointer in inet6_create() {CVE-2024-56600} - NFSv4.0: Fix a use-after-free problem in the asynchronous open() {CVE-2024-53173} - net: af_can: do not leave a dangling sk pointer in can_create() {CVE-2024-56603} - drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 {CVE-2023-52818} - rds: tcp: Fix use-after-free of net in reqsk_timer_handler(). {CVE-2024-26865} - tcp: Save unnecessary inet_twsk_purge() calls. {CVE-2024-26865} - ceph: prevent use-after-free in encode_cap_msg() {CVE-2024-26689} - drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' {CVE-2024-56608} - bpf: Check validity of link->type in bpf_link_show_fdinfo() {CVE-2024-53099} - drm/amd/pm: fix a double-free in si_dpm_init {CVE-2023-52691} - netfilter: ipset: add missing range check in bitmap_ip_uadt {CVE-2024-53141} - tipc: fix NULL deref in cleanup_bearer() {CVE-2024-56661} - tipc: Fix use-after-free of kernel socket in cleanup_bearer(). {CVE-2024-56642} - tipc: wait and exit until all work queues are done {CVE-2024-56642}
Updated packages:
  • bpftool-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:acadb2a6dfdd9d4644d185112b56be8961841b069a780808251c4414a0353036
  • kernel-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:b021c46ba615051e76a4c9b5af3bdfd4c6d130cdff49ef11af9217a0ee642991
  • kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:2c5f634fd5db46442ccd939f998db85762c73ec87930f9b878495512a447781d
  • kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:f6c38b4f11f907fc2355eeead5b5174599c56ca33ba97e2a6697dff0609ec0fc
  • kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:6a169791aef42dae639b0f00187bdfc1fb157e30b6d8cc0138cd5d0988bb53ac
  • kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:4d507024117e0af2c03aa24c435128f688e4b5876caaaac64e4b246904258f90
  • kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:2d2fab99169605faa2017d3ac3eddda74306c419588ac88bd440704661788cbc
  • kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:540228936b56bba4e955a6f401ae262c687262018c24689192bd627ac9072e51
  • kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:46e1e54ad29ac85d918c5222480ea9663252b8524637de3aad0b91d48cfbf50b
  • kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:9a53cc73cac0db373f41bc3e644d129a085bd2bc04b51b7475002fcc71fe86c6
  • kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:73471eb73d729de749f67aab00d8c0e34b508d07a1d7db96c928b1c39f57096d
  • kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:f33113e3f5036c70842e1432969670e9995c5a3491fbfc244a23ecfa78d2a10d
  • kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:5894acd56124eedf3297d0629d879ebc63d18c9211ddb2cb5aa982b86c83c993
  • kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:afa3f30440cd78648ab4d7731b826127396d44e7ad2debe2e82968ab7399a2c2
  • kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:454ca2d0352e14ee0767c557c2509a9f995149787b0cc13ddff571252500423a
  • kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:ab91871bd05ac58ec81476f84dc7bb0361b8ddfac8ebf21da007b4e52fd56c3a
  • kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:b8974d778da228673f5dd5055610af34a8bb280cb537391c2aec3bd752edde56
  • kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:b251894dd2a09a219ef2e5793367ab99a4d732ec187aa585de58719ec99709d3
  • kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:2f57be14b08acc1310e32c9b109942ecb9ce174f2434ae75d49d6916385d246f
  • kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:197df70b4449c1e595f529f9baea479267eeb3d4b16be9ff02b0025f4a4e144a
  • perf-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:c3fd4a1d95a504c00602a1f0fc72daf82a00564bfa1c833565e9e0dce0e8c79b
  • python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els25.x86_64.rpm
    sha:0af7df6144c1b56963456a937c9ed7647343a35c2742310c4f403ef1afb52661
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.