Description:
- udf: Restore i_lenAlloc when inode expansion fails (Jan Kara) {CVE-2022-0617}
- udf: Fix NULL ptr deref when converting from inline format (Jan Kara) {CVE-2022-0617}
- Bluetooth: fix use-after-free error in lock_sock_nested() (Wang ShaoBo) {CVE-2021-3752}
- vt_kdsetmode: extend console locking (Linus Torvalds) {CVE-2021-3753}
- fget: check that the fd still exists after getting a ref to it (Linus Torvalds) {CVE-2021-4083}
- ipv6: use prandom_u32() for ID generation (Willy Tarreau) {CVE-2021-45485}
- virtio_console: Assure used length from device is limited (Xie Yongji) {CVE-2021-38160}
- bpf: Fix integer overflow in prealloc_elems_and_freelist() (Tatsuhiko Yasumatsu) {CVE-2021-41864}
- ext4: fix race writing to an inline_data file while its xattrs are changing (Theodore Ts'o) {CVE-2021-40490}
- xen-blkback: fix error handling in xen_blkbk_map() (Jan Beulich) {CVE-2021-26930}
- bpf, x86: Validate computation of branch displacements for x86-32 (Piotr Krysiuk) {CVE-2021-29154}
- bpf, x86: Validate computation of branch displacements for x86-64 (Piotr Krysiuk) {CVE-2021-29154}
- tipc: improve size validations for received domain records (Jon Paul Maloy) {CVE-2022-0435}
- cgroup: verify that source is a string (Christian Brauner) {CVE-2021-4154}
Updated packages:
-
kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:730c798aecc3352798507cc2d4645097662aef25
-
kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:6c02eea42ab8d0df7f12f0bbeb7874d9a5523d56
-
python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:782441c3764c9e00f0a2e5dff4a3c2d72f656118
-
perf-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:bb925b156cd7f582cc3992aa78e8328f380568d6
-
kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:c17dd86ec5bd29339678e0c5792b2c6550a22f66
-
kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:e701b4f29c66274ed8d01e8114ce4e4a1c3a7b8d
-
kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:8172d6a7e5d0554ffa339b0909bd718b0ee1d003
-
kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:309a37c04fc753a8da44bec1716582d9d242a5ac
-
kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:5ccf8e87e12cd8734b06eb1167325ca0aae5d7a0
-
kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:6502ad48ba438bc78858a53bff07ad7285bf1ce0
-
kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:482ac561b284d2ccef0cdadfae1c52325262b829
-
kernel-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:37784eb661b550c76bc2c6ea727c01914c0257ff
-
kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:b636323d0822784be3201d1e6b5af11290b70dd8
-
kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:d27d98c8310ef55864f4185436d585ce4e7f5adc
-
kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:86500768e33bce4a2ef46e5d2741a02dbcedeed6
-
kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:d747d36c3e365242acd156053164c210b92f7304
-
kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:5589a94702401cbe6f1d6038f0febfc5d1bf85c6
-
bpftool-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:1ceac8a976a0af37d59342f8f7b462b7668e4e35
-
kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:0af970441648b7bdf107b8bcfa2dadf29e83dd36
-
kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:476d8c272998b5a327605baec37a20edb9861c40
-
kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:dcc9ffd07bbea63dfb92a9c0aba503cc500c01aa
-
kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
sha:19623aaeb59cd18ee51ab670d02801809b2dec55
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.