[CLSA-2022:1651146021] Fix of CVE: CVE-2022-0617, CVE-2021-40490, CVE-2021-29154, CVE-2022-0435, CVE-2021-4154, CVE-2021-3753, CVE-2021-38160, CVE-2021-45485, CVE-2021-3752, CVE-2021-41864, CVE-2021-4083, CVE-2021-26930
Type:
security
Severity:
moderate
Release date:
2022-04-28
Description:
- udf: Restore i_lenAlloc when inode expansion fails (Jan Kara) {CVE-2022-0617} - udf: Fix NULL ptr deref when converting from inline format (Jan Kara) {CVE-2022-0617} - Bluetooth: fix use-after-free error in lock_sock_nested() (Wang ShaoBo) {CVE-2021-3752} - vt_kdsetmode: extend console locking (Linus Torvalds) {CVE-2021-3753} - fget: check that the fd still exists after getting a ref to it (Linus Torvalds) {CVE-2021-4083} - ipv6: use prandom_u32() for ID generation (Willy Tarreau) {CVE-2021-45485} - virtio_console: Assure used length from device is limited (Xie Yongji) {CVE-2021-38160} - bpf: Fix integer overflow in prealloc_elems_and_freelist() (Tatsuhiko Yasumatsu) {CVE-2021-41864} - ext4: fix race writing to an inline_data file while its xattrs are changing (Theodore Ts'o) {CVE-2021-40490} - xen-blkback: fix error handling in xen_blkbk_map() (Jan Beulich) {CVE-2021-26930} - bpf, x86: Validate computation of branch displacements for x86-32 (Piotr Krysiuk) {CVE-2021-29154} - bpf, x86: Validate computation of branch displacements for x86-64 (Piotr Krysiuk) {CVE-2021-29154} - tipc: improve size validations for received domain records (Jon Paul Maloy) {CVE-2022-0435} - cgroup: verify that source is a string (Christian Brauner) {CVE-2021-4154}
Updated packages:
  • kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:730c798aecc3352798507cc2d4645097662aef25
  • kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:6c02eea42ab8d0df7f12f0bbeb7874d9a5523d56
  • python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:782441c3764c9e00f0a2e5dff4a3c2d72f656118
  • perf-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:bb925b156cd7f582cc3992aa78e8328f380568d6
  • kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:c17dd86ec5bd29339678e0c5792b2c6550a22f66
  • kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:e701b4f29c66274ed8d01e8114ce4e4a1c3a7b8d
  • kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:8172d6a7e5d0554ffa339b0909bd718b0ee1d003
  • kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:309a37c04fc753a8da44bec1716582d9d242a5ac
  • kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:5ccf8e87e12cd8734b06eb1167325ca0aae5d7a0
  • kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:6502ad48ba438bc78858a53bff07ad7285bf1ce0
  • kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:482ac561b284d2ccef0cdadfae1c52325262b829
  • kernel-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:37784eb661b550c76bc2c6ea727c01914c0257ff
  • kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:b636323d0822784be3201d1e6b5af11290b70dd8
  • kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:d27d98c8310ef55864f4185436d585ce4e7f5adc
  • kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:86500768e33bce4a2ef46e5d2741a02dbcedeed6
  • kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:d747d36c3e365242acd156053164c210b92f7304
  • kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:5589a94702401cbe6f1d6038f0febfc5d1bf85c6
  • bpftool-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:1ceac8a976a0af37d59342f8f7b462b7668e4e35
  • kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:0af970441648b7bdf107b8bcfa2dadf29e83dd36
  • kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:476d8c272998b5a327605baec37a20edb9861c40
  • kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:dcc9ffd07bbea63dfb92a9c0aba503cc500c01aa
  • kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els4.x86_64.rpm
    sha:19623aaeb59cd18ee51ab670d02801809b2dec55
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.