[CLSA-2024:1719933179] kernel: Fix of 20 CVEs
Type:
security
Severity:
Critical
Release date:
2024-07-02 15:13:02 UTC
Description:
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() {CVE-2024-26882} - net: Set true network header for ECN decapsulation {CVE-2024-26882} - media: dvb-core: Fix use-after-free due to race at dvb_register_device() {CVE-2022-45884} - media: dvbdev: fix error logic at dvb_register_device() {CVE-2022-45884} - media: dvbdev: Fix memleak in dvb_register_device {CVE-2022-45884} - media: media/dvb: Use kmemdup rather than duplicating its implementation {CVE-2022-45884} - media: dvbdev: drop refcount on error path in dvb_device_open() {CVE-2022-45884} - media: dvbdev: fix refcnt bug {CVE-2022-45884} - media: dvbdev: adopts refcnt to avoid UAF {CVE-2022-45884} - netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() {CVE-2024-27020} - netfilter: nf_tables: __nft_expr_type_get() selects specific family type {CVE-2024-27020} - scsi: qla2xxx: Fix double free of fcport {CVE-2024-26929} - of: fdt: fix off-by-one error in unflatten_dt_nodes() {CVE-2022-48672} - USB: core: Fix deadlock in usb_deauthorize_interface() {CVE-2024-26934} - smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752} - netfilter: nf_tables: disallow anonymous set with timeout flag {CVE-2024-26642} - media: technisat-usb2: break out of loop at end of buffer {CVE-2019-15505} - Input: gtco - bounds check collection indent level {CVE-2019-13631} - ext4: fix kernel infoleak via ext4_extent_header {CVE-2022-0850} - media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors {CVE-2020-0404} - netfilter: nft_set_pipapo: skip inactive elements during set walk {CVE-2023-6817} - libceph: harden msgr2.1 frame segment length checks {CVE-2023-44466} - media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() {CVE-2023-31084} - dm ioctl: fix nested locking in table_clear() to remove deadlock concern {CVE-2023-2269} - hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition {CVE-2023-1855} - RDMA/core: Don't infoleak GRH fields {CVE-2021-3923} - HID: betop: check shape of output reports {CVE-2023-1073} - HID: betop: fix slab-out-of-bounds Write in betop_probe {CVE-2023-1073} - HID: check empty report_list in hid_validate_values() {CVE-2023-1073} - media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() {CVE-2022-45887}
Updated packages:
  • bpftool-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:5419ff0dee2c927373e2eff85234c4bc3cfb5251
  • kernel-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:b7d5ca4c011b387009792d8ad5e3a1710934a1ab
  • kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:2d3654a601cba76139473ee8ad7b3e38795e12f1
  • kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:2d2e218e2d9c0a61ba7e8b115ebf8f76b738d20c
  • kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:040907838f457d7760a6eb7afea6c0d4eb405c02
  • kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:af9aab84f63df4a3df54bddbb81006fe55b1be70
  • kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:d2f46f5f27fde208442bf3d6a59e13a0e75226db
  • kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:48ee98ed2dc08a9474b456de78d67662f2e45e28
  • kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:b5742fedf4eb4dc366bd715b34e1afab89ee22fc
  • kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:a1d758880fec8c1e45617778d46f418ca983f7ae
  • kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:61193ee0d6f2ecc8bbbbfa88f7af6899325cc914
  • kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:6dad9dfc580b7ad5b2977ce2c44ced0f5901e0d5
  • kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:5eb7ad6e0f9dd319f7a64c363110a88d782a6f6a
  • kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:19961c42c72a6d3fd6574b7c78394b93696319a0
  • kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:f6ce54a71a409ea1029ed9c3996415948a392c67
  • kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:84ae889d0daabd4b66c35d2d36344d43e27f8280
  • kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:9f21050c8a41c77b1a44eee66cdfccd9961ad660
  • kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:6038c18464d118044afc7acac4bb8f6da2cd81b0
  • kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:746a2e828d6d7f2f31ad9b0269515c6d963f98c7
  • kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:dd33c984fe19524c31d8752d16be3939c295d691
  • perf-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:9962facccfa87e985d4e066ba20cc8bffcfbe699
  • python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
    sha:97db53a9e2ed0fa4de28cf6f357619a10ccf563e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.