Release date:
2024-07-02 15:13:02 UTC
Description:
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() {CVE-2024-26882}
- net: Set true network header for ECN decapsulation {CVE-2024-26882}
- media: dvb-core: Fix use-after-free due to race at dvb_register_device() {CVE-2022-45884}
- media: dvbdev: fix error logic at dvb_register_device() {CVE-2022-45884}
- media: dvbdev: Fix memleak in dvb_register_device {CVE-2022-45884}
- media: media/dvb: Use kmemdup rather than duplicating its implementation {CVE-2022-45884}
- media: dvbdev: drop refcount on error path in dvb_device_open() {CVE-2022-45884}
- media: dvbdev: fix refcnt bug {CVE-2022-45884}
- media: dvbdev: adopts refcnt to avoid UAF {CVE-2022-45884}
- netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() {CVE-2024-27020}
- netfilter: nf_tables: __nft_expr_type_get() selects specific family type {CVE-2024-27020}
- scsi: qla2xxx: Fix double free of fcport {CVE-2024-26929}
- of: fdt: fix off-by-one error in unflatten_dt_nodes() {CVE-2022-48672}
- USB: core: Fix deadlock in usb_deauthorize_interface() {CVE-2024-26934}
- smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752}
- netfilter: nf_tables: disallow anonymous set with timeout flag {CVE-2024-26642}
- media: technisat-usb2: break out of loop at end of buffer {CVE-2019-15505}
- Input: gtco - bounds check collection indent level {CVE-2019-13631}
- ext4: fix kernel infoleak via ext4_extent_header {CVE-2022-0850}
- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors {CVE-2020-0404}
- netfilter: nft_set_pipapo: skip inactive elements during set walk {CVE-2023-6817}
- libceph: harden msgr2.1 frame segment length checks {CVE-2023-44466}
- media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() {CVE-2023-31084}
- dm ioctl: fix nested locking in table_clear() to remove deadlock concern {CVE-2023-2269}
- hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition {CVE-2023-1855}
- RDMA/core: Don't infoleak GRH fields {CVE-2021-3923}
- HID: betop: check shape of output reports {CVE-2023-1073}
- HID: betop: fix slab-out-of-bounds Write in betop_probe {CVE-2023-1073}
- HID: check empty report_list in hid_validate_values() {CVE-2023-1073}
- media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() {CVE-2022-45887}
Updated packages:
-
bpftool-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:5419ff0dee2c927373e2eff85234c4bc3cfb5251
-
kernel-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:b7d5ca4c011b387009792d8ad5e3a1710934a1ab
-
kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:2d3654a601cba76139473ee8ad7b3e38795e12f1
-
kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:2d2e218e2d9c0a61ba7e8b115ebf8f76b738d20c
-
kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:040907838f457d7760a6eb7afea6c0d4eb405c02
-
kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:af9aab84f63df4a3df54bddbb81006fe55b1be70
-
kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:d2f46f5f27fde208442bf3d6a59e13a0e75226db
-
kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:48ee98ed2dc08a9474b456de78d67662f2e45e28
-
kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:b5742fedf4eb4dc366bd715b34e1afab89ee22fc
-
kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:a1d758880fec8c1e45617778d46f418ca983f7ae
-
kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:61193ee0d6f2ecc8bbbbfa88f7af6899325cc914
-
kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:6dad9dfc580b7ad5b2977ce2c44ced0f5901e0d5
-
kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:5eb7ad6e0f9dd319f7a64c363110a88d782a6f6a
-
kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:19961c42c72a6d3fd6574b7c78394b93696319a0
-
kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:f6ce54a71a409ea1029ed9c3996415948a392c67
-
kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:84ae889d0daabd4b66c35d2d36344d43e27f8280
-
kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:9f21050c8a41c77b1a44eee66cdfccd9961ad660
-
kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:6038c18464d118044afc7acac4bb8f6da2cd81b0
-
kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:746a2e828d6d7f2f31ad9b0269515c6d963f98c7
-
kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:dd33c984fe19524c31d8752d16be3939c295d691
-
perf-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:9962facccfa87e985d4e066ba20cc8bffcfbe699
-
python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els17.x86_64.rpm
sha:97db53a9e2ed0fa4de28cf6f357619a10ccf563e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.