[CLSA-2024:1731431059] kernel: Fix of 31 CVEs
Type:
security
Severity:
Critical
Release date:
2024-11-12 17:04:25 UTC
Description:
- driver core: bus: Fix double free in driver API bus_register() {CVE-2024-50055} - net: tun: Fix use-after-free in tun_detach() {CVE-2022-49014} - memcg: fix possible use-after-free in memcg_write_event_control() {CVE-2022-48988} - ppp: fix ppp_async_encode() illegal access {CVE-2024-50035} - drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error {CVE-2024-47698} - hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails {CVE-2022-49029} - tipc: guard against string buffer overrun {CVE-2024-49995} - ext4: fix double brelse() the buffer of the extents path {CVE-2024-49882} - ACPI: sysfs: validate return type of _STR method {CVE-2024-49860} - ext4: aovid use-after-free in ext4_ext_insert_extent() {CVE-2024-49883} - ext4: no need to continue when the number of entries is 1 {CVE-2024-49967} - padata: Fix possible divide-by-0 panic in padata_mt_helper() {CVE-2024-43889} - hwmon: (coretemp) Check for null before removing sysfs attrs {CVE-2022-49010} - drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error {CVE-2024-47697} - wifi: ath11k: fix array out-of-bound access in SoC stats {CVE-2024-49930} - ipv6: avoid use-after-free in ip6_fragment() {CVE-2022-48956} - netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() {CVE-2024-47685} - drm/i915/gt: Fix potential UAF by revoke of fence registers {CVE-2024-41092} - slip: make slhc_remember() more robust against malicious packets {CVE-2024-50033} - drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer {CVE-2024-49991} - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux {CVE-2024-50073} - ext4: fix timer use-after-free on failed mount {CVE-2024-49960} - ext4: avoid use-after-free in ext4_ext_show_leaf() {CVE-2024-49889} - mm: call the security_mmap_file() LSM hook in remap_file_pages() {CVE-2024-47745} - firmware_loader: Block path traversal {CVE-2024-47742} - ext4: avoid OOB when system.data xattr changes underneath the filesystem {CVE-2024-47701} - tcp: drop the hash_32() part from the index calculation {CVE-2022-1012} - tcp: increase source port perturb table to 2^16 {CVE-2022-1012} - tcp: dynamically allocate the perturb table used by source ports {CVE-2022-1012} - net: dccp: fix kernel crash on module load {CVE-2022-1012} - net: dccp: initialize (addr,port) listening hashtable {CVE-2022-1012} - tcp: add small random increments to the source port {CVE-2022-1012} - tcp: resalt the secret every 10 seconds {CVE-2022-1012} - tcp: use different parts of the port_offset for index and offset {CVE-2022-1012} - secure_seq: use the 64 bits of the siphash for port offset calculation {CVE-2022-1012} - Revert "[ELSCVE-6395] secure_seq: use the 64 bits of the siphash for port offset calculation" {CVE-2022-1012} - tcp: add some entropy in __inet_hash_connect() {CVE-2022-1012} - tcp: change source port randomizarion at connect() time {CVE-2022-1012} - esp: limit skb_page_frag_refill use to a single page {CVE-2022-27666} - drm/vmwgfx: Fix stale file descriptors on failed usercopy {CVE-2022-22942} - PM-runtime: add tracepoints for usage_count changes {CVE-2022-0330} - fget: clarify and improve __fget_files() implementation {CVE-2021-4083} - proc/fd: In proc_fd_link use fget_task {CVE-2021-4083} - kcmp: In kcmp_epoll_target use fget_task {CVE-2021-4083} - file: Rename __fcheck_files to files_lookup_fd_raw {CVE-2021-4083} - fget: check that the fd still exists after getting a ref to it {CVE-2021-4083} - Revert "[ELSCVE-2732] fget: check that the fd still exists after getting a ref to it" {CVE-2021-4083} - file: Replace fcheck_files with files_lookup_fd_rcu {CVE-2021-4083} - file: Factor files_lookup_fd_locked out of fcheck_files {CVE-2021-4083}
Updated packages:
  • bpftool-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:d9d5a4bcfee5ce88010bd5857d4ff726c96868983bf67cc69bf61960924a4894
  • kernel-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:81c3026c49a28124aabf5856ce3f244ae441c7b3d45a6cb70eac3692dbfdccb4
  • kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:8d419610b320b94320b8622eb6e6319102a4ebe9471d47c60d226cc1f26e933e
  • kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:85c481ed6623ea2572ef7bc63c231d1156ac09756d4ef9963bbd9ac7d3045e28
  • kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:98beeee03f722a2003aa7b708b1f4f6d4e833f6dac69d27c69d38c146b78c526
  • kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:01bedb0b36f66b56d70f66ac5a2e345397fe2857c4ac476f86a5f83af037c914
  • kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:61b2369d464c7c6eda2c1595bb1b461437a13177402a94277bf898a857b2b13f
  • kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:51062f8671e007d3249de00cec47f0a33567f67a4a28c113e0b725637f628fee
  • kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:3e788b6b19cee59730e5cc9aa0e17bc8f6af0adb7f1ffa27de13443dbd1ddd8b
  • kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:e3e027dde252f91ac410a85f86321b07fd37940fc485ea2e52f5f9d9408f11a8
  • kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:798933e45a1ee585754174b943da143ad53ae30be7577e8e2a8e4c5fc5f4d690
  • kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:351cbe043274c0ceac5f9d6a6d50189d9847b4e87f4cc982b94fde035d95a71d
  • kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:a907577a53a86261c72733b0bd68f721a71b89c342babe0d159899c199952314
  • kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:7ebdf832711fe1ffd95499665fa11effb15cbcb49970f72a43745edfaa9d3c04
  • kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:6cd87d101b7954ffa38aecc6722b21cb09eeb1a6df3d9638ea68deb88ff70797
  • kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:87a637007c475eee8aa7abd3bf58ad1d28def7580e7213bd1b59a97e8b816e6d
  • kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:aa076c842d65166b13c673064075b51134c4611b9495a55a23c1c45162ea28d6
  • kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:6a5eb615e0a46d4664f785c7568a67a555a0309777bccffcf5425644c6de0ed1
  • kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:9162ee00290219e672765cce8b4dadc15f8df17bae84d0a38226f264d266e4d0
  • kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:3efc49b933e53e01b180b66ae2a91082cf1ec48c173622f5de55b22496b78d9f
  • perf-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:d92c9a62c78b9af7fe2ae8d741941ac6614f0aa8b637b7e4c5a8309ca0f0ccc6
  • python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els22.x86_64.rpm
    sha:7870d31b8b36f5304f73f03a6f2e3d97e2379323acaebb569181314fed44622c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.