[CLSA-2024:1705496067] kernel: Fix of 13 CVEs
Type:
security
Severity:
Important
Release date:
2024-01-17
Description:
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283} - ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932} - smb: client: fix OOB in smbCalcSize() {CVE-2023-6606} - net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623} - net/sched: cls_fw: Fix improper refcount update leads to use-after-free {CVE-2023-3776} - vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567} - relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268} - btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() {CVE-2023-3111} - xirc2ps_cs: Fix use after free bug in xirc2ps_detach {CVE-2023-1670} - Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934} - Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM {CVE-2022-42896} - tcp: Fix data races around icsk->icsk_af_ops. {CVE-2022-3566} - ipv6: use prandom_u32() for ID generation {CVE-2021-45485}
Updated packages:
  • kernel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:993cd2680069b6d7acd6bf5683b34d8ab1ec1c1c
  • kernel-debug-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:7222c86b98d5399cad2be1abac665030579de876
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els14.i686.rpm
    sha:0706195e979c9fa29746981fa9a3c320755a6261
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:21ef655a9b6ed744b6a04df82b0a94bf9948a09a
  • kernel-devel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:9cb2e6adec0dfde673f2a34732f1175cc4069e3d
  • kernel-headers-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:16f1268d73656703a2f0283e1fcc34c9b9e1d357
  • perf-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:f781b38161b3e42b35796fa3d6c398b00da73f26
  • python-perf-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
    sha:b7274f2f79e64a5000635bb4a3df0805351b731f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.