[CLSA-2024:1707478721] kernel: Fix of 11 CVEs
Type:
security
Severity:
Important
Release date:
2024-02-09 11:38:47 UTC
Description:
- netfilter: nf_tables: reject QUEUE/DROP verdict parameters {CVE-2024-1086} - RDMA/core: Refactor rdma_bind_addr {CVE-2023-2176} - RDMA/cma: Do not change route.addr.src_addr outside state checks - RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests - drm/amdgpu: Fix potential fence use-after-free v2 {CVE-2023-51042} - drm/atomic: Fix potential use-after-free in nonblocking commits {CVE-2023-51043} - ext4: improve error recovery code paths in __ext4_remount() {CVE-2024-0775} - net: tls, update curr on splice as well {CVE-2024-0646} - writeback: avoid use-after-free after removing device {CVE-2024-0562} - smb: client: fix OOB in receive_encrypted_standard() {CVE-2024-0565} - netfilter: nf_tables: Reject tables of unsupported family {CVE-2023-6040} - ida: Fix crash in ida_free when the bitmap is empty {CVE-2023-6915} - atm: Fix Use-After-Free in do_vcc_ioctl {CVE-2023-51780}
Updated packages:
  • bpftool-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:af2e8a1ef4d9da0aef13aa7554f8e57faec01e2e
  • kernel-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:f20ca560387f8df0143b64b900a8c0cc9b3db4bf
  • kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:fad6fc3beb9407cc4920c130bc0c8d57e9817bc4
  • kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:b2316ed880ba6f08340963fb49c25e7530b87fa1
  • kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:ad43829df61a50c33cb5277005512fe54bc48b1e
  • kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:bc55ed35b09fef8f3d999b3bd628ec670960a078
  • kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:bfb71656ac79a9f137e406f72922ba4fe9bb8a36
  • kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:ac85f36b748cc200e8ca2cb4da1ae59419dd1124
  • kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:641470d0170c907b561bc85f625ec68289300d12
  • kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:81320c7de23d5ca672fbe226b6746c68b8bcbf24
  • kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:cdaf31399f99c65728351ad68a0e84851e2c8eaf
  • kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:32372907dac19ddcf683bcb50f59985a182313ca
  • kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:f721cc16253aca2186205de7aee1f53ddb64f649
  • kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:cf66defbf4eab912a64681ab90192f4760d3c7c8
  • kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:85d172cd6e07302873173bfd6e8b5623f4e53645
  • kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:266eec3154517fc750222045dd7fdc47a8a70fe1
  • kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:726614c20c3f654163b860381098046e0fa1df54
  • kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:ca91a416bd74b9b19f416b1d15c0268c3c0dda4e
  • kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:ff76b63ed5a1886abe28ad18daa5ad8fcaac429b
  • kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:96b733d52dfec123c6a142442113e4f7a8c926c9
  • perf-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:bb17851b38abfa9e34485d71208f0ea971f6ffb2
  • python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els14.x86_64.rpm
    sha:74353d050050317e5e662923aefa50c3736f3ed0
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.