Release Info

Advisory: CLSA-2024:1731430561

OS: CentOS 8.4 ELS

Public date: 2024-11-12 11:56:03

Project: kernel

Version: 4.18.0-305.25.1.el8_4.tuxcare.els22

Errata link: https://errata.tuxcare.com/els_os/centos8.4els/CLSA-2024-1731430561.html

Changelog

- driver core: bus: Fix double free in driver API bus_register() {CVE-2024-50055} - net: tun: Fix use-after-free in tun_detach() {CVE-2022-49014} - memcg: fix possible use-after-free in memcg_write_event_control() {CVE-2022-48988} - ppp: fix ppp_async_encode() illegal access {CVE-2024-50035} - drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error {CVE-2024-47698} - hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails {CVE-2022-49029} - tipc: guard against string buffer overrun {CVE-2024-49995} - ext4: fix double brelse() the buffer of the extents path {CVE-2024-49882} - ACPI: sysfs: validate return type of _STR method {CVE-2024-49860} - ext4: aovid use-after-free in ext4_ext_insert_extent() {CVE-2024-49883} - ext4: no need to continue when the number of entries is 1 {CVE-2024-49967} - padata: Fix possible divide-by-0 panic in padata_mt_helper() {CVE-2024-43889} - hwmon: (coretemp) Check for null before removing sysfs attrs {CVE-2022-49010} - drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error {CVE-2024-47697} - wifi: ath11k: fix array out-of-bound access in SoC stats {CVE-2024-49930} - ipv6: avoid use-after-free in ip6_fragment() {CVE-2022-48956} - netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() {CVE-2024-47685} - drm/i915/gt: Fix potential UAF by revoke of fence registers {CVE-2024-41092} - slip: make slhc_remember() more robust against malicious packets {CVE-2024-50033} - drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer {CVE-2024-49991} - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux {CVE-2024-50073} - ext4: fix timer use-after-free on failed mount {CVE-2024-49960} - ext4: avoid use-after-free in ext4_ext_show_leaf() {CVE-2024-49889} - mm: call the security_mmap_file() LSM hook in remap_file_pages() {CVE-2024-47745} - firmware_loader: Block path traversal {CVE-2024-47742} - ext4: avoid OOB when system.data xattr changes underneath the filesystem {CVE-2024-47701} - tcp: drop the hash_32() part from the index calculation {CVE-2022-1012} - tcp: increase source port perturb table to 2^16 {CVE-2022-1012} - tcp: dynamically allocate the perturb table used by source ports {CVE-2022-1012} - net: dccp: fix kernel crash on module load {CVE-2022-1012} - net: dccp: initialize (addr,port) listening hashtable {CVE-2022-1012} - tcp: add small random increments to the source port {CVE-2022-1012} - tcp: resalt the secret every 10 seconds {CVE-2022-1012} - tcp: use different parts of the port_offset for index and offset {CVE-2022-1012} - secure_seq: use the 64 bits of the siphash for port offset calculation {CVE-2022-1012} - Revert "[ELSCVE-6395] secure_seq: use the 64 bits of the siphash for port offset calculation" {CVE-2022-1012} - tcp: add some entropy in __inet_hash_connect() {CVE-2022-1012} - tcp: change source port randomizarion at connect() time {CVE-2022-1012} - esp: limit skb_page_frag_refill use to a single page {CVE-2022-27666} - drm/vmwgfx: Fix stale file descriptors on failed usercopy {CVE-2022-22942} - drm/i915: Fix the GT fence revocation runtime PM logic {CVE-2022-0330} - PM: runtime: Add pm_runtime_get_if_active() {CVE-2022-0330} - PM-runtime: add tracepoints for usage_count changes {CVE-2022-0330} - fget: clarify and improve __fget_files() implementation {CVE-2021-4083} - proc/fd: In proc_fd_link use fget_task {CVE-2021-4083} - kcmp: In kcmp_epoll_target use fget_task {CVE-2021-4083} - file: Rename __fcheck_files to files_lookup_fd_raw {CVE-2021-4083} - bpf: In bpf_task_fd_query use fget_task {CVE-2021-4083} - fget: check that the fd still exists after getting a ref to it {CVE-2021-4083} - Revert "[ELSCVE-2732] fget: check that the fd still exists after getting a ref to it" {CVE-2021-4083} - file: Replace fcheck_files with files_lookup_fd_rcu {CVE-2021-4083} - file: Factor files_lookup_fd_locked out of fcheck_files {CVE-2021-4083} - vfs, fdtable: Add fget_task helper {CVE-2021-4083}

Update

Update command: dnf update kernel*

Packages list

bpftool-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm perf-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els22.x86_64.rpm

CVEs

CVE-2024-47745
CVE-2022-22942
CVE-2022-0330
CVE-2024-49883
CVE-2022-48956
CVE-2024-49967
CVE-2024-41092
CVE-2024-49882
CVE-2024-49930
CVE-2024-47698
CVE-2024-49991
CVE-2024-43889
CVE-2024-49860
CVE-2024-47701
CVE-2022-49014
CVE-2024-47685
CVE-2024-50035
CVE-2024-49960
CVE-2021-4083
CVE-2024-49995
CVE-2024-50055
CVE-2022-1012
CVE-2022-27666
CVE-2024-49889
CVE-2024-47697
CVE-2022-49010
CVE-2024-50073
CVE-2024-47742
CVE-2024-50033
CVE-2022-48988
CVE-2022-49029