Release Info

Advisory: CLSA-2025:1738671431

OS: AlmaLinux 9.2 ESU

Public date: 2025-02-04 07:17:13

Project: kernel

Version: 7.0.0-284.30.1.el9_2.tuxcare.els10

Errata link: https://errata.tuxcare.com/almalinux9.2-esu/CLSA-2025-1738671431.html

Changelog

- smb: client: fix use-after-free of signing key {CVE-2024-53179} - smb: client: stop flooding dmesg in smb2_calc_signature() {CVE-2024-53179} - smb3: fix oops in calculating shash_setkey {CVE-2024-53179} - cifs: return correct error in ->calc_signature() {CVE-2024-53179} - cifs: secmech: use shash_desc directly, remove sdesc {CVE-2024-53179} - cifs: replace kfree() with kfree_sensitive() for sensitive data {CVE-2024-53179} - xsk: fix OOB map writes when deleting elements {CVE-2024-56614} - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer {CVE-2024-53103} - scsi: sg: Fix slab-use-after-free read in sg_release() {CVE-2024-56631} - EDAC/igen6: Avoid segmentation fault on module unload {CVE-2024-56708} - acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl {CVE-2024-56662} - net: inet: do not leave a dangling sk pointer in inet_create() {CVE-2024-56601} - initramfs: avoid filename buffer overrun {CVE-2024-53142} - ALSA: usb-audio: Fix out of bounds reads when finding clock sources {CVE-2024-53150} - Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() {CVE-2024-56604} - wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() {CVE-2024-53156} - Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() {CVE-2024-56605} - Bluetooth: msft: fix slab-use-after-free in msft_do_close() {CVE-2024-36012} - Bluetooth: Fix support for Read Local Supported Codecs V2 {CVE-2024-36012} - Bluetooth: hci_codec: Fix leaking content of local_codecs {CVE-2024-36012} - blk-cgroup: Fix UAF in blkcg_unpin_online() {CVE-2024-56672} - net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() {CVE-2024-56602} - net: inet6: do not leave a dangling sk pointer in inet6_create() {CVE-2024-56600} - NFSv4.0: Fix a use-after-free problem in the asynchronous open() {CVE-2024-53173} - net: af_can: do not leave a dangling sk pointer in can_create() {CVE-2024-56603} - drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 {CVE-2023-52818} - bpf, sockmap: Fix race between element replace and close() {CVE-2024-56664} - ceph: prevent use-after-free in encode_cap_msg() {CVE-2024-26689} - drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' {CVE-2024-56608} - netfilter: ipset: add missing range check in bitmap_ip_uadt {CVE-2024-53141} - HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit {CVE-2023-52519} - tipc: Fix use-after-free of kernel socket in cleanup_bearer(). {CVE-2024-56642} - cifs: Fix buffer overflow when parsing NFS reparse points {CVE-2024-49996} - Input: powermate - fix use-after-free in powermate_config_complete {CVE-2023-52475} - PM / devfreq: Fix buffer overflow in trans_stat_show {CVE-2023-52614} - PM / devfreq: Rework freq_table to be local to devfreq struct {CVE-2023-52614} - cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() {CVE-2024-41057} - cachefiles: fix slab-use-after-free in fscache_withdraw_volume() {CVE-2024-41058} - [ELSCVE-37480] netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() {CVE-2024-41058} - memcg: fix possible use-after-free in memcg_write_event_control() {CVE-2022-48988} - Bluetooth: ISO: Fix UAF on iso_sock_timeout {CVE-2024-50124} - Bluetooth: SCO: Fix UAF on sco_sock_timeout {CVE-2024-50125} - Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout {CVE-2024-50125} - Bluetooth: Consolidate code around sk_alloc into a helper function {CVE-2024-50125} - smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() {CVE-2024-35861} - gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() {CVE-2024-26754} - smb: client: fix potential UAF in cifs_stats_proc_write() {CVE-2024-35868} - smb: client: fix potential UAF in cifs_debug_files_proc_show() {CVE-2024-35868} - vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans {CVE-2024-50264} - net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT {CVE-2024-53057} - wifi: iwlwifi: mvm: Fix a memory corruption issue {CVE-2023-52531} - x86/alternatives: Disable KASAN in apply_alternatives() {CVE-2023-52504} - bpf: Fix out-of-bounds write in trie_get_next_key() {CVE-2024-50262} - KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory {CVE-2024-50115} - media: edia: dvbdev: fix a use-after-free {CVE-2024-27043} - media: dvb-core: Fix use-after-free due to race at dvb_register_device() {CVE-2024-27043} - media: dvbdev: fix build warning due to comments {CVE-2024-27043} - media: dvbdev: adopts refcnt to avoid UAF {CVE-2024-27043} - spec: '--with lts' to create packages with '-lts' suffix ('kernel-lts')

Update

Update command: dnf update kernel*

Packages list

bpftool-7.0.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-abi-stablelists-5.14.0-284.30.1.el9_2.tuxcare.els10.noarch.rpm kernel-core-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-cross-headers-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-debug-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-debug-core-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-debug-devel-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-debug-modules-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-debug-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-debug-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-debug-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-devel-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-devel-matched-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-doc-5.14.0-284.30.1.el9_2.tuxcare.els10.noarch.rpm kernel-headers-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-ipaclones-internal-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-modules-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-modules-core-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-modules-extra-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-modules-internal-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-modules-partner-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-selftests-internal-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-tools-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-tools-libs-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm kernel-uki-virt-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm perf-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm python3-perf-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm rtla-5.14.0-284.30.1.el9_2.tuxcare.els10.x86_64.rpm

CVEs

CVE-2024-56631
CVE-2024-56601
CVE-2024-56602
CVE-2024-56600
CVE-2024-56603
CVE-2024-53057
CVE-2024-50262
CVE-2024-50115
CVE-2023-52614
CVE-2024-56614
CVE-2024-56672
CVE-2024-35868
CVE-2023-52531
CVE-2024-56664
CVE-2024-56605
CVE-2024-53142
CVE-2024-53179
CVE-2024-56604
CVE-2024-27043
CVE-2023-52818
CVE-2024-35861
CVE-2024-53103
CVE-2024-26754
CVE-2024-50125
CVE-2023-52519
CVE-2024-41058
CVE-2024-41057
CVE-2024-49996
CVE-2024-56642
CVE-2024-26689
CVE-2024-53141
CVE-2024-36012
CVE-2024-53173
CVE-2024-56708
CVE-2024-56662
CVE-2024-53156
CVE-2024-53150
CVE-2024-50124
CVE-2023-52504
CVE-2024-50264
CVE-2022-48988
CVE-2024-56608
CVE-2023-52475