Advisory: CLSA-2025:1739525795
OS: CentOS 8.5 ELS
Public date: 2025-02-14 04:36:37
Project: kernel
Version: 4.18.0-348.7.1.el8_5.tuxcare.els25
Errata link: https://errata.tuxcare.com/els_os/centos8.5els/CLSA-2025-1739525795.html
- media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format {CVE-2024-53104} - wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() {CVE-2024-53156} - xsk: fix OOB map writes when deleting elements {CVE-2024-56614} - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer {CVE-2024-53103} - net: inet: do not leave a dangling sk pointer in inet_create() {CVE-2024-56601} - scsi: sg: Fix slab-use-after-free read in sg_release() {CVE-2024-56631} - scsi: sg: Enable runtime power management {CVE-2024-56631} - scsi: sg: Avoid race in error handling & drop bogus warn {CVE-2024-56631} - scsi: sg: Avoid sg device teardown race {CVE-2024-56631} - initramfs: avoid filename buffer overrun {CVE-2024-53142} - Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() {CVE-2024-56604} - cifs: Fix use-after-free in rdata->read_into_pages() {CVE-2023-52741} - Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() {CVE-2024-56605} - af_packet: avoid erroring out after sock_init_data() in packet_create() {CVE-2024-56606} - net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() {CVE-2024-56602} - net: inet6: do not leave a dangling sk pointer in inet6_create() {CVE-2024-56600} - NFSv4.0: Fix a use-after-free problem in the asynchronous open() {CVE-2024-53173} - net: af_can: do not leave a dangling sk pointer in can_create() {CVE-2024-56603} - drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 {CVE-2023-52818} - rds: tcp: Fix use-after-free of net in reqsk_timer_handler(). {CVE-2024-26865} - tcp: Save unnecessary inet_twsk_purge() calls. {CVE-2024-26865} - ceph: prevent use-after-free in encode_cap_msg() {CVE-2024-26689} - drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' {CVE-2024-56608} - bpf: Check validity of link->type in bpf_link_show_fdinfo() {CVE-2024-53099} - drm/amd/pm: fix a double-free in si_dpm_init {CVE-2023-52691} - netfilter: ipset: add missing range check in bitmap_ip_uadt {CVE-2024-53141} - tipc: fix NULL deref in cleanup_bearer() {CVE-2024-56661} - tipc: Fix use-after-free of kernel socket in cleanup_bearer(). {CVE-2024-56642}
Update command: dnf update kernel*
bpftool-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm perf-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els25.x86_64.rpm