Release info for CLSA-2024:1727815919
kernel: Fix of 75 CVEs
Published on Oct 01, 2024
Details
High- Advisory
- CLSA-2024:1727815919
- Operating system
- CentOS Stream 8 ELS
- Published date
- 2024-10-01
- Component
- kernel
- Type
- security
Packages list
bpftool-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-core-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-cross-headers-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-debug-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-debug-core-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-debug-devel-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-debug-modules-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-debug-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-debug-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-devel-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-headers-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-ipaclones-internal-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-modules-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-selftests-internal-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-tools-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-tools-libs-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
kernel-tools-libs-devel-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
perf-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
python3-perf-4.18.0-553.6.1.el8_10.tuxcare.els3.x86_64.rpm
CVEs
- CVE-2021-47097
- CVE-2021-47287
- CVE-2021-47289
- CVE-2021-47321
- CVE-2021-47338
- CVE-2021-47352
- CVE-2021-47383
- CVE-2021-47384
- CVE-2021-47385
- CVE-2021-47386
- CVE-2021-47393
- CVE-2021-47441
- CVE-2021-47497
- CVE-2021-47527
- CVE-2022-48619
- CVE-2022-48754
- CVE-2022-48760
- CVE-2022-48866
- CVE-2023-52470
- CVE-2023-52476
- CVE-2023-52478
- CVE-2023-52605
- CVE-2023-52683
- CVE-2023-52798
- CVE-2023-52800
- CVE-2023-52809
- CVE-2023-52840
- CVE-2023-52884
- CVE-2024-26614
- CVE-2024-26645
- CVE-2024-26649
- CVE-2024-26720
- CVE-2024-26846
- CVE-2024-26855
- CVE-2024-26880
- CVE-2024-26894
- CVE-2024-35884
- CVE-2024-35944
- CVE-2024-35962
- CVE-2024-35989
- CVE-2024-36919
- CVE-2024-36920
- CVE-2024-36922
- CVE-2024-36924
- CVE-2024-36952
- CVE-2024-37356
- CVE-2024-38558
- CVE-2024-38559
- CVE-2024-38579
- CVE-2024-38601
- CVE-2024-39499
- CVE-2024-39506
- CVE-2024-40901
- CVE-2024-40904
- CVE-2024-40911
- CVE-2024-40912
- CVE-2024-40929
- CVE-2024-40941
- CVE-2024-40954
- CVE-2024-40959
- CVE-2024-40960
- CVE-2024-40988
- CVE-2024-41005
- CVE-2024-41014
- CVE-2024-41035
- CVE-2024-41038
- CVE-2024-41040
- CVE-2024-41056
- CVE-2024-41096
- CVE-2024-42084
- CVE-2024-42124
- CVE-2024-42148
- CVE-2024-42238
- CVE-2024-43900
- CVE-2024-44940