[CLSA-2023:1695715460] kernel: Fix of 24 CVEs
Type:
security
Severity:
Important
Release date:
2023-09-26
Description:
- xen/xenbus: don't let xenbus_grant_ring() remove grants in error case {CVE-2022-23040} - xen/xenbus: Fix granting of vmalloc'd memory - xen/blkfront: don't use gnttab_query_foreign_access() for mapped status {CVE-2022-23036} - xen/grant-table: add gnttab_try_end_foreign_access() {CVE-2022-23036} - xen/blkfront: don't trust the backend response data blindly - xen/blkfront: don't take local copy of a request from the ring page - xen/blkfront: read response from backend only once - net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128} - net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128} - net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128} - media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 {CVE-2022-45919} - media: dvb-core: Fix use-after-free due on race condition at dvb_net {CVE-2022-45886} - vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567} - Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283} - net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() {CVE-2023-4387} - tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() {CVE-2022-1462} - tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push() - mmu_gather: Force tlb-flush VM_PFNMAP vmas {CVE-2022-39188} - net/sched: cls_u32: Fix reference counter leak leading to overflow {CVE-2023-3609} - netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3117} - relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268} - xfs: verify buffer contents when we skip log replay {CVE-2023-2124} - netfilter: nf_tables: stricter validation of element data {CVE-2022-34918} - tpm: fix reference counting for struct tpm_chip {CVE-2022-2977} - drm/virtio: Fix compile warnings (ents/nents) {CVE-2023-22998} - drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling {CVE-2023-22998} - drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init {CVE-2023-22998} - gfs2: Don't deref jdesc in evict {CVE-2023-3212} - drm/i915/gvt: fix double free bug in split_2MB_gtt_entry {CVE-2022-3707} - drm/amdkfd: Check for null pointer after calling kmemdup {CVE-2022-3108} - hv_netvsc: Add check for kvmalloc_array {CVE-2022-3107} - sfc_ef100: potential dereference of null pointer {CVE-2022-3106} - RDMA/uverbs: Check for null return of kmalloc_array {CVE-2022-3105} - drm: use the lookup lock in drm_is_current_master {CVE-2022-1280} - drm: add a locked version of drm_is_current_master {CVE-2022-1280} - drm: serialize drm_file.master with a new spinlock {CVE-2022-1280} - drm/vmwgfx: fix potential UAF in vmwgfx_surface.c {CVE-2022-1280} - drm: protect drm_master pointers in drm_lease.c {CVE-2022-1280}
Updated packages:
  • bpftool-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:b0fb03be67d6ba54dfa3543f72f76424a8f8f833
  • kernel-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:3da202a6e23e090ffd1ce339b32f5b7c169e2905
  • kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:d4871e7849d5eeb28aa9ed5b9703e7a4cbf5a6c4
  • kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:4466e80dc3d6d4fec1c422a257c78620e0253ac4
  • kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:4662fa65395b72a3a7aec6bf721a6c15ae8da929
  • kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:dc70d8166a4317720ff5164dceeb286ec381a2cc
  • kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:7e1131871a9b0c394d583e8dfd609e19dd2c1b49
  • kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:3d5e07b35ed2fed724f7e0661b6cde6e8723843e
  • kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:5a1bf64b35714e8c85fda068a184e0fa8d0c2bdb
  • kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:d6f340f323b694911c58f595a6eb24ad9cfd0ac0
  • kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:e09e3e5418baf269d22a9b1b9e45a9a3e24cd828
  • kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:2d23385d9e10b6dc749e5dfdfd25e7ce8a344218
  • kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:71fbd5b27eb9c798aec2d8b609490b349df41619
  • kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:c70efd31768b52cce7b790596811584b38eb61dc
  • kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:7b12a5d0dfb8c56a74e83ddf87c440ff89293b32
  • kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:2056dc12757e2c0f451404d904f9608c0f594747
  • kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:78c02725767eb68c488f7bb6e738fef68dfeceda
  • kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:6ffb74675858104ef62417f349de46dad450f530
  • kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:30eee8fb1ba730a724486bdb2cc514a1e9b37f2c
  • kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:8708b7c7c60ece3d3c601e23d96c636cda88b68d
  • perf-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:d48193326857c97b7fbe28fc644d3a1890d8e012
  • python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
    sha:eab1b862a4231e4a3a28f0b55457a4c8bb895bd7
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.