Description:
- xen/xenbus: don't let xenbus_grant_ring() remove grants in error case {CVE-2022-23040}
- xen/xenbus: Fix granting of vmalloc'd memory
- xen/blkfront: don't use gnttab_query_foreign_access() for mapped status {CVE-2022-23036}
- xen/grant-table: add gnttab_try_end_foreign_access() {CVE-2022-23036}
- xen/blkfront: don't trust the backend response data blindly
- xen/blkfront: don't take local copy of a request from the ring page
- xen/blkfront: read response from backend only once
- net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128}
- net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128}
- net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128}
- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 {CVE-2022-45919}
- media: dvb-core: Fix use-after-free due on race condition at dvb_net {CVE-2022-45886}
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567}
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283}
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() {CVE-2023-4387}
- tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() {CVE-2022-1462}
- tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
- mmu_gather: Force tlb-flush VM_PFNMAP vmas {CVE-2022-39188}
- net/sched: cls_u32: Fix reference counter leak leading to overflow {CVE-2023-3609}
- netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3117}
- relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268}
- xfs: verify buffer contents when we skip log replay {CVE-2023-2124}
- netfilter: nf_tables: stricter validation of element data {CVE-2022-34918}
- tpm: fix reference counting for struct tpm_chip {CVE-2022-2977}
- drm/virtio: Fix compile warnings (ents/nents) {CVE-2023-22998}
- drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling {CVE-2023-22998}
- drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init {CVE-2023-22998}
- gfs2: Don't deref jdesc in evict {CVE-2023-3212}
- drm/i915/gvt: fix double free bug in split_2MB_gtt_entry {CVE-2022-3707}
- drm/amdkfd: Check for null pointer after calling kmemdup {CVE-2022-3108}
- hv_netvsc: Add check for kvmalloc_array {CVE-2022-3107}
- sfc_ef100: potential dereference of null pointer {CVE-2022-3106}
- RDMA/uverbs: Check for null return of kmalloc_array {CVE-2022-3105}
- drm: use the lookup lock in drm_is_current_master {CVE-2022-1280}
- drm: add a locked version of drm_is_current_master {CVE-2022-1280}
- drm: serialize drm_file.master with a new spinlock {CVE-2022-1280}
- drm/vmwgfx: fix potential UAF in vmwgfx_surface.c {CVE-2022-1280}
- drm: protect drm_master pointers in drm_lease.c {CVE-2022-1280}
Updated packages:
-
bpftool-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:b0fb03be67d6ba54dfa3543f72f76424a8f8f833
-
kernel-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:3da202a6e23e090ffd1ce339b32f5b7c169e2905
-
kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:d4871e7849d5eeb28aa9ed5b9703e7a4cbf5a6c4
-
kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:4466e80dc3d6d4fec1c422a257c78620e0253ac4
-
kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:4662fa65395b72a3a7aec6bf721a6c15ae8da929
-
kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:dc70d8166a4317720ff5164dceeb286ec381a2cc
-
kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:7e1131871a9b0c394d583e8dfd609e19dd2c1b49
-
kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:3d5e07b35ed2fed724f7e0661b6cde6e8723843e
-
kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:5a1bf64b35714e8c85fda068a184e0fa8d0c2bdb
-
kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:d6f340f323b694911c58f595a6eb24ad9cfd0ac0
-
kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:e09e3e5418baf269d22a9b1b9e45a9a3e24cd828
-
kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:2d23385d9e10b6dc749e5dfdfd25e7ce8a344218
-
kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:71fbd5b27eb9c798aec2d8b609490b349df41619
-
kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:c70efd31768b52cce7b790596811584b38eb61dc
-
kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:7b12a5d0dfb8c56a74e83ddf87c440ff89293b32
-
kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:2056dc12757e2c0f451404d904f9608c0f594747
-
kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:78c02725767eb68c488f7bb6e738fef68dfeceda
-
kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:6ffb74675858104ef62417f349de46dad450f530
-
kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:30eee8fb1ba730a724486bdb2cc514a1e9b37f2c
-
kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:8708b7c7c60ece3d3c601e23d96c636cda88b68d
-
perf-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:d48193326857c97b7fbe28fc644d3a1890d8e012
-
python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els11.x86_64.rpm
sha:eab1b862a4231e4a3a28f0b55457a4c8bb895bd7
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.