[CLSA-2023:1690287378] kernel: Fix of 28 CVEs
Type:
security
Severity:
Important
Release date:
2023-07-25
Description:
- ALSA: pcm: Fix races among concurrent prealloc proc writes {CVE-2022-1048} - ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls {CVE-2022-1048} - ALSA: pcm: Fix races among concurrent read/write and buffer changes {CVE-2022-1048} - ALSA: pcm: Fix races among concurrent hw_params and hw_free calls {CVE-2022-1048} - x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit {CVE-2022-25265} - x86/elf: Split READ_IMPLIES_EXEC from executable PT_GNU_STACK {CVE-2022-25265} - x86/elf: Add table to document READ_IMPLIES_EXEC {CVE-2022-25265} - drm/i915: fix TLB invalidation for Gen12 video and compute engines {CVE-2022-4139} - drm/i915: Flush TLBs before releasing backing store {CVE-2022-0330} - xfs: fix up non-directory creation in SGID directories {CVE-2021-4037} - tcp: Fix data races around icsk->icsk_af_ops. {CVE-2022-3566} - ipv6: Fix data races around sk->sk_prot. {CVE-2022-3567} - ipv6: annotate some data-races around sk->sk_prot {CVE-2022-3567} - ipv6: use indirect call wrappers for {tcp, udpv6}_{recv, send}msg() {CVE-2022-3567} - netfilter: nf_tables: deactivate anonymous set from preparation phase {CVE-2023-32233} - netfilter: nf_tables: bogus EBUSY when deleting set after flush - media: dmxdev: fix UAF when dvb_register_device() fails {CVE-2022-41218} - l2tp: Don't sleep and disable BH under writer-side sk_callback_lock {CVE-2022-4129} - l2tp: Serialize access to sk_user_data with sk_callback_lock {CVE-2022-4129} - net: fix a concurrency bug in l2tp_tunnel_register() {CVE-2022-4129} - Bluetooth: L2CAP: Fix memory leak in vhci_write {CVE-2022-3619} - Bluetooth: L2CAP: Fix handling fragmented length - wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker() {CVE-2022-3628} - wifi: cfg80211: avoid nontransmitted BSS list corruption {CVE-2022-42721} - cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() - wifi: cfg80211: fix BSS refcounting bugs {CVE-2022-42720} - cfg80211: hold bss_lock while updating nontrans_list - ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF {CVE-2023-0266} - ALSA: control: Drop superfluous snd_power_wait() calls - ALSA: control: Track in-flight control read/write/tlv accesses - ALSA: control - introduce snd_ctl_notify_one() helper - Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu {CVE-2022-3564} - netfilter: nf_conntrack_irc: Tighten matching on DCC message {CVE-2022-2663} - netfilter: nf_conntrack_irc: Fix forged IP logic {CVE-2022-2663} - KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() {CVE-2022-2153} - KVM: Add infrastructure and macro to mark VM as bugged - KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID {CVE-2022-1789} - tcp/udp: Fix memory leak in ipv6_renew_options(). {CVE-2022-3524} - proc: proc_skip_spaces() shouldn't think it is working on C strings {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long {CVE-2022-4378} - wifi: mac80211: fix crash in beacon protection for P2P-device {CVE-2022-42722} - net: sched: cbq: dont intepret cls results when asked to drop {CVE-2023-23454} - ipv6: raw: Deduct extension header length in rawv6_push_pending_frames {CVE-2023-0394} - net: sched: disallow noqueue for qdisc classes {CVE-2022-47929} - wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() {CVE-2022-41674} - af_key: Do not call xfrm_probe_algs in parallel {CVE-2022-3028} - dm verity: set DM_TARGET_IMMUTABLE feature flag {CVE-2022-20572}
Updated packages:
  • bpftool-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:090a836173dfe28f3ea5fe5c2bc38ec05c16d860
  • kernel-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:a4976b053c04ed676cf072ee04c95f6fd9072316
  • kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:52b8bb0cdb3b430f67eb869342b5cdca1182d422
  • kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:cb9aae31127cf3f212b8977fc63d451a5e153d5b
  • kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:8f1917624d82936ff9dc7394520a66be19f47655
  • kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:d4fd7573fb8e76120e36024622dffcd8b2c98b0c
  • kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:9c31fda2967e6302a560308a1dae42a552001e54
  • kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:2c63258fb955541f505cebaae661bae2a042e3da
  • kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:27fff0d33b39f053ed7dcdbda68fb032540f4044
  • kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:99aeeaed1aa184f9b2a6829b69822d64f49ae17d
  • kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:2fd206d42ceea165ed26e93372b321079d1b6775
  • kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:58695a93b04f4cf9f586fc8478ad341052c1b06a
  • kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:959ec613238c19c11eb59036a22ed00ccc4bdd46
  • kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:4e8a90c984eec961a3077ed101b3abc274f3b7a4
  • kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:f950d8ebb7605a8c47509af19c4fe36e8d041045
  • kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:d769e7d13cef6c9962aa8345db0a8378959038a9
  • kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:98809a4a1417c78b8952e74675294d71e06572e0
  • kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:5fc2ce5b829a649627c0a0a2e62a2c025b36c1d7
  • kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:dcafb5670038aac09b791ca3078ec4e22e7b0288
  • kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:49118add222cf518ef77849f8d5ed0ff875bd73b
  • perf-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:bb40e0e0dba67b35d084d28453e0d92281804453
  • python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els9.x86_64.rpm
    sha:1381fcbb5eb915f4660bff838eed50661142e4a8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.