[CLSA-2023:1695716575] kernel: Fix of 25 CVEs
Type:
security
Severity:
Important
Release date:
2023-09-26
Description:
- xen/xenbus: don't let xenbus_grant_ring() remove grants in error case {CVE-2022-23040} - xen/xenbus: Fix granting of vmalloc'd memory - xen/blkfront: don't use gnttab_query_foreign_access() for mapped status {CVE-2022-23036} - xen/grant-table: add gnttab_try_end_foreign_access() {CVE-2022-23036} - xen/blkfront: don't trust the backend response data blindly - xen/blkfront: don't take local copy of a request from the ring page - xen/blkfront: read response from backend only once - net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128} - net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128} - net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128} - media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 {CVE-2022-45919} - media: dvb-core: Fix use-after-free due on race condition at dvb_net {CVE-2022-45886} - vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567} - Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283} - net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() {CVE-2023-4387} - tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() {CVE-2022-1462} - tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push() - mmu_gather: Force tlb-flush VM_PFNMAP vmas {CVE-2022-39188} - net/sched: cls_u32: Fix reference counter leak leading to overflow {CVE-2023-3609} - netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3117} - relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268} - xfs: verify buffer contents when we skip log replay {CVE-2023-2124} - netfilter: nf_tables: stricter validation of element data {CVE-2022-34918} - tpm: fix reference counting for struct tpm_chip {CVE-2022-2977} - drm/virtio: Fix compile warnings (ents/nents) {CVE-2023-22998} - drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling {CVE-2023-22998} - drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init {CVE-2023-22998} - gfs2: Don't deref jdesc in evict {CVE-2023-3212} - drm/i915/gvt: fix double free bug in split_2MB_gtt_entry {CVE-2022-3707} - drm/amdkfd: Check for null pointer after calling kmemdup {CVE-2022-3108} - hv_netvsc: Add check for kvmalloc_array {CVE-2022-3107} - sfc_ef100: potential dereference of null pointer {CVE-2022-3106} - RDMA/uverbs: Check for null return of kmalloc_array {CVE-2022-3105} - drm: use the lookup lock in drm_is_current_master {CVE-2022-1280} - drm: add a locked version of drm_is_current_master {CVE-2022-1280} - drm: serialize drm_file.master with a new spinlock {CVE-2022-1280} - drm/vmwgfx: fix potential UAF in vmwgfx_surface.c {CVE-2022-1280} - drm: protect drm_master pointers in drm_lease.c {CVE-2022-1280} - KVM: avoid NULL pointer dereference in kvm_dirty_ring_push {CVE-2022-1263}
Updated packages:
  • bpftool-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:731f2593c69ad4b2f2691bbf3d799f39805b043a
  • kernel-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:b93f21b10d5e40be4376c706b1745f21ff5253b5
  • kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:174213cda18a278fdc02a325ab7d7a33ab466b1a
  • kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:a95974e97c77a0d93e6cb87ac88cbd043381b959
  • kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:668f46ecb12946097db991e0d38ede71503ef78c
  • kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:dc94836821d5b4149892134fe87653c79efc31db
  • kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:13070ac45448492418331a99bfd7f7ee99e8ba9a
  • kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:8d31d5a3a7987d4469b6a69872ff7547cb70f9ea
  • kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:687c040001136216c9080e0b48eacf1026fccbb8
  • kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:1daa7cd545dff4c280b3923454272becbde15003
  • kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:aca5cfbfaa3241d3fcd863253dd542b9573792b3
  • kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:4a53b01da78b02c76159d8dc5313bfedc16164ee
  • kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:d5bbe953bb4816de55b9755bc76085170fd19e27
  • kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:937150ba23609d23e29318db3e97a4510eef374b
  • kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:6d3a86539f9d968abc639aa8e0d18c6f6896e8a6
  • kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:1ed14e3ff8e0af5f08605d8eedbf0d107b64ec54
  • kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:7ab13208afc42154e6ca2fb680a889f76de0c297
  • kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:3c07a84ff21fc3940bec87cec053912303548d32
  • kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:0161ed8fe0c5c765c0553311692b2b97cfc2d311
  • kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:46793a87df3e1ada6496582fba31b43a2a920d9e
  • perf-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:e03549e340e2141d03d14ce50882f1021a0c4a64
  • python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
    sha:488588981c42a7fb1dbcaa8176dd729633987bb6
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.