Description:
- xen/xenbus: don't let xenbus_grant_ring() remove grants in error case {CVE-2022-23040}
- xen/xenbus: Fix granting of vmalloc'd memory
- xen/blkfront: don't use gnttab_query_foreign_access() for mapped status {CVE-2022-23036}
- xen/grant-table: add gnttab_try_end_foreign_access() {CVE-2022-23036}
- xen/blkfront: don't trust the backend response data blindly
- xen/blkfront: don't take local copy of a request from the ring page
- xen/blkfront: read response from backend only once
- net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128}
- net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128}
- net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free {CVE-2023-4128}
- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 {CVE-2022-45919}
- media: dvb-core: Fix use-after-free due on race condition at dvb_net {CVE-2022-45886}
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567}
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283}
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() {CVE-2023-4387}
- tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() {CVE-2022-1462}
- tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
- mmu_gather: Force tlb-flush VM_PFNMAP vmas {CVE-2022-39188}
- net/sched: cls_u32: Fix reference counter leak leading to overflow {CVE-2023-3609}
- netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3117}
- relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268}
- xfs: verify buffer contents when we skip log replay {CVE-2023-2124}
- netfilter: nf_tables: stricter validation of element data {CVE-2022-34918}
- tpm: fix reference counting for struct tpm_chip {CVE-2022-2977}
- drm/virtio: Fix compile warnings (ents/nents) {CVE-2023-22998}
- drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling {CVE-2023-22998}
- drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init {CVE-2023-22998}
- gfs2: Don't deref jdesc in evict {CVE-2023-3212}
- drm/i915/gvt: fix double free bug in split_2MB_gtt_entry {CVE-2022-3707}
- drm/amdkfd: Check for null pointer after calling kmemdup {CVE-2022-3108}
- hv_netvsc: Add check for kvmalloc_array {CVE-2022-3107}
- sfc_ef100: potential dereference of null pointer {CVE-2022-3106}
- RDMA/uverbs: Check for null return of kmalloc_array {CVE-2022-3105}
- drm: use the lookup lock in drm_is_current_master {CVE-2022-1280}
- drm: add a locked version of drm_is_current_master {CVE-2022-1280}
- drm: serialize drm_file.master with a new spinlock {CVE-2022-1280}
- drm/vmwgfx: fix potential UAF in vmwgfx_surface.c {CVE-2022-1280}
- drm: protect drm_master pointers in drm_lease.c {CVE-2022-1280}
- KVM: avoid NULL pointer dereference in kvm_dirty_ring_push {CVE-2022-1263}
Updated packages:
-
bpftool-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:731f2593c69ad4b2f2691bbf3d799f39805b043a
-
kernel-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:b93f21b10d5e40be4376c706b1745f21ff5253b5
-
kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:174213cda18a278fdc02a325ab7d7a33ab466b1a
-
kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:a95974e97c77a0d93e6cb87ac88cbd043381b959
-
kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:668f46ecb12946097db991e0d38ede71503ef78c
-
kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:dc94836821d5b4149892134fe87653c79efc31db
-
kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:13070ac45448492418331a99bfd7f7ee99e8ba9a
-
kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:8d31d5a3a7987d4469b6a69872ff7547cb70f9ea
-
kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:687c040001136216c9080e0b48eacf1026fccbb8
-
kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:1daa7cd545dff4c280b3923454272becbde15003
-
kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:aca5cfbfaa3241d3fcd863253dd542b9573792b3
-
kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:4a53b01da78b02c76159d8dc5313bfedc16164ee
-
kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:d5bbe953bb4816de55b9755bc76085170fd19e27
-
kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:937150ba23609d23e29318db3e97a4510eef374b
-
kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:6d3a86539f9d968abc639aa8e0d18c6f6896e8a6
-
kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:1ed14e3ff8e0af5f08605d8eedbf0d107b64ec54
-
kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:7ab13208afc42154e6ca2fb680a889f76de0c297
-
kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:3c07a84ff21fc3940bec87cec053912303548d32
-
kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:0161ed8fe0c5c765c0553311692b2b97cfc2d311
-
kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:46793a87df3e1ada6496582fba31b43a2a920d9e
-
perf-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:e03549e340e2141d03d14ce50882f1021a0c4a64
-
python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els11.x86_64.rpm
sha:488588981c42a7fb1dbcaa8176dd729633987bb6
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.