Advisory: CLSA-2023:1701963303
OS: CentOS 8.4 ELS
Public date: 2023-12-07 10:35:06
Project: kernel
Version: 4.18.0-305.25.1.el8_4.tuxcare.els12
Errata link: https://errata.tuxcare.com/els_os/centos8.4els/CLSA-2023-1701963303.html
- net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() {CVE-2023-6176} - wifi: mac80211: fix MBSSID parsing use-after-free {CVE-2022-42719} - mac80211: always allocate struct ieee802_11_elems {CVE-2022-42719} - x86/sev: Check for user-space IOIO pointing to kernel space {CVE-2023-46813} - x86/sev: Check IOBM for IOIO exceptions from user-space {CVE-2023-46813} - x86/sev: Disable MMIO emulation from user mode {CVE-2023-46813} - netfilter: nftables: exthdr: fix 4-byte stack OOB write {CVE-2023-4881} - net: sched: sch_qfq: Fix UAF in qfq_dequeue() {CVE-2023-4921} - netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c {CVE-2023-42753} - net/sched: cls_tcindex: downgrade to imperfect hash {CVE-2023-1829} - USB: ene_usb6250: Allocate enough memory for full object {CVE-2023-45862} - igb: set max size RX buffer when store bad packet is enabled {CVE-2023-45871} - net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623} - Fix double fget() in vhost_net_set_backend() {CVE-2023-1838} - nvmet-tcp: Fix a possible UAF in queue intialization setup {CVE-2023-5178} - drm/qxl: fix UAF on handle creation {CVE-2023-39198} - net: add kerneldoc comment for sk_peer_lock {CVE-2021-4203} - af_unix: fix races in sk_peer_pid and sk_peer_cred accesses {CVE-2021-4203} - block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern {CVE-2022-0494} - media: ov519: add missing endpoint sanity checks {CVE-2020-11608} - act_mirred: use the backlog for nested calls to mirred ingress {CVE-2022-4269} - net/sched: act_mirred: better wording on protection against excessive stack growth {CVE-2022-4269} - inet: use bigger hash table for IP ID generation {CVE-2021-45486} - net: revert "net: get rid of an signed integer overflow in ip_idents_reserve()" {CVE-2021-45486}
Update command: dnf update kernel*
bpftool-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm perf-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els12.x86_64.rpm