[SECURITY] Fedora 38 Update: kernel-6.4.10-200.fc38

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-ee241dcf80
2023-08-14 01:32:58.116348
--------------------------------------------------------------------------------

Name        : kernel
Product     : Fedora 38
Version     : 6.4.10
Release     : 200.fc38
URL         : https://www.kernel.org/
Summary     : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------
Update Information:

The 6.4.10 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Fri Aug 11 2023 Justin M. Forbes <jforbes@xxxxxxxxxxxxxxxxx> [6.4.10-0]
- More security bug fixes for 6.4.10 (Justin M. Forbes)
- KVM: SEV: remove ghcb variable declarations (Paolo Bonzini)
- KVM: SEV: only access GHCB fields once (Paolo Bonzini)
- KVM: SEV: snapshot the GHCB before accessing it (Paolo Bonzini)
- Add another bug fixed by the 6.4.10 release (Justin M. Forbes)
- drm/amd/display: Fix a regression on Polaris cards (Mario Limonciello)
- redhat/configs: Remove `CONFIG_HZ_1000 is not set` for aarch64 (Enric Balletbo i Serra)
- Add new CVEs fixed in 6.4.9 to BugsFixed (Justin M. Forbes)
- Linux v6.4.10
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2213802 - CVE-2023-4155 kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=2213802
  [ 2 ] Bug #2221609 - CVE-2023-4273 kernel: exFAT: stack overflow in exfat_get_uniname_from_ext_entry
        https://bugzilla.redhat.com/show_bug.cgi?id=2221609
  [ 3 ] Bug #2225511 - CVE-2023-4128 Kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
        https://bugzilla.redhat.com/show_bug.cgi?id=2225511
  [ 4 ] Bug #2229498 - CVE-2023-4194 kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid
        https://bugzilla.redhat.com/show_bug.cgi?id=2229498
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-ee241dcf80' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Users]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]

  Powered by Linux