-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2023-ee241dcf80 2023-08-14 01:32:58.116348 --------------------------------------------------------------------------------
Name : kernel Product : Fedora 38 Version : 6.4.10 Release : 200.fc38 URL : https://www.kernel.org/ Summary : The Linux kernel Description : The kernel meta package
-------------------------------------------------------------------------------- Update Information:
The 6.4.10 stable kernel update contains a number of important fixes across the tree. -------------------------------------------------------------------------------- ChangeLog:
* Fri Aug 11 2023 Justin M. Forbes jforbes@fedoraproject.org [6.4.10-0] - More security bug fixes for 6.4.10 (Justin M. Forbes) - KVM: SEV: remove ghcb variable declarations (Paolo Bonzini) - KVM: SEV: only access GHCB fields once (Paolo Bonzini) - KVM: SEV: snapshot the GHCB before accessing it (Paolo Bonzini) - Add another bug fixed by the 6.4.10 release (Justin M. Forbes) - drm/amd/display: Fix a regression on Polaris cards (Mario Limonciello) - redhat/configs: Remove `CONFIG_HZ_1000 is not set` for aarch64 (Enric Balletbo i Serra) - Add new CVEs fixed in 6.4.9 to BugsFixed (Justin M. Forbes) - Linux v6.4.10 -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2213802 - CVE-2023-4155 kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=2213802 [ 2 ] Bug #2221609 - CVE-2023-4273 kernel: exFAT: stack overflow in exfat_get_uniname_from_ext_entry https://bugzilla.redhat.com/show_bug.cgi?id=2221609 [ 3 ] Bug #2225511 - CVE-2023-4128 Kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route https://bugzilla.redhat.com/show_bug.cgi?id=2225511 [ 4 ] Bug #2229498 - CVE-2023-4194 kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid https://bugzilla.redhat.com/show_bug.cgi?id=2229498 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-ee241dcf80' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------
package-announce@lists.fedoraproject.org