Fedora Linux 8579 Published by

A kernel security update has been released for Fedora 37.



[SECURITY] Fedora 37 Update: kernel-6.4.10-100.fc37


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-d9509be489
2023-08-14 00:44:57.846913
--------------------------------------------------------------------------------

Name : kernel
Product : Fedora 37
Version : 6.4.10
Release : 100.fc37
URL : https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------
Update Information:

The 6.4.10 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Fri Aug 11 2023 Justin M. Forbes [jforbes@fedoraproject.org] [6.4.10-0]
- More security bug fixes for 6.4.10 (Justin M. Forbes)
- KVM: SEV: remove ghcb variable declarations (Paolo Bonzini)
- KVM: SEV: only access GHCB fields once (Paolo Bonzini)
- KVM: SEV: snapshot the GHCB before accessing it (Paolo Bonzini)
- Add another bug fixed by the 6.4.10 release (Justin M. Forbes)
- drm/amd/display: Fix a regression on Polaris cards (Mario Limonciello)
- redhat/configs: Remove `CONFIG_HZ_1000 is not set` for aarch64 (Enric Balletbo i Serra)
- Add new CVEs fixed in 6.4.9 to BugsFixed (Justin M. Forbes)
- Linux v6.4.10
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2213802 - CVE-2023-4155 kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=2213802
[ 2 ] Bug #2221609 - CVE-2023-4273 kernel: exFAT: stack overflow in exfat_get_uniname_from_ext_entry
https://bugzilla.redhat.com/show_bug.cgi?id=2221609
[ 3 ] Bug #2225511 - CVE-2023-4128 Kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
https://bugzilla.redhat.com/show_bug.cgi?id=2225511
[ 4 ] Bug #2229498 - CVE-2023-4194 kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid
https://bugzilla.redhat.com/show_bug.cgi?id=2229498
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-d9509be489' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------