Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2023:3847

Опубликовано: 31 авг. 2023
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security, bug fix, and enhancement update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332)

  • iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092)

  • HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305)

  • kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623)

  • Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595)

  • block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236)

  • xfs: deadlock in xfs_btree_split_worker (BZ#2196390)

  • Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665)

  • Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214)

  • mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564)

  • Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284)

Enhancement(s):

  • Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604)

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bpftoolx86_64477.15.1.el8_8bpftool-4.18.0-477.15.1.el8_8.x86_64.rpm
kernelx86_64477.15.1.el8_8kernel-4.18.0-477.15.1.el8_8.x86_64.rpm
kernel-abi-stablelistsnoarch477.15.1.el8_8kernel-abi-stablelists-4.18.0-477.15.1.el8_8.noarch.rpm
kernel-corex86_64477.15.1.el8_8kernel-core-4.18.0-477.15.1.el8_8.x86_64.rpm
kernel-cross-headersx86_64477.15.1.el8_8kernel-cross-headers-4.18.0-477.15.1.el8_8.x86_64.rpm
kernel-debugx86_64477.15.1.el8_8kernel-debug-4.18.0-477.15.1.el8_8.x86_64.rpm
kernel-debug-corex86_64477.15.1.el8_8kernel-debug-core-4.18.0-477.15.1.el8_8.x86_64.rpm
kernel-debug-develx86_64477.15.1.el8_8kernel-debug-devel-4.18.0-477.15.1.el8_8.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64477.15.1.el8_8kernel-debuginfo-common-x86_64-4.18.0-477.15.1.el8_8.x86_64.rpm
kernel-debug-modulesx86_64477.15.1.el8_8kernel-debug-modules-4.18.0-477.15.1.el8_8.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7
ubuntu
больше 2 лет назад

do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).

CVSS3: 7
redhat
больше 2 лет назад

do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).

CVSS3: 7
nvd
больше 2 лет назад

do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).

CVSS3: 7
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7
debian
больше 2 лет назад

do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6. ...