Описание
Moderate: kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332)
-
iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092)
-
HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305)
-
kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623)
-
Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595)
-
block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236)
-
xfs: deadlock in xfs_btree_split_worker (BZ#2196390)
-
Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665)
-
Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214)
-
mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564)
-
Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284)
Enhancement(s):
- Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604)
Затронутые продукты
Rocky Linux 8
Связанные CVE
Исправления
- Red Hat - 2179000
Связанные уязвимости
do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).
do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).
do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).
do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6. ...