RLSA-2023:3847
Moderate: kernel security, bug fix, and enhancement update
Topic
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332)
* iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092)
* HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305)
* kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623)
* Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595)
* block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236)
* xfs: deadlock in xfs_btree_split_worker (BZ#2196390)
* Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665)
* Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214)
* mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564)
* Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284)
Enhancement(s):
* Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604)
Rocky Linux 8
SRPMs
- kernel-0:4.18.0-477.15.1.el8_8.src.rpm
RPMs
- bpftool-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- bpftool-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- bpftool-debuginfo-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- bpftool-debuginfo-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-abi-stablelists-0:4.18.0-477.15.1.el8_8.noarch.rpm
- kernel-core-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-core-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-cross-headers-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-cross-headers-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-debug-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-debug-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-debug-core-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-debug-core-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-debug-debuginfo-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-debug-debuginfo-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-debug-devel-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-debug-devel-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-debuginfo-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-debuginfo-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-debuginfo-common-aarch64-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-debuginfo-common-x86_64-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-debug-modules-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-debug-modules-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-debug-modules-extra-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-debug-modules-extra-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-devel-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-devel-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-doc-0:4.18.0-477.15.1.el8_8.noarch.rpm
- kernel-headers-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-headers-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-modules-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-modules-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-modules-extra-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-modules-extra-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-tools-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-tools-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-tools-debuginfo-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-tools-debuginfo-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-tools-libs-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-tools-libs-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- kernel-tools-libs-devel-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- kernel-tools-libs-devel-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- perf-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- perf-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- perf-debuginfo-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- perf-debuginfo-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- python3-perf-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- python3-perf-0:4.18.0-477.15.1.el8_8.x86_64.rpm
- python3-perf-debuginfo-0:4.18.0-477.15.1.el8_8.aarch64.rpm
- python3-perf-debuginfo-0:4.18.0-477.15.1.el8_8.x86_64.rpm
Issued: 8/31/2023
Type: Security
Severity: Moderate
Affected Product
- Rocky Linux 8
Fixes
References
- No references