RLSA-2023:1470

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2023:1470.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2023:1470
Related
Published
2023-04-06T15:23:59.970870Z
Modified
2023-04-06T15:24:50.522072Z
Summary
Important: kernel security, bug fix, and enhancement update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: tun: avoid double free in tunfreenetdev (CVE-2022-4744)

  • ALSA: pcm: Move rwsem lock inside sndctlelem_read to prevent UAF (CVE-2023-0266)

  • kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Rocky Linux9.0 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127880)

  • Cgroups_v2, when creating new cgroup/container, resets the cpu affinity masks for all usr processes on the system. (BZ#2143766)

  • Rocky Linux9.0 - boot: Add secure boot trailer (BZ#2151528)

  • kernel-rt-debug: WARNING: possible circular locking dependency detected (&n->listlock->&p->pilock->&lock->wait_lock) (BZ#2160614)

  • Support cpuset.schedloadbalance by changing default CPUset directory structure (BZ#2161105)

  • Rocky Linux9.0 - s390/kexec: fix ipl report address for kdump (BZ#2166903)

  • libgpiod doesn't seem to work with Interphase gpiochip (BZ#2166956)

  • Azure Rocky Linux9 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170227)

Enhancement(s):

  • IBM 9.2 FEAT: Upgrade the QETH driver to latest from upstream, e.g. kernel 6.0 (BZ#2166304)

  • Intel 9.2 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168382)

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / kernel

Package

Name
kernel
Purl
pkg:rpm/rocky-linux/kernel?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:5.14.0-162.22.2.el9_1