ELSA-2023-3723

ELSA-2023-3723 - kernel security and bug fix update

Type:SECURITY
Severity:IMPORTANT
Release Date:2023-07-25

Description


- [5.14.0-284.18.1_2]
- cifs: fix wrong unlock before return from cifs_tree_connect()
- docs: Remove the unnecessary unicode character
- perf vendor events intel: Refresh ivytown metrics and events
- perf vendor events: Update Intel ivytown
- perf vendor events intel: Refresh jaketown metrics and events
- perf vendor events: Update Intel jaketown
- NFSD: RHEL-only bug introduced in fix for COMMIT and NFS4ERR_DELAY loop
- NFSD: Fix problem of COMMIT and NFS4ERR_DELAY in infinite loop
- workqueue: Fix isolated CPUs interference problem
- sched/core: Fix arch_scale_freq_tick() on tickless systems
- ice: no busy waiting in GNSS thread and for SQ commands
- wdat_wdt: avoid watchdog timeout during reboot
- hugetlbfs: don't delete error page from pagecache
- mm/filemap: fix page end in filemap_get_read_batch
- isched/deadline: Add more reschedule cases to prio_changed_dl()
- sched/rt: Fix bad task migration for rt tasks
- blk-mq: directly poll requests
- KVM: VMX: Fix crash due to uninitialized current_vmcs
- wifi: iwlwifi: mvm: protect TXQ list manipulation
- crypto: jitter - permanent and intermittent health errors
- cpufreq: intel_pstate: hybrid: Use known scaling factor for P-cores
- cpufreq: intel_pstate: Read all MSRs on the target CPU
- cpufreq: intel_pstate: Enable HWP IO boost for all servers
- crypto: qat: Update QAT drivers upto v6.2
- info/owners.yaml: Adjust intel_qat subsystem entry
- net: tls: fix possible race condition between do_tls_getsockopt_conf and do_tls_setsockopt_conf() {CVE-2023-28466}
- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() {CVE-2023-2194}
- xfs: verify buffer contents when we skip log replay {CVE-2023-2124}
- bluetooth: Perform careful capability checks in hci_sock_ioctl() {CVE-2023-2002}
- netfilter: nf_tables: deactivate anonymous set from preparation phase {CVE-2023-32233}
- perf: Fix check before add_event_to_groups() in perf_group_detach() {CVE-2023-2235}


Related CVEs


CVE-2023-2235
CVE-2023-2194
CVE-2023-2124
CVE-2023-28466
CVE-2023-2002
CVE-2023-32233

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 9 (aarch64) kernel-5.14.0-284.18.1.el9_2.src.rpm3d102220c04f1d517698d582c199abef-
bpftool-7.0.0-284.18.1.el9_2.aarch64.rpm1c9c0308e18dc62bf70f3df6c504bcd0-
kernel-cross-headers-5.14.0-284.18.1.el9_2.aarch64.rpm2b440e296212e7d4ea1db200d3ae7116-
kernel-headers-5.14.0-284.18.1.el9_2.aarch64.rpma9214e70c13b7dda39abe805d16d4e3e-
kernel-tools-5.14.0-284.18.1.el9_2.aarch64.rpm1ddcb29c40cf5036d10098bed3605a8b-
kernel-tools-libs-5.14.0-284.18.1.el9_2.aarch64.rpm373afd6f944cba8dcc3bea595be8198b-
kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.aarch64.rpm769f7316be4950ff5bbc0c0f77b1af0a-
perf-5.14.0-284.18.1.el9_2.aarch64.rpmd889ae30cdcfc33516dc0ee5804843eb-
python3-perf-5.14.0-284.18.1.el9_2.aarch64.rpm66c5ab88ea25706dd9dcd241a0d64e76-
Oracle Linux 9 (x86_64) kernel-5.14.0-284.18.1.el9_2.src.rpm3d102220c04f1d517698d582c199abef-
bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm077451fa7eb800cd89eb634b3f1a43b7-
kernel-5.14.0-284.18.1.el9_2.x86_64.rpma27eb118d6095e33f5a3ee2ae9e39e2d-
kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpmf8a391a8ba8f611b0a2bb72a9efc1b15-
kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm132c7e87286b558118be30e713ea3f2b-
kernel-cross-headers-5.14.0-284.18.1.el9_2.x86_64.rpma30c0c99c3b79c40a787ff4b389ba8ea-
kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpmbda48a0d0054ebcdd848aef7743064ed-
kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm0974a3285a9d3f519b7e16a3648ece9f-
kernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpm4571dd9f756fa4a3e32e27475a4f3806-
kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm220413c95a761ec9eb5920cad2e1d514-
kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpmd65f6684f48129b5b7a8d93acb176971-
kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpmffae7f06ad6904c014f67e3c110ab73f-
kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpmd870fe5939b9e507c319c9ef1b735b2f-
kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpmd2f884c9e75c16c43ce776ad9fb6dcca-
kernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm4cc32c2caf2960b9fd7a3030f87814ad-
kernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpmf002234fcfa6a5a27cfcccfa17d38297-
kernel-doc-5.14.0-284.18.1.el9_2.noarch.rpm9422ac2f2521df38156e3f0127d3747b-
kernel-headers-5.14.0-284.18.1.el9_2.x86_64.rpm3ee0aa29682b77d7f51f7a64c73886a8-
kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpmb16b0fdc95652f13bc77fe6892ffb656-
kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm27e71b01089c6ec978f392a3d9762a9e-
kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpmbc5b92146fec23fbdc36f76ea1bd0b71-
kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm30b6be03f9b2ef634f0073d72fc5559b-
kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm7bc0fffb5bbf4b91449f7e3f72be84d6-
kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpma0a7c897f53ed24a1110299e4302587d-
kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm7f8504d6d6a5b9fa111d04ce4b79ccfe-
perf-5.14.0-284.18.1.el9_2.x86_64.rpm5a0791515828dbe871639bf4c62472c5-
python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm41b2a59f5b8e2d55d3ae8932db7e9ee5-
rtla-5.14.0-284.18.1.el9_2.x86_64.rpm5bbeb37f0156d82efc25923aca8d230c-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete