Lucene search

K
redhatRedHatRHSA-2023:5604
HistoryOct 10, 2023 - 2:20 p.m.

(RHSA-2023:5604) Important: kernel security and bug fix update

2023-10-1014:20:39
access.redhat.com
7

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

24.4%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • Kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128)

  • kernel: nf_tables: use-after-free in nft_chain_lookup_byid() (CVE-2023-31248)

  • kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)

  • kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788)

  • kernel: hash collisions in the IPv6 connection lookup table (CVE-2023-1206)

  • kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998)

  • kernel: fbcon: shift-out-of-bounds in fbcon_set_font() (CVE-2023-3161)

  • kernel: denial of service problem in net/unix/diag.c (CVE-2023-28327)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Rhel9.2 - drmgr command is failing [hvcs/PowerVS] (BZ#2213790)

  • Wrong hwlat CPU affinity when started from a container. (BZ#2221158)

  • cifs: check the lease context if we actually got a lease (BZ#2221160)

  • [Hyper-V][RHEL 9]incomplete fc_transport implementation in storvsc causes null dereference in fc_timed_out() (BZ#2230748)

  • RHEL-9: WARNING: bad unlock balance detected! (BZ#2232214)

  • core: backports from upstream (BZ#2238028)

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

24.4%