8.2 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.005 Low
EPSS
Percentile
76.1%
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609)
kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208)
kernel: eBPF: insufficient stack type checks in dynptr (CVE-2023-39191)
Kernel: race when faulting a device private page in memory manager (CVE-2022-3523)
kernel: use-after-free in l1oip timer handlers (CVE-2022-3565)
kernel: Rate limit overflow messages in r8152 in intr_callback (CVE-2022-3594)
kernel: vmwgfx: use-after-free in vmw_cmd_res_check (CVE-2022-38457)
kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context (CVE-2022-40133)
hw: Intel: Gather Data Sampling (GDS) side channel vulnerability (CVE-2022-40982)
kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c (CVE-2022-42895)
kernel: x86/mm: Randomize per-cpu entry area (CVE-2023-0597)
kernel: HID: check empty report_list in hid_validate_values() (CVE-2023-1073)
kernel: sctp: fail if no bound addresses can be used for a given scope (CVE-2023-1074)
kernel: hid: Use After Free in asus_remove() (CVE-2023-1079)
kernel: hash collisions in the IPv6 connection lookup table (CVE-2023-1206)
kernel: ovl: fix use after free in struct ovl_aio_req (CVE-2023-1252)
Kernel: use-after-free in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (CVE-2023-1652)
kernel: Use after free bug in btsdio_remove due to race condition (CVE-2023-1989)
kernel: fbcon: shift-out-of-bounds in fbcon_set_font() (CVE-2023-3161)
kernel: out-of-bounds access in relay_file_read (CVE-2023-3268)
kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() (CVE-2023-3772)
kernel: xfrm: out-of-bounds read of XFRMA_MTIMER_THRESH nlattr (CVE-2023-3773)
kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability (CVE-2023-4155)
kernel: exFAT: stack overflow in exfat_get_uniname_from_ext_entry (CVE-2023-4273)
kernel: mpls: double free on sysctl allocation failure (CVE-2023-26545)
kernel: KVM: nVMX: missing consistency checks for CR0 and CR4 (CVE-2023-30456)
kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() (CVE-2023-33203)
kernel: vmwgfx: race condition leading to information disclosure vulnerability (CVE-2023-33951)
kernel: vmwgfx: double free within the handling of vmw_buffer_object objects (CVE-2023-33952)
kernel: r592: race condition leading to use-after-free in r592_remove() (CVE-2023-35825)
kernel: net/tls: tls_is_tx_ready() checked list_entry (CVE-2023-1075)
kernel: tap: tap_open(): correctly initialize socket uid (CVE-2023-1076)
kernel: missing mmap_lock in file_files_note that could possibly lead to a use after free in the coredump code (CVE-2023-1249)
kernel: use-after-free bug in remove function xgene_hwmon_remove (CVE-2023-1855)
kernel: Use after free bug in r592_remove (CVE-2023-3141)
kernel: gfs2: NULL pointer dereference in gfs2_evict_inode() (CVE-2023-3212)
kernel: NULL pointer dereference due to missing kalloc() return value check in shtp_cl_get_dma_send_buf() (CVE-2023-3358)
kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid (CVE-2023-4194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 9 | x86_64 | kernel-rt-modules | < 5.14.0-362.8.1.el9_3 | kernel-rt-modules-5.14.0-362.8.1.el9_3.x86_64.rpm |
RedHat | 9 | ppc64le | rv | < 5.14.0-362.8.1.el9_3 | rv-5.14.0-362.8.1.el9_3.ppc64le.rpm |
RedHat | 9 | aarch64 | kernel-64k-core | < 5.14.0-362.8.1.el9_3 | kernel-64k-core-5.14.0-362.8.1.el9_3.aarch64.rpm |
RedHat | 9 | x86_64 | kernel-modules-extra | < 5.14.0-362.8.1.el9_3 | kernel-modules-extra-5.14.0-362.8.1.el9_3.x86_64.rpm |
RedHat | 9 | aarch64 | perf | < 5.14.0-362.8.1.el9_3 | perf-5.14.0-362.8.1.el9_3.aarch64.rpm |
RedHat | 9 | ppc64le | kernel-tools | < 5.14.0-362.8.1.el9_3 | kernel-tools-5.14.0-362.8.1.el9_3.ppc64le.rpm |
RedHat | 9 | x86_64 | perf-debuginfo | < 5.14.0-362.8.1.el9_3 | perf-debuginfo-5.14.0-362.8.1.el9_3.x86_64.rpm |
RedHat | 9 | aarch64 | kernel-64k-debug-modules | < 5.14.0-362.8.1.el9_3 | kernel-64k-debug-modules-5.14.0-362.8.1.el9_3.aarch64.rpm |
RedHat | 9 | aarch64 | perf-debuginfo | < 5.14.0-362.8.1.el9_3 | perf-debuginfo-5.14.0-362.8.1.el9_3.aarch64.rpm |
RedHat | 9 | ppc64le | perf-debuginfo | < 5.14.0-362.8.1.el9_3 | perf-debuginfo-5.14.0-362.8.1.el9_3.ppc64le.rpm |
8.2 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.005 Low
EPSS
Percentile
76.1%