Lucene search

K
osvGoogleOSV:ALSA-2023:7549
HistoryNov 28, 2023 - 12:00 a.m.

Important: kernel security and bug fix update

2023-11-2800:00:00
Google
osv.dev
13
linux kernel
security fix
bug fix
cve-2023-2163
cve-2023-3812
cve-2023-5178
cve-2022-45884
cve-2022-45886
cve-2022-45919
cve-2023-1192
albz#445
bz#2240750
bz#2243011
bz#2244625
hpe edgeline 920t
intel_iommu=on

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

7.3 High

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.1%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163)
  • kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812)
  • kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178)
  • kernel: use-after-free due to race condition occurring in dvb_register_device() (CVE-2022-45884)
  • kernel: use-after-free due to race condition occurring in dvb_net.c (CVE-2022-45886)
  • kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c (CVE-2022-45919)
  • kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Fix max integer mmu_invalidate_seq hanging vCPU (ALBZ#445)
  • Random delay receiving packets after bringing up VLAN on top of VF with vf-vlan-pruning enabled (BZ#2240750)
  • bpf_jit_limit hit again (BZ#2243011)
  • HPE Edgeline 920t resets during kdump context when ice driver is loaded and when system is booted with intel_iommu=on iommu=pt (BZ#2244625)

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

7.3 High

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.1%