Lucene search

K
redhatRedHatRHSA-2023:1659
HistoryApr 05, 2023 - 1:16 p.m.

(RHSA-2023:1659) Important: kpatch-patch security update

2023-04-0513:16:52
access.redhat.com
9
rhsa-2023-1659
kernel
stack overflow
do_proc_dointvec
proc_skip_spaces
cve-2022-4378
alsa
pcm
rwsem lock
uaf
cve-2023-0266
fuse filesystem
low-privileged user
privileges escalation
cve-2023-0386
kpatch
mm/mremap.c
incomplete fix
cve-2022-41222
cve-2023-1476

7.9 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H

0.001 Low

EPSS

Percentile

41.2%

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)

  • ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)

  • kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)

  • kpatch: mm/mremap.c: incomplete fix for CVE-2022-41222 (CVE-2023-1476)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

7.9 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H

0.001 Low

EPSS

Percentile

41.2%