Lucene search

K
redhatRedHatRHSA-2023:4125
HistoryJul 18, 2023 - 7:16 a.m.

(RHSA-2023:4125) Important: kernel security and bug fix update

2023-07-1807:16:47
access.redhat.com
21
kernel
linux
security fix
privilege escalation
vulnerability
dos
bug fix
rhel8.1
documentation
rpminspect
translation

0.002 Low

EPSS

Percentile

54.9%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)

  • kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)

  • kernel: remote DoS in TIPC kernel module (CVE-2023-1390)

  • kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • RHEL8.1 Snapshot3 - PVT:940:virt:4TB:LPM operation failed by returning HSCLA2CF, HSCL365C SRC’s - Linux partition suspend timeout (-> documentation/Linux Alert through LTC bug 182549) (BZ#2151218)

  • i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (BZ#2171382)

  • Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208288)