Lucene search

K
redhatRedHatRHSA-2023:5622
HistoryOct 10, 2023 - 2:35 p.m.

(RHSA-2023:5622) Important: kernel security and bug fix update

2023-10-1014:35:56
access.redhat.com
14
kernel
security
bug fix
linux
net/sched
netfilter
nf_tables
cve-2023-3609
cve-2023-32233
cve-2023-35001
bz#1703180
bz#2166706
bz#2175062
bz#2219604
memory deadlock
memory leak
panic

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0005 Low

EPSS

Percentile

17.1%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609)

  • kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)

  • kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Low memory deadlock with md devices and external (imsm) metadata handling (BZ#1703180)

  • cifs: memory leak in smb2_query_symlink (BZ#2166706)

  • bnxt_en: panic in bnxt_tx_int Redux (BZ#2175062)

  • NFS client loop in BIND_CONN_TO_SESSION (BZ#2219604)

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0005 Low

EPSS

Percentile

17.1%