Lucene search

K
redhatRedHatRHSA-2023:7382
HistoryNov 21, 2023 - 8:21 a.m.

(RHSA-2023:7382) Important: kernel security and bug fix update

2023-11-2108:21:05
access.redhat.com
8
kernel
security fixes
bug fixes
linux
netfilter
tun
amd
cve
rhel
lpar
intel
rtmutex
nvme
isst-lte

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

50.3%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776)

  • kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812)

  • kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() (CVE-2023-4004)

  • kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free (CVE-2023-4147)

  • kernel: netfilter: potential slab-out-of-bound access due to integer underflow (CVE-2023-42753)

  • kernel: use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)

  • hw: amd: Cross-Process Information Leak (CVE-2023-20593)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • RHEL9.0.z [32TB/240c]: kdump service failed to start when 32TB lpar is activated with desired_memory 100gb and max memory 32TB. (BZ#2192541)

  • RHEL9.0 - kernel: fix __clear_user() inline assembly constraints (BZ#2192601)

  • RH2143007- LPAR is crashed by Phyp when doing DLPAR CPU operations (BZ#2193374)

  • RHEL-9.0/9.1 - During DLPAR operations in shared mode and dedicated mode with smt loop, device tree entries are not getting populated(dlpar operation was success)[Denali/Everest][P10][5.14.0-121.el9.ppc64le] (BZ#2196443)

  • [Intel 9.2 BUG] [SPR] IOMMU: QAT Device Address Translation Issue with Invalidation Completion Ordering (BZ#2221162)

  • rtmutex: Incorrect waiter woken when requeueing in rt_mutex_adjust_prio_chain() (BZ#2222126)

  • [RHEL9] blktests nvme/047 lead kernel NULL pointer (BZ#2230134)

  • ISST-LTE: [P10] rinlp97 RHEL9.2 RC build - LTP test via SLS suite fails with a crash after running for 19hrs at “kernel BUG at lib/dynamic_queue_limits.c:27!” (BZ#2236700)

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

50.3%