Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-3723-01

Red Hat Security Advisory 2023-3723-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.

Packet Storm
#vulnerability#linux#red_hat#js#intel#auth#rpm#wifi#ssl

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2023:3723-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3723
Issue date: 2023-06-21
CVE Names: CVE-2023-2002 CVE-2023-2124 CVE-2023-2194
CVE-2023-2235 CVE-2023-28466 CVE-2023-32233
=====================================================================

  1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux CRB (v. 9) - aarch64, ppc64le, s390x, x86_64

  1. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

  • kernel: use-after-free vulnerability in the perf_group_detach function of
    the Linux Kernel Performance Events (CVE-2023-2235)

  • kernel: netfilter: use-after-free in nf_tables when processing batch
    requests can lead to privilege escalation (CVE-2023-32233)

  • Kernel: bluetooth: Unauthorized management command execution
    (CVE-2023-2002)

  • kernel: OOB access in the Linux kernel’s XFS subsystem (CVE-2023-2124)

  • kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer()
    (CVE-2023-2194)

  • kernel: tls: race condition in do_tls_getsockopt may lead to
    use-after-free or NULL pointer dereference (CVE-2023-28466)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

  • Intel QAT Update - (kernel changes) (BZ#2176846)

  • RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2178857)

  • In FIPS mode, kernel does not transition into error state when RCT or APT
    health tests fail (BZ#2181727)

  • Kernel BUG in iwlmvm wifi driver when used Mesh systems (BZ#2186723)

  • Azure RHEL 9 Backport upstream commit
    93827a0a36396f2fd6368a54a020f420c8916e9b [KVM: VMX: Fix crash due to
    uninitialized current_vmcs] (BZ#2186822)

  • RHEL 9 blktests nvme/047 lead kernel NULL pointer (BZ#2187536)

  • Single Node Openshift cluster becomes unreachable after running less than
    2 hours (BZ#2187709)

  • kernel[-rt]: task deadline_test:1778 blocked for more than 622 seconds
    (BZ#2188655)

  • fix page end in filemap_get_read_batch (BZ#2189349)

  • RHEL 9.2 hwpoison: data loss when memory error occurs on hugetlb
    pagecache (BZ#2192348)

  • wdat_wdt watchdog timeout triggered unexpectedly (BZ#2192585)

  • ice: high CPU usage with GNSS or ptp4l (BZ#2203154)

  • RHEL 9 “smpboot: Scheduler frequency invariance went wobbly, disabling!”
    on nohz_full CPUs after long run (BZ#2203178)

  • Dying percpu kworkers cause issues on isolated CPUs [rhel-9] (BZ#2203229)

  • FJ9.2 Bug: [REG] NFS infinite loop of COMMIT call and NFS4ERR_DELAY
    reply. (BZ#2203335)

  • perf errors - “event syntax error: 'unc_p_delayed_c_state_abort_core5’”
    b’_ value too big for format, maximum is 255’ (BZ#2207471)

  • RHEL 9: Invalid character detected by rpminspect in
    Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208242)

  • cifs: backport small patches to bring us close to 9.1 - backport commit
    aea02fc40a7f cifs: fix wrong unlock before return from cifs_tree_connect
    (BZ#2209045)

  • RHEL 9 x86_64, kdump 2nd kernel will randomly panic on
    “kvm-08-guest25.hv2” (BZ#2210614)

  1. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

2179000 - CVE-2023-28466 kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference
2187308 - CVE-2023-2002 Kernel: bluetooth: Unauthorized management command execution
2187439 - CVE-2023-2124 kernel: OOB access in the Linux kernel’s XFS subsystem
2188396 - CVE-2023-2194 kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer()
2192589 - CVE-2023-2235 kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events
2196105 - CVE-2023-32233 kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation

  1. Package List:

Red Hat Enterprise Linux AppStream (v. 9):

aarch64:
bpftool-debuginfo-7.0.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-devel-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-devel-matched-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-devel-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-devel-matched-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-devel-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-devel-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-devel-matched-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-headers-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
perf-5.14.0-284.18.1.el9_2.aarch64.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
rtla-5.14.0-284.18.1.el9_2.aarch64.rpm

noarch:
kernel-doc-5.14.0-284.18.1.el9_2.noarch.rpm

ppc64le:
bpftool-debuginfo-7.0.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-devel-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-devel-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-devel-matched-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-headers-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
perf-5.14.0-284.18.1.el9_2.ppc64le.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
rtla-5.14.0-284.18.1.el9_2.ppc64le.rpm

s390x:
bpftool-debuginfo-7.0.0-284.18.1.el9_2.s390x.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-devel-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-devel-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-devel-matched-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-headers-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-devel-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-devel-matched-5.14.0-284.18.1.el9_2.s390x.rpm
perf-5.14.0-284.18.1.el9_2.s390x.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
rtla-5.14.0-284.18.1.el9_2.s390x.rpm

x86_64:
bpftool-debuginfo-7.0.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-headers-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
perf-5.14.0-284.18.1.el9_2.x86_64.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
rtla-5.14.0-284.18.1.el9_2.x86_64.rpm

Red Hat Enterprise Linux BaseOS (v. 9):

Source:
kernel-5.14.0-284.18.1.el9_2.src.rpm

aarch64:
bpftool-7.0.0-284.18.1.el9_2.aarch64.rpm
bpftool-debuginfo-7.0.0-284.18.1.el9_2.aarch64.rpm
kernel-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-extra-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-modules-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-modules-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-modules-extra-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-modules-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-modules-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-modules-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-modules-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-modules-extra-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-tools-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-tools-libs-5.14.0-284.18.1.el9_2.aarch64.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
python3-perf-5.14.0-284.18.1.el9_2.aarch64.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm

noarch:
kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm

ppc64le:
bpftool-7.0.0-284.18.1.el9_2.ppc64le.rpm
bpftool-debuginfo-7.0.0-284.18.1.el9_2.ppc64le.rpm
kernel-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-core-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-core-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-modules-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-modules-core-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-modules-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-modules-core-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-modules-extra-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-tools-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-tools-libs-5.14.0-284.18.1.el9_2.ppc64le.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
python3-perf-5.14.0-284.18.1.el9_2.ppc64le.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm

s390x:
bpftool-7.0.0-284.18.1.el9_2.s390x.rpm
bpftool-debuginfo-7.0.0-284.18.1.el9_2.s390x.rpm
kernel-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-modules-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-modules-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-modules-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-modules-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-modules-extra-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-tools-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-extra-5.14.0-284.18.1.el9_2.s390x.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
python3-perf-5.14.0-284.18.1.el9_2.s390x.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm

x86_64:
bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm
bpftool-debuginfo-7.0.0-284.18.1.el9_2.x86_64.rpm
kernel-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm

Red Hat Enterprise Linux CRB (v. 9):

aarch64:
bpftool-debuginfo-7.0.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-cross-headers-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.aarch64.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm

ppc64le:
bpftool-debuginfo-7.0.0-284.18.1.el9_2.ppc64le.rpm
kernel-cross-headers-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.ppc64le.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm

s390x:
bpftool-debuginfo-7.0.0-284.18.1.el9_2.s390x.rpm
kernel-cross-headers-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm

x86_64:
bpftool-debuginfo-7.0.0-284.18.1.el9_2.x86_64.rpm
kernel-cross-headers-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2023-2002
https://access.redhat.com/security/cve/CVE-2023-2124
https://access.redhat.com/security/cve/CVE-2023-2194
https://access.redhat.com/security/cve/CVE-2023-2235
https://access.redhat.com/security/cve/CVE-2023-28466
https://access.redhat.com/security/cve/CVE-2023-32233
https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=ckHq
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

Red Hat Security Advisory 2024-4098-03

Red Hat Security Advisory 2024-4098-03 - An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support.

Ubuntu Security Notice USN-6701-4

Ubuntu Security Notice 6701-4 - Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service. It was discovered that the NVIDIA Tegra XUSB pad controller driver in the Linux kernel did not properly handle return values in certain error conditions. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6701-3

Ubuntu Security Notice 6701-3 - Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service. It was discovered that the NVIDIA Tegra XUSB pad controller driver in the Linux kernel did not properly handle return values in certain error conditions. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6701-1

Ubuntu Security Notice 6701-1 - Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service. It was discovered that the NVIDIA Tegra XUSB pad controller driver in the Linux kernel did not properly handle return values in certain error conditions. A local attacker could use this to cause a denial of service.

RHSA-2023:5621: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3609: A double-free flaw was found in u32_set_parms in net/sched/cls_u32.c in the Network Scheduler component in the Linux kernel. This flaw allows a local attacker to use a failure event to mishandle the reference counter, leading to a local privilege escalation threat. * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilter subs...

Ubuntu Security Notice USN-6397-1

Ubuntu Security Notice 6397-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6385-1

Ubuntu Security Notice 6385-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.

RHSA-2023:5255: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. 'Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2002: A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. * CVE-2023-3090: A flaw was found...

Ubuntu Security Notice USN-6357-1

Ubuntu Security Notice 6357-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6340-1

Ubuntu Security Notice 6340-1 - Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service. Zi Fan Tan discovered that the binder IPC implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-4961-01

Red Hat Security Advisory 2023-4961-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-4962-01

Red Hat Security Advisory 2023-4962-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.

RHSA-2023:4962: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can...

RHSA-2023:4961: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which ...

Ubuntu Security Notice USN-6332-1

Ubuntu Security Notice 6332-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6314-1

Ubuntu Security Notice 6314-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.

Ubuntu Security Notice USN-6312-1

Ubuntu Security Notice 6312-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.

Ubuntu Security Notice USN-6311-1

Ubuntu Security Notice 6311-1 - William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service. It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information.

Red Hat Security Advisory 2023-4817-01

Red Hat Security Advisory 2023-4817-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access and out of bounds write vulnerabilities.

RHSA-2023:4817: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2124: An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-3090: A flaw was found in the IPVLAN netwo...

RHSA-2023:4814: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1353: A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information. * CVE-2022-39188: A flaw was found in include/asm-generic/tlb.h in the Linux ...

Debian Security Advisory 5480-1

Debian Linux Security Advisory 5480-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Ubuntu Security Notice USN-6301-1

Ubuntu Security Notice 6301-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.

Ubuntu Security Notice USN-6300-1

Ubuntu Security Notice 6300-1 - William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service. It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information.

Red Hat Security Advisory 2023-4664-01

Red Hat Security Advisory 2023-4664-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.3 images. Issues addressed include a denial of service vulnerability.

RHSA-2023:4664: Red Hat Security Advisory: OpenShift Virtualization 4.13.3 Images security and bug fix update

Red Hat OpenShift Virtualization release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Con...

Ubuntu Security Notice USN-6283-1

Ubuntu Security Notice 6283-1 - Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service. Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear operations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6284-1

Ubuntu Security Notice 6284-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.

CVE-2023-33953: Security Bulletins

gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering in the HPACK parser - Unbounded CPU consumption in the HPACK parser The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client. The unbounded memory buffering bugs: - The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb. - HPACK varints have an encoding quirk whereby an infinite number of 0’s can be added at the start of an integer. gRPC’s hpack parser needed to read all of them before concluding a parse. - gRPC’s metadata overflow check was performed per frame, so ...

Red Hat Security Advisory 2023-4517-01

Red Hat Security Advisory 2023-4517-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-4541-01

Red Hat Security Advisory 2023-4541-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.

RHSA-2023:4541: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via Blue...

RHSA-2023:4515: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privilege esca...

Ubuntu Security Notice USN-6254-1

Ubuntu Security Notice 6254-1 - Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the do_prlimit function in the Linux kernel did not properly handle speculative execution barriers. A local attacker could use this to expose sensitive information. It was discovered that a race condition existed in the btrfs file system implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information.

Red Hat Security Advisory 2023-4286-01

Red Hat Security Advisory 2023-4286-01 - Red Hat OpenShift Dev Spaces provides a cloud developer workspace server and a browser-based IDE built for teams and organizations. Dev Spaces runs in OpenShift and is well-suited for container-based development.

RHSA-2023:4255: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1281: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The imperfect hash area can be updated while packets are traver...

Ubuntu Security Notice USN-6235-1

Ubuntu Security Notice 6235-1 - It was discovered that the NTFS file system implementation in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service. Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did not properly implement speculative execution barriers in usercopy functions in certain situations. A local attacker could use this to expose sensitive information.

Red Hat Security Advisory 2023-4138-01

Red Hat Security Advisory 2023-4138-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-4137-01

Red Hat Security Advisory 2023-4137-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access and use-after-free vulnerabilities.

RHSA-2023:4138: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1016: A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker. * CVE-2022-42703: A memory leak flaw with us...

RHSA-2023:4126: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-1281: A use-after-free vulnerability w...

Ubuntu Security Notice USN-6228-1

Ubuntu Security Notice 6228-1 - It was discovered that the XFS file system implementation in the Linux kernel did not properly perform metadata validation when mounting certain images. An attacker could use this to specially craft a file system image that, when mounted, could cause a denial of service. Wei Chen discovered that the InfiniBand RDMA communication manager implementation in the Linux kernel contained an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6224-1

Ubuntu Security Notice 6224-1 - It was discovered that the XFS file system implementation in the Linux kernel did not properly perform metadata validation when mounting certain images. An attacker could use this to specially craft a file system image that, when mounted, could cause a denial of service. Wei Chen discovered that the InfiniBand RDMA communication manager implementation in the Linux kernel contained an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service.

RHSA-2023:3998: Red Hat Security Advisory: Logging Subsystem 5.7.3 - Red Hat OpenShift security update

An update is now available for Red Hat OpenShift Logging Subsystem 5.7.3 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-26115: A flaw was found in the Node.js word-wrap module, where it is vulnerable to a denial of service caused by a Regular expression denial of service (ReDoS) issue in the result variable. By sending a specially crafted regex input, a remote attacker can cause a denial of service. * CVE-2023-26136: A flaw was found in the tough-cookie package. Affec...

Ubuntu Security Notice USN-6206-1

Ubuntu Security Notice 6206-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NTFS file system implementation in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service.

Debian Security Advisory 5448-1

Debian Linux Security Advisory 5448-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

RHSA-2023:3819: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-28466: A use-after-free flaw was found in the do_tls_getsockopt function in net/tls/tls_main.c in the Transport Layer Security (TLS) in the Network subcompact in the Linux kernel. This flaw allows an attacker to cause a NULL pointer dereference problem due to a race condition.

Ubuntu Security Notice USN-6186-1

Ubuntu Security Notice 6186-1 - Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

Kernel Live Patch Security Notice LSN-0095-1

It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges. It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform data buffer size validation in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly expose sensitive information. It was discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Various other issues were also addressed.

Red Hat Security Advisory 2023-3708-01

Red Hat Security Advisory 2023-3708-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-3705-01

Red Hat Security Advisory 2023-3705-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-3705-01

Red Hat Security Advisory 2023-3705-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2023:3708: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2002: A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. * CVE-2023-2124: An out-of-bounds ...

RHSA-2023:3708: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2002: A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. * CVE-2023-2124: An out-of-bounds ...

RHSA-2023:3708: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2002: A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. * CVE-2023-2124: An out-of-bounds ...

RHSA-2023:3708: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2002: A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. * CVE-2023-2124: An out-of-bounds ...

RHSA-2023:3708: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2002: A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. * CVE-2023-2124: An out-of-bounds ...

RHSA-2023:3705: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2235: The Linux kernel's Performance Events subsystem has a use-after-free flaw that occurs when a user triggers the perf_group_detach and remove_on_exec functions simultaneously. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilte...

RHSA-2023:3705: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2235: The Linux kernel's Performance Events subsystem has a use-after-free flaw that occurs when a user triggers the perf_group_detach and remove_on_exec functions simultaneously. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilte...

Ubuntu Security Notice USN-6175-1

Ubuntu Security Notice 6175-1 - Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6175-1

Ubuntu Security Notice 6175-1 - Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6175-1

Ubuntu Security Notice 6175-1 - Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-3465-01

Red Hat Security Advisory 2023-3465-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-3470-01

Red Hat Security Advisory 2023-3470-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2023:3490: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-2008: A flaw was found in the Linux kernel's ...

Red Hat Security Advisory 2023-3351-01

Red Hat Security Advisory 2023-3351-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-3350-01

Red Hat Security Advisory 2023-3350-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Ubuntu Security Notice USN-6131-1

Ubuntu Security Notice 6131-1 - Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

RHSA-2023:3351: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilter subsystem of the Linux kernel when processing batch requests to update nf_tables configuration. This vulnerability can be abused to perform arbitrary reads and writes in kernel memory. A local user (with CAP_NET_ADMIN capability) could use this flaw to crash the system or potentially...

CVE-2023-2002: security - CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution

A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.

CVE-2023-2124

An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVE-2023-2235

A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.

CVE-2023-2194: Invalid Bug ID

An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.

Ubuntu Security Notice USN-6033-1

Ubuntu Security Notice 6033-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for thisCVE, kernel support for the TCINDEX classifier has been removed. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.

CVE-2023-28466

do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).

Packet Storm: Latest News

Cisco ASA Directory Traversal