Headline
Red Hat Security Advisory 2023-4962-01
Red Hat Security Advisory 2023-4962-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security, bug fix, and enhancement update
Advisory ID: RHSA-2023:4962-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4962
Issue date: 2023-09-05
CVE Names: CVE-2023-1829 CVE-2023-2002 CVE-2023-2124
CVE-2023-3090 CVE-2023-3390 CVE-2023-4004
CVE-2023-35001 CVE-2023-35788
=====================================================================
- Summary:
An update for kernel is now available for Red Hat Enterprise Linux 8.4
Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4
Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update
Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux BaseOS AUS (v.8.4) - noarch, x86_64
Red Hat Enterprise Linux BaseOS E4S (v.8.4) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS TUS (v.8.4) - aarch64, noarch, ppc64le, s390x, x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
kernel: Use-after-free vulnerability in the Linux Kernel traffic control
index filter (CVE-2023-1829)kernel: ipvlan: out-of-bounds write caused by unclear skb->cb
(CVE-2023-3090)kernel: UAF in nftables when nft_set_lookup_global triggered after
handling named and anonymous sets in batch requests (CVE-2023-3390)kernel: netfilter: use-after-free due to improper element removal in
nft_pipapo_remove() (CVE-2023-4004)kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
(CVE-2023-35001)kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
(CVE-2023-35788)Kernel: bluetooth: Unauthorized management command execution
(CVE-2023-2002)kernel: OOB access in the Linux kernel’s XFS subsystem (CVE-2023-2124)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
aacraid misses interrupts when a CPU is disabled resulting in scsi
timeouts and the adapter being unusable until reboot. (BZ#2216500)rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9]
(BZ#2216771)refcount_t overflow often happens in mem_cgroup_id_get_online()
(BZ#2221012)enable conntrack clash resolution for GRE (BZ#2223544)
iavf: Fix race between iavf_close and iavf_reset_task (BZ#2223608)
libceph: harden msgr2.1 frame segment length checks [8.x] (BZ#2227075)
[i40e] error: Cannot set interface MAC/vlanid to 1e:b7:e2:02:b1:aa/0 for
ifname ens4f0 vf 0: Resource temporarily unavailable (BZ#2228165)
Enhancement(s):
- [Intel 8.7 FEAT] TSC: Avoid clock watchdog when not needed (BZ#2216050)
- Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
2187308 - CVE-2023-2002 Kernel: bluetooth: Unauthorized management command execution
2187439 - CVE-2023-2124 kernel: OOB access in the Linux kernel’s XFS subsystem
2188470 - CVE-2023-1829 kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter
2213260 - CVE-2023-3390 kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests
2215768 - CVE-2023-35788 kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
2218672 - CVE-2023-3090 kernel: ipvlan: out-of-bounds write caused by unclear skb->cb
2220892 - CVE-2023-35001 kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
2225275 - CVE-2023-4004 kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove()
- Package List:
Red Hat Enterprise Linux BaseOS AUS (v.8.4):
Source:
kernel-4.18.0-305.103.1.el8_4.src.rpm
noarch:
kernel-abi-stablelists-4.18.0-305.103.1.el8_4.noarch.rpm
kernel-doc-4.18.0-305.103.1.el8_4.noarch.rpm
x86_64:
bpftool-4.18.0-305.103.1.el8_4.x86_64.rpm
bpftool-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-core-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-cross-headers-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-core-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-devel-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-modules-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-modules-extra-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-devel-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-headers-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-modules-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-modules-extra-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-tools-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-tools-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-tools-libs-4.18.0-305.103.1.el8_4.x86_64.rpm
perf-4.18.0-305.103.1.el8_4.x86_64.rpm
perf-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
python3-perf-4.18.0-305.103.1.el8_4.x86_64.rpm
python3-perf-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
Red Hat Enterprise Linux BaseOS E4S (v.8.4):
Source:
kernel-4.18.0-305.103.1.el8_4.src.rpm
aarch64:
bpftool-4.18.0-305.103.1.el8_4.aarch64.rpm
bpftool-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-core-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-cross-headers-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-core-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-devel-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-modules-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-modules-extra-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-devel-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-headers-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-modules-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-modules-extra-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-tools-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-tools-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-tools-libs-4.18.0-305.103.1.el8_4.aarch64.rpm
perf-4.18.0-305.103.1.el8_4.aarch64.rpm
perf-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
python3-perf-4.18.0-305.103.1.el8_4.aarch64.rpm
python3-perf-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
noarch:
kernel-abi-stablelists-4.18.0-305.103.1.el8_4.noarch.rpm
kernel-doc-4.18.0-305.103.1.el8_4.noarch.rpm
ppc64le:
bpftool-4.18.0-305.103.1.el8_4.ppc64le.rpm
bpftool-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-core-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-cross-headers-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-core-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-devel-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-modules-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-devel-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-headers-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-modules-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-modules-extra-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-tools-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-tools-libs-4.18.0-305.103.1.el8_4.ppc64le.rpm
perf-4.18.0-305.103.1.el8_4.ppc64le.rpm
perf-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
python3-perf-4.18.0-305.103.1.el8_4.ppc64le.rpm
python3-perf-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
s390x:
bpftool-4.18.0-305.103.1.el8_4.s390x.rpm
bpftool-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-core-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-cross-headers-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-core-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-devel-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-modules-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-modules-extra-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-devel-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-headers-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-modules-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-modules-extra-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-tools-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-tools-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-core-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-devel-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-modules-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-305.103.1.el8_4.s390x.rpm
perf-4.18.0-305.103.1.el8_4.s390x.rpm
perf-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
python3-perf-4.18.0-305.103.1.el8_4.s390x.rpm
python3-perf-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
x86_64:
bpftool-4.18.0-305.103.1.el8_4.x86_64.rpm
bpftool-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-core-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-cross-headers-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-core-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-devel-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-modules-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-modules-extra-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-devel-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-headers-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-modules-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-modules-extra-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-tools-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-tools-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-tools-libs-4.18.0-305.103.1.el8_4.x86_64.rpm
perf-4.18.0-305.103.1.el8_4.x86_64.rpm
perf-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
python3-perf-4.18.0-305.103.1.el8_4.x86_64.rpm
python3-perf-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
Red Hat Enterprise Linux BaseOS TUS (v.8.4):
Source:
kernel-4.18.0-305.103.1.el8_4.src.rpm
aarch64:
bpftool-4.18.0-305.103.1.el8_4.aarch64.rpm
bpftool-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-core-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-cross-headers-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-core-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-devel-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-modules-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debug-modules-extra-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-devel-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-headers-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-modules-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-modules-extra-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-tools-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-tools-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
kernel-tools-libs-4.18.0-305.103.1.el8_4.aarch64.rpm
perf-4.18.0-305.103.1.el8_4.aarch64.rpm
perf-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
python3-perf-4.18.0-305.103.1.el8_4.aarch64.rpm
python3-perf-debuginfo-4.18.0-305.103.1.el8_4.aarch64.rpm
noarch:
kernel-abi-stablelists-4.18.0-305.103.1.el8_4.noarch.rpm
kernel-doc-4.18.0-305.103.1.el8_4.noarch.rpm
ppc64le:
bpftool-4.18.0-305.103.1.el8_4.ppc64le.rpm
bpftool-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-core-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-cross-headers-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-core-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-devel-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-modules-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-devel-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-headers-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-modules-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-modules-extra-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-tools-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
kernel-tools-libs-4.18.0-305.103.1.el8_4.ppc64le.rpm
perf-4.18.0-305.103.1.el8_4.ppc64le.rpm
perf-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
python3-perf-4.18.0-305.103.1.el8_4.ppc64le.rpm
python3-perf-debuginfo-4.18.0-305.103.1.el8_4.ppc64le.rpm
s390x:
bpftool-4.18.0-305.103.1.el8_4.s390x.rpm
bpftool-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-core-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-cross-headers-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-core-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-devel-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-modules-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debug-modules-extra-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-devel-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-headers-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-modules-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-modules-extra-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-tools-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-tools-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-core-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-devel-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-modules-4.18.0-305.103.1.el8_4.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-305.103.1.el8_4.s390x.rpm
perf-4.18.0-305.103.1.el8_4.s390x.rpm
perf-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
python3-perf-4.18.0-305.103.1.el8_4.s390x.rpm
python3-perf-debuginfo-4.18.0-305.103.1.el8_4.s390x.rpm
x86_64:
bpftool-4.18.0-305.103.1.el8_4.x86_64.rpm
bpftool-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-core-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-cross-headers-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-core-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-devel-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-modules-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debug-modules-extra-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-devel-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-headers-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-modules-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-modules-extra-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-tools-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-tools-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
kernel-tools-libs-4.18.0-305.103.1.el8_4.x86_64.rpm
perf-4.18.0-305.103.1.el8_4.x86_64.rpm
perf-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
python3-perf-4.18.0-305.103.1.el8_4.x86_64.rpm
python3-perf-debuginfo-4.18.0-305.103.1.el8_4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2023-1829
https://access.redhat.com/security/cve/CVE-2023-2002
https://access.redhat.com/security/cve/CVE-2023-2124
https://access.redhat.com/security/cve/CVE-2023-3090
https://access.redhat.com/security/cve/CVE-2023-3390
https://access.redhat.com/security/cve/CVE-2023-4004
https://access.redhat.com/security/cve/CVE-2023-35001
https://access.redhat.com/security/cve/CVE-2023-35788
https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=Dqw7
-----END PGP SIGNATURE-----
–
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Related news
Red Hat Security Advisory 2024-4098-03 - An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support.
Ubuntu Security Notice 6701-4 - Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service. It was discovered that the NVIDIA Tegra XUSB pad controller driver in the Linux kernel did not properly handle return values in certain error conditions. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6701-3 - Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service. It was discovered that the NVIDIA Tegra XUSB pad controller driver in the Linux kernel did not properly handle return values in certain error conditions. A local attacker could use this to cause a denial of service.
Red Hat Security Advisory 2024-1278-03 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Issues addressed include out of bounds write and use-after-free vulnerabilities.
Red Hat Security Advisory 2024-1269-03 - An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Issues addressed include null pointer, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2024-1268-03 - An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Issues addressed include null pointer, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-7434-01 - An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-7431-01 - An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-7417-01 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-5627-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, null pointer, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5603-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5575-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3609: A double-free flaw was found in u32_set_parms in net/sched/cls_u32.c in the Network Scheduler component in the Linux kernel. This flaw allows a local attacker to use a failure event to mishandle the reference counter, leading to a local privilege escalation threat. * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilter subs...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1206: A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%. * CVE-2...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-4128: A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue. * CVE-2023-31248: A use-af...
An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35001: An out-of-bounds (OOB) memory access flaw was found in the Netfilter module in the Linux kernel's nft_byteorder_eval in net/netfilter/nft_byteorder.c. A bound check failure allows a local attacker with CAP_NET_ADMIN access to cause a local privilege escalation issue due to incorrect data alignment.
Red Hat Security Advisory 2023-5233-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.4 images.
Red Hat Security Advisory 2023-5238-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-5244-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5221-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate their p...
Red Hat OpenShift Virtualization release 4.13.4 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3090: A flaw was found in the IPVLAN network driver in the Linux kernel. This issue is caused by missing skb->cb initialization in `__ip_options_echo` and can lead to an out-of-bounds write stack overflow. This may allow a local user to cause a denial of service or potentially achieve local privilege escalation. * CVE-2023-3390: A use-after-free f...
Red Hat Security Advisory 2023-5069-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system. * CVE...
Ubuntu Security Notice 6357-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service.
Debian Linux Security Advisory 5492-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
Ubuntu Security Notice 6340-2 - Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service. Zi Fan Tan discovered that the binder IPC implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6349-1 - Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service. Zi Fan Tan discovered that the binder IPC implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6348-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6347-1 - William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service. It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 6340-1 - Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service. Zi Fan Tan discovered that the binder IPC implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2023-4961-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-4961-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-4961-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-4967-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-4967-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-4967-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privileg...
Ubuntu Security Notice 6332-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6330-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6321-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Red Hat Security Advisory 2023-4888-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code l...
Ubuntu Security Notice 6318-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6316-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6315-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6312-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6311-1 - William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service. It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information.
Red Hat Security Advisory 2023-4817-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access and out of bounds write vulnerabilities.
Red Hat Security Advisory 2023-4815-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access and out of bounds write vulnerabilities.
Red Hat Security Advisory 2023-4814-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include null pointer, out of bounds write, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2124: An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user...
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances. * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE pa...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets with a total size of 252 bytes, which results in an out-of-bounds write when the third packet enters fl_set_geneve_opt, potentially leading to a denial of servic...
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances. * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2124: An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-3090: A flaw was found in the IPVLAN netwo...
Red Hat Security Advisory 2023-4697-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets with a total ...
Debian Linux Security Advisory 5480-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
Ubuntu Security Notice 6301-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6300-1 - William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service. It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 6300-1 - William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service. It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information.
Red Hat Security Advisory 2023-4664-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.3 images. Issues addressed include a denial of service vulnerability.
Red Hat OpenShift Virtualization release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Con...
Ubuntu Security Notice 6283-1 - Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service. Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear operations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6284-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6285-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.
Ubuntu Security Notice 6285-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.
Red Hat Security Advisory 2023-4456-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.8. Issues addressed include an add administrator vulnerability.
Red Hat Security Advisory 2023-4517-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-4517-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
Red Hat OpenShift Container Platform release 4.13.8 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via B...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-45869: A flaw was found in the Linux kernel in the KVM. A race condition in direct_page_fault allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualization and the TDP MMU are enabled. * CVE-2023-0458: A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() ...
A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.
Debian Linux Security Advisory 5461-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
Ubuntu Security Notice 6260-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.
Ubuntu Security Notice 6256-1 - Jiasheng Jiang discovered that the HSA Linux kernel driver for AMD Radeon GPU devices did not properly validate memory allocation in certain situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service. Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6254-1 - Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the do_prlimit function in the Linux kernel did not properly handle speculative execution barriers. A local attacker could use this to expose sensitive information. It was discovered that a race condition existed in the btrfs file system implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information.
Ubuntu Security Notice 6254-1 - Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the do_prlimit function in the Linux kernel did not properly handle speculative execution barriers. A local attacker could use this to expose sensitive information. It was discovered that a race condition existed in the btrfs file system implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information.
Ubuntu Security Notice 6250-1 - Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6250-1 - Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform data buffer size validation in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly expose sensitive information. Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service (guest crash). Various other issues were also addressed.
Ubuntu Security Notice 6247-1 - David Leadbeater discovered that the netfilter IRC protocol tracking implementation in the Linux Kernel incorrectly handled certain message payloads in some situations. A remote attacker could possibly use this to cause a denial of service or bypass firewall filtering. It was discovered that the IDT 77252 ATM PCI device driver in the Linux kernel did not properly remove any pending timers during device exit, resulting in a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 6246-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6246-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2023-4138-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-4138-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-4137-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1016: A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker. * CVE-2022-42703: A memory leak flaw with us...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1016: A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker. * CVE-2022-42703: A memory leak flaw with us...
Ubuntu Security Notice 6228-1 - It was discovered that the XFS file system implementation in the Linux kernel did not properly perform metadata validation when mounting certain images. An attacker could use this to specially craft a file system image that, when mounted, could cause a denial of service. Wei Chen discovered that the InfiniBand RDMA communication manager implementation in the Linux kernel contained an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6224-1 - It was discovered that the XFS file system implementation in the Linux kernel did not properly perform metadata validation when mounting certain images. An attacker could use this to specially craft a file system image that, when mounted, could cause a denial of service. Wei Chen discovered that the InfiniBand RDMA communication manager implementation in the Linux kernel contained an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6223-1 - It was discovered that the TUN/TAP driver in the Linux kernel did not properly initialize socket data. A local attacker could use this to cause a denial of service. It was discovered that the Real-Time Scheduling Class implementation in the Linux kernel contained a type confusion vulnerability in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6222-1 - Jiasheng Jiang discovered that the HSA Linux kernel driver for AMD Radeon GPU devices did not properly validate memory allocation in certain situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service. Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6212-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.
Debian Linux Security Advisory 5448-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace
Ubuntu Security Notice 6193-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.
Red Hat Security Advisory 2023-3723-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-3708-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2002: A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. * CVE-2023-2124: An out-of-bounds ...
An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.
A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.
An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.
Ubuntu Security Notice 6072-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. Lin Ma discovered a race condition in the io_uring subsystem in the Linux kernel, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6069-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed.
Ubuntu Security Notice 6058-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges.
Ubuntu Security Notice 6047-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed.
Ubuntu Security Notice 6045-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. Gwnaun Jung discovered that the SFB packet scheduling implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6044-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. It was discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6033-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for thisCVE, kernel support for the TCINDEX classifier has been removed. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.