Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:4380: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-3090: A flaw was found in the IPVLAN network driver in the Linux kernel. This issue is caused by missing skb->cb initialization in __ip_options_echo and can lead to an out-of-bounds write stack overflow. This may allow a local user to cause a denial of service or potentially achieve local privilege escalation.
  • CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets with a total size of 252 bytes, which results in an out-of-bounds write when the third packet enters fl_set_geneve_opt, potentially leading to a denial of service or privilege escalation.
Red Hat Security Data
#vulnerability#web#linux#red_hat#dos#nodejs#js#kubernetes#aws#rpm#sap

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

All Products

Issued:

2023-08-01

Updated:

2023-08-01

RHSA-2023:4380 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090)
  • kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.2 x86_64
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64

Fixes

  • BZ - 2215768 - CVE-2023-35788 kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
  • BZ - 2218672 - CVE-2023-3090 kernel: ipvlan: out-of-bounds write caused by unclear skb->cb

Red Hat Enterprise Linux for x86_64 9

SRPM

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm

SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm

SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b

x86_64

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.x86_64.rpm

SHA-256: d863e879173ea04e004b4193cedc20376cf2452f315557564b795a3a99936b88

kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.x86_64.rpm

SHA-256: e10c1965d947e6c6a781571fbc53d675b1d43ebfdb7b7c698ee8fe876670286d

kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.x86_64.rpm

SHA-256: edecce194c278e9af1ceab177bfaf00d524b0315487186b4f3802e46b3069258

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.x86_64.rpm

SHA-256: 22c1da62d875d2afd0bf0d108ffc5476036eb171c1f61a880ca6731c611de5b4

kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.x86_64.rpm

SHA-256: 85c21694e7ff4c978f31163e911161b99d4f519e05c9e55158fd572400c44457

kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.x86_64.rpm

SHA-256: c4a3c74e380e02bd98d35877b8052b38d73b26848fc91d60a98fbe5dd8b19b5b

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2

SRPM

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm

SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm

SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b

x86_64

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.x86_64.rpm

SHA-256: d863e879173ea04e004b4193cedc20376cf2452f315557564b795a3a99936b88

kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.x86_64.rpm

SHA-256: e10c1965d947e6c6a781571fbc53d675b1d43ebfdb7b7c698ee8fe876670286d

kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.x86_64.rpm

SHA-256: edecce194c278e9af1ceab177bfaf00d524b0315487186b4f3802e46b3069258

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.x86_64.rpm

SHA-256: 22c1da62d875d2afd0bf0d108ffc5476036eb171c1f61a880ca6731c611de5b4

kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.x86_64.rpm

SHA-256: 85c21694e7ff4c978f31163e911161b99d4f519e05c9e55158fd572400c44457

kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.x86_64.rpm

SHA-256: c4a3c74e380e02bd98d35877b8052b38d73b26848fc91d60a98fbe5dd8b19b5b

Red Hat Enterprise Linux Server - AUS 9.2

SRPM

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm

SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm

SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b

x86_64

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.x86_64.rpm

SHA-256: d863e879173ea04e004b4193cedc20376cf2452f315557564b795a3a99936b88

kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.x86_64.rpm

SHA-256: e10c1965d947e6c6a781571fbc53d675b1d43ebfdb7b7c698ee8fe876670286d

kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.x86_64.rpm

SHA-256: edecce194c278e9af1ceab177bfaf00d524b0315487186b4f3802e46b3069258

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.x86_64.rpm

SHA-256: 22c1da62d875d2afd0bf0d108ffc5476036eb171c1f61a880ca6731c611de5b4

kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.x86_64.rpm

SHA-256: 85c21694e7ff4c978f31163e911161b99d4f519e05c9e55158fd572400c44457

kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.x86_64.rpm

SHA-256: c4a3c74e380e02bd98d35877b8052b38d73b26848fc91d60a98fbe5dd8b19b5b

Red Hat Enterprise Linux for Power, little endian 9

SRPM

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm

SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm

SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b

ppc64le

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.ppc64le.rpm

SHA-256: 073eb2ea7ec5400152ae281303bc5d95653477f9fd194e4dee97f8591917c3cb

kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.ppc64le.rpm

SHA-256: ac778fad760b677d65faf947a86f76efd4fcbe70449fa49d53a9dd00d9809839

kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.ppc64le.rpm

SHA-256: e675694f3b80e79b2d19d5ac3c987b391b643cf8baa42550f0754472145eb209

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.ppc64le.rpm

SHA-256: 2be2fd13dc5b6459f66b3fbab5df8614e783224550d2934dd4685ba2408f4102

kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.ppc64le.rpm

SHA-256: 67ff5d51a1da267da2c2fcec5ba7620062fb67ccfc6a9229030ea524fe182621

kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.ppc64le.rpm

SHA-256: f27e6d7ede069012436db165f9d5457d6ed2cd0e78b776e59e5ec0bfc6331905

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2

SRPM

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm

SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm

SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b

ppc64le

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.ppc64le.rpm

SHA-256: 073eb2ea7ec5400152ae281303bc5d95653477f9fd194e4dee97f8591917c3cb

kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.ppc64le.rpm

SHA-256: ac778fad760b677d65faf947a86f76efd4fcbe70449fa49d53a9dd00d9809839

kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.ppc64le.rpm

SHA-256: e675694f3b80e79b2d19d5ac3c987b391b643cf8baa42550f0754472145eb209

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.ppc64le.rpm

SHA-256: 2be2fd13dc5b6459f66b3fbab5df8614e783224550d2934dd4685ba2408f4102

kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.ppc64le.rpm

SHA-256: 67ff5d51a1da267da2c2fcec5ba7620062fb67ccfc6a9229030ea524fe182621

kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.ppc64le.rpm

SHA-256: f27e6d7ede069012436db165f9d5457d6ed2cd0e78b776e59e5ec0bfc6331905

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2

SRPM

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm

SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm

SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b

ppc64le

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.ppc64le.rpm

SHA-256: 073eb2ea7ec5400152ae281303bc5d95653477f9fd194e4dee97f8591917c3cb

kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.ppc64le.rpm

SHA-256: ac778fad760b677d65faf947a86f76efd4fcbe70449fa49d53a9dd00d9809839

kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.ppc64le.rpm

SHA-256: e675694f3b80e79b2d19d5ac3c987b391b643cf8baa42550f0754472145eb209

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.ppc64le.rpm

SHA-256: 2be2fd13dc5b6459f66b3fbab5df8614e783224550d2934dd4685ba2408f4102

kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.ppc64le.rpm

SHA-256: 67ff5d51a1da267da2c2fcec5ba7620062fb67ccfc6a9229030ea524fe182621

kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.ppc64le.rpm

SHA-256: f27e6d7ede069012436db165f9d5457d6ed2cd0e78b776e59e5ec0bfc6331905

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2

SRPM

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm

SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm

SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b

x86_64

kpatch-patch-5_14_0-284_11_1-1-2.el9_2.x86_64.rpm

SHA-256: d863e879173ea04e004b4193cedc20376cf2452f315557564b795a3a99936b88

kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.x86_64.rpm

SHA-256: e10c1965d947e6c6a781571fbc53d675b1d43ebfdb7b7c698ee8fe876670286d

kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.x86_64.rpm

SHA-256: edecce194c278e9af1ceab177bfaf00d524b0315487186b4f3802e46b3069258

kpatch-patch-5_14_0-284_18_1-1-1.el9_2.x86_64.rpm

SHA-256: 22c1da62d875d2afd0bf0d108ffc5476036eb171c1f61a880ca6731c611de5b4

kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.x86_64.rpm

SHA-256: 85c21694e7ff4c978f31163e911161b99d4f519e05c9e55158fd572400c44457

kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.x86_64.rpm

SHA-256: c4a3c74e380e02bd98d35877b8052b38d73b26848fc91d60a98fbe5dd8b19b5b

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Related news

Kernel Live Patch Security Notice LSN-0098-1

It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). Various other issues were also addressed.

RHSA-2023:5548: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3090: A flaw was found in the IPVLAN network driver in the Linux kernel. This issue is caused by missing skb->cb initialization in `__ip_options_echo` and can lead to an out-of-bounds write stack overflow. This may allow a local user to cause a denial of service or potentially achieve local privilege escalation. * CVE-202...

Ubuntu Security Notice USN-6385-1

Ubuntu Security Notice 6385-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.

Red Hat Security Advisory 2023-5255-01

Red Hat Security Advisory 2023-5255-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine- tuning for systems with extremely high determinism requirements. Issues addressed include information leakage, out of bounds write, and use-after-free vulnerabilities.

Kernel Live Patch Security Notice LSN-0097-1

It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Querijn Voet discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Various other vulnerabilities were also discovered and addressed.

Red Hat Security Advisory 2023-4967-01

Red Hat Security Advisory 2023-4967-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.

RHSA-2023:4962: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can...

RHSA-2023:4888: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code l...

Red Hat Security Advisory 2023-4828-01

Red Hat Security Advisory 2023-4828-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

Red Hat Security Advisory 2023-4834-01

Red Hat Security Advisory 2023-4834-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

Red Hat Security Advisory 2023-4815-01

Red Hat Security Advisory 2023-4815-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access and out of bounds write vulnerabilities.

RHSA-2023:4815: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2124: An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user...

RHSA-2023:4828: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3090: A flaw was found in the IPVLAN network driver in the Linux kernel. This issue is caused by missing skb->cb initialization in `__ip_options_echo` and can lead to an out-of-bounds write stack overflow. This may allow a local user to cause a denial of service or potentially achieve local privilege escalation.

RHSA-2023:4817: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2124: An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-3090: A flaw was found in the IPVLAN netwo...

Red Hat Security Advisory 2023-4697-01

Red Hat Security Advisory 2023-4697-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.

RHSA-2023:4698: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets with a total size of 252 bytes, which results in an out-of-bounds write when the third packet enters fl_set_geneve_opt, poten...

Debian Security Advisory 5480-1

Debian Linux Security Advisory 5480-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Red Hat Security Advisory 2023-4664-01

Red Hat Security Advisory 2023-4664-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.3 images. Issues addressed include a denial of service vulnerability.

RHSA-2023:4664: Red Hat Security Advisory: OpenShift Virtualization 4.13.3 Images security and bug fix update

Red Hat OpenShift Virtualization release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Con...

Red Hat Security Advisory 2023-4456-01

Red Hat Security Advisory 2023-4456-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.8. Issues addressed include an add administrator vulnerability.

RHSA-2023:4515: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privilege esca...

RHSA-2023:4516: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch-4_18_0-147_78_1, kpatch-patch-4_18_0-147_80_1, kpatch-patch-4_18_0-147_81_1, kpatch-patch-4_18_0-147_83_1, and kpatch-patch-4_18_0-147_85_1 is now available for Red Hat Enterprise Linux 8.1. Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, w...

Red Hat Security Advisory 2023-4380-01

Red Hat Security Advisory 2023-4380-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

Red Hat Security Advisory 2023-4380-01

Red Hat Security Advisory 2023-4380-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

RHSA-2023:4378: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-45869: A flaw was found in the Linux kernel in the KVM. A race condition in direct_page_fault allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualization and the TDP MMU are enabled. * CVE-2023-0458: A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() ...

Ubuntu Security Notice USN-6261-1

Ubuntu Security Notice 6261-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

Ubuntu Security Notice USN-6260-1

Ubuntu Security Notice 6260-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

Ubuntu Security Notice USN-6256-1

Ubuntu Security Notice 6256-1 - Jiasheng Jiang discovered that the HSA Linux kernel driver for AMD Radeon GPU devices did not properly validate memory allocation in certain situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service. Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service.

Ubuntu Security Notice USN-6255-1

Ubuntu Security Notice 6255-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6254-1

Ubuntu Security Notice 6254-1 - Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the do_prlimit function in the Linux kernel did not properly handle speculative execution barriers. A local attacker could use this to expose sensitive information. It was discovered that a race condition existed in the btrfs file system implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information.

Ubuntu Security Notice USN-6250-1

Ubuntu Security Notice 6250-1 - Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6246-1

Ubuntu Security Notice 6246-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6234-1

Ubuntu Security Notice 6234-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Ubuntu Security Notice USN-6223-1

Ubuntu Security Notice 6223-1 - It was discovered that the TUN/TAP driver in the Linux kernel did not properly initialize socket data. A local attacker could use this to cause a denial of service. It was discovered that the Real-Time Scheduling Class implementation in the Linux kernel contained a type confusion vulnerability in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6220-1

Ubuntu Security Notice 6220-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Ubuntu Security Notice USN-6212-1

Ubuntu Security Notice 6212-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Ubuntu Security Notice USN-6206-1

Ubuntu Security Notice 6206-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NTFS file system implementation in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service.

Debian Security Advisory 5448-1

Debian Linux Security Advisory 5448-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Debian Security Advisory 5448-1

Debian Linux Security Advisory 5448-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Ubuntu Security Notice USN-6193-1

Ubuntu Security Notice 6193-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

CVE-2023-3090

A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation. The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled. We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.

CVE-2023-35788: security - Linux kernel: off-by-one in fl_set_geneve_opt

An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.