Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:5093: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system.
  • CVE-2023-3610: A use-after-free vulnerability was found in the netfilter: nf_tables component in the Linux kernel due to a missing error handling in the abort path of NFT_MSG_NEWRULE. This flaw allows a local attacker with CAP_NET_ADMIN access capability to cause a local privilege escalation problem.
  • CVE-2023-3776: A use-after-free vulnerability was found in fw_set_parms in net/sched/cls_fw.c in network scheduler sub-component in the Linux Kernel. This issue occurs due to a missing sanity check during cleanup at the time of failure, leading to a misleading reference. This may allow a local attacker to gain local privilege escalation.
  • CVE-2023-4004: A use-after-free flaw was found in the Linux kernel’s netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.
  • CVE-2023-4147: A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
  • CVE-2023-31248: A use-after-free flaw was found in the Linux kernel’s Netfilter module in net/netfilter/nf_tables_api.c in nft_chain_lookup_byid. This flaw allows a local attacker to cause a local privilege escalation issue due to a missing cleanup.
  • CVE-2023-35001: An out-of-bounds (OOB) memory access flaw was found in the Netfilter module in the Linux kernel’s nft_byteorder_eval in net/netfilter/nft_byteorder.c. A bound check failure allows a local attacker with CAP_NET_ADMIN access to cause a local privilege escalation issue due to incorrect data alignment.
Red Hat Security Data
#vulnerability#linux#red_hat#rpm#sap

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (CVE-2023-3390)
  • kernel: netfilter: nf_tables: fix chain binding transaction logic in the abort path of NFT_MSG_NEWRULE (CVE-2023-3610)
  • kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776)
  • kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() (CVE-2023-4004)
  • kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free (CVE-2023-4147)
  • kernel: nf_tables: use-after-free in nft_chain_lookup_byid() (CVE-2023-31248)
  • kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.2 x86_64
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64

Fixes

  • BZ - 2213260 - CVE-2023-3390 kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests
  • BZ - 2220892 - CVE-2023-35001 kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
  • BZ - 2220893 - CVE-2023-31248 kernel: nf_tables: use-after-free in nft_chain_lookup_byid()
  • BZ - 2225097 - CVE-2023-3776 kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
  • BZ - 2225198 - CVE-2023-3610 kernel: netfilter: nf_tables: fix chain binding transaction logic in the abort path of NFT_MSG_NEWRULE
  • BZ - 2225239 - CVE-2023-4147 kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free
  • BZ - 2225275 - CVE-2023-4004 kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove()

CVEs

  • CVE-2023-3390
  • CVE-2023-3610
  • CVE-2023-3776
  • CVE-2023-4004
  • CVE-2023-4147
  • CVE-2023-31248
  • CVE-2023-35001

Red Hat Enterprise Linux for x86_64 9

SRPM

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.src.rpm

SHA-256: 11462ad46d232945f4abdb0ca7161e688c97a38ad5a0d011a1793fc229cb61ba

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.src.rpm

SHA-256: 70c51b65daaff20bc7aa1fec879a3bd2b875d28f49d845a4764113df805f5bf1

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.src.rpm

SHA-256: b3c8fc0b610fe3f1b40b75fa849d3d73b1a7f63cff5c2c44e7f36b64815b7693

x86_64

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.x86_64.rpm

SHA-256: d22e6b1b9832ef86948f01230969ee36d8dd16f42bc5cc85bd7c0c17c743ccd4

kpatch-patch-5_14_0-284_11_1-debuginfo-1-5.el9_2.x86_64.rpm

SHA-256: 56aa1677fbe0ca0fe29a4d5543674e085dfa25917dc3462324e3a6acbf1d9b37

kpatch-patch-5_14_0-284_11_1-debugsource-1-5.el9_2.x86_64.rpm

SHA-256: b553aeb81116598b3ce8a83cd9222239eab14dc8019d54a1fc075c0f4373a9af

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.x86_64.rpm

SHA-256: 6f09291d6803e63ba70cba3c1af1516b67022ffba87a0f70ed397d96a7c7db90

kpatch-patch-5_14_0-284_18_1-debuginfo-1-4.el9_2.x86_64.rpm

SHA-256: a8e5760b28f6e4c9ab29d4f67a3b39d285f51faf351ca96e9be76b85fcdf88a1

kpatch-patch-5_14_0-284_18_1-debugsource-1-4.el9_2.x86_64.rpm

SHA-256: 64eac2f4d0222e02ce923d80ebd931e4d9ba811062464ca8887d89b6a93e5531

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.x86_64.rpm

SHA-256: 8a22f75bc0e3fe4373a18de5f988158f8531729b0f20eb41ffc54e842cea74db

kpatch-patch-5_14_0-284_25_1-debuginfo-1-3.el9_2.x86_64.rpm

SHA-256: fb0f21e779b2327da1962237d45083fac4cecf969b6cacc006712a428a5efc14

kpatch-patch-5_14_0-284_25_1-debugsource-1-3.el9_2.x86_64.rpm

SHA-256: 9e095495505ffc1ebadcd819c1db5753087d047f54a2893344a5fec6ddbec7fc

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2

SRPM

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.src.rpm

SHA-256: 11462ad46d232945f4abdb0ca7161e688c97a38ad5a0d011a1793fc229cb61ba

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.src.rpm

SHA-256: 70c51b65daaff20bc7aa1fec879a3bd2b875d28f49d845a4764113df805f5bf1

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.src.rpm

SHA-256: b3c8fc0b610fe3f1b40b75fa849d3d73b1a7f63cff5c2c44e7f36b64815b7693

x86_64

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.x86_64.rpm

SHA-256: d22e6b1b9832ef86948f01230969ee36d8dd16f42bc5cc85bd7c0c17c743ccd4

kpatch-patch-5_14_0-284_11_1-debuginfo-1-5.el9_2.x86_64.rpm

SHA-256: 56aa1677fbe0ca0fe29a4d5543674e085dfa25917dc3462324e3a6acbf1d9b37

kpatch-patch-5_14_0-284_11_1-debugsource-1-5.el9_2.x86_64.rpm

SHA-256: b553aeb81116598b3ce8a83cd9222239eab14dc8019d54a1fc075c0f4373a9af

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.x86_64.rpm

SHA-256: 6f09291d6803e63ba70cba3c1af1516b67022ffba87a0f70ed397d96a7c7db90

kpatch-patch-5_14_0-284_18_1-debuginfo-1-4.el9_2.x86_64.rpm

SHA-256: a8e5760b28f6e4c9ab29d4f67a3b39d285f51faf351ca96e9be76b85fcdf88a1

kpatch-patch-5_14_0-284_18_1-debugsource-1-4.el9_2.x86_64.rpm

SHA-256: 64eac2f4d0222e02ce923d80ebd931e4d9ba811062464ca8887d89b6a93e5531

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.x86_64.rpm

SHA-256: 8a22f75bc0e3fe4373a18de5f988158f8531729b0f20eb41ffc54e842cea74db

kpatch-patch-5_14_0-284_25_1-debuginfo-1-3.el9_2.x86_64.rpm

SHA-256: fb0f21e779b2327da1962237d45083fac4cecf969b6cacc006712a428a5efc14

kpatch-patch-5_14_0-284_25_1-debugsource-1-3.el9_2.x86_64.rpm

SHA-256: 9e095495505ffc1ebadcd819c1db5753087d047f54a2893344a5fec6ddbec7fc

Red Hat Enterprise Linux Server - AUS 9.2

SRPM

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.src.rpm

SHA-256: 11462ad46d232945f4abdb0ca7161e688c97a38ad5a0d011a1793fc229cb61ba

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.src.rpm

SHA-256: 70c51b65daaff20bc7aa1fec879a3bd2b875d28f49d845a4764113df805f5bf1

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.src.rpm

SHA-256: b3c8fc0b610fe3f1b40b75fa849d3d73b1a7f63cff5c2c44e7f36b64815b7693

x86_64

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.x86_64.rpm

SHA-256: d22e6b1b9832ef86948f01230969ee36d8dd16f42bc5cc85bd7c0c17c743ccd4

kpatch-patch-5_14_0-284_11_1-debuginfo-1-5.el9_2.x86_64.rpm

SHA-256: 56aa1677fbe0ca0fe29a4d5543674e085dfa25917dc3462324e3a6acbf1d9b37

kpatch-patch-5_14_0-284_11_1-debugsource-1-5.el9_2.x86_64.rpm

SHA-256: b553aeb81116598b3ce8a83cd9222239eab14dc8019d54a1fc075c0f4373a9af

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.x86_64.rpm

SHA-256: 6f09291d6803e63ba70cba3c1af1516b67022ffba87a0f70ed397d96a7c7db90

kpatch-patch-5_14_0-284_18_1-debuginfo-1-4.el9_2.x86_64.rpm

SHA-256: a8e5760b28f6e4c9ab29d4f67a3b39d285f51faf351ca96e9be76b85fcdf88a1

kpatch-patch-5_14_0-284_18_1-debugsource-1-4.el9_2.x86_64.rpm

SHA-256: 64eac2f4d0222e02ce923d80ebd931e4d9ba811062464ca8887d89b6a93e5531

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.x86_64.rpm

SHA-256: 8a22f75bc0e3fe4373a18de5f988158f8531729b0f20eb41ffc54e842cea74db

kpatch-patch-5_14_0-284_25_1-debuginfo-1-3.el9_2.x86_64.rpm

SHA-256: fb0f21e779b2327da1962237d45083fac4cecf969b6cacc006712a428a5efc14

kpatch-patch-5_14_0-284_25_1-debugsource-1-3.el9_2.x86_64.rpm

SHA-256: 9e095495505ffc1ebadcd819c1db5753087d047f54a2893344a5fec6ddbec7fc

Red Hat Enterprise Linux for Power, little endian 9

SRPM

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.src.rpm

SHA-256: 11462ad46d232945f4abdb0ca7161e688c97a38ad5a0d011a1793fc229cb61ba

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.src.rpm

SHA-256: 70c51b65daaff20bc7aa1fec879a3bd2b875d28f49d845a4764113df805f5bf1

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.src.rpm

SHA-256: b3c8fc0b610fe3f1b40b75fa849d3d73b1a7f63cff5c2c44e7f36b64815b7693

ppc64le

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.ppc64le.rpm

SHA-256: 33214962dd29644ca221b623b671ae2aeca3c6150ef0327f03698fe0dfbb651e

kpatch-patch-5_14_0-284_11_1-debuginfo-1-5.el9_2.ppc64le.rpm

SHA-256: 12abcd8533fb0222d40558c56c458e92a0ade07ccd7f535e018806f6396efaed

kpatch-patch-5_14_0-284_11_1-debugsource-1-5.el9_2.ppc64le.rpm

SHA-256: de9dd1b8b6558a4e43f7799e5dfb8599d57efda624b3667a4b1f82aee86ccde2

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.ppc64le.rpm

SHA-256: 31a92b474e5cf29a2859d626a36eb1e6dd0a536bd34b604886c615086b180706

kpatch-patch-5_14_0-284_18_1-debuginfo-1-4.el9_2.ppc64le.rpm

SHA-256: 17004b3776bbc6a79abda0ee4a62dbc9d165ede0f5e04af4d79cdcaa2bff5aae

kpatch-patch-5_14_0-284_18_1-debugsource-1-4.el9_2.ppc64le.rpm

SHA-256: 50b41e8166959f7db76e8e1fb6043c606d9f2ad70b99517ca7a926f4aae0314c

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.ppc64le.rpm

SHA-256: d0cd2f2fb1f4f8d73df75dd7bfb7b9a353ed733504d89c3a843371541996d9d8

kpatch-patch-5_14_0-284_25_1-debuginfo-1-3.el9_2.ppc64le.rpm

SHA-256: 623724de555e119ae19d4d81be632eb9fff8dd3ef0cdde982e983b2d472e202c

kpatch-patch-5_14_0-284_25_1-debugsource-1-3.el9_2.ppc64le.rpm

SHA-256: 01ee539bc36da63bd283b8841076d734998371aaf4ba55483377dbfcacab886b

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2

SRPM

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.src.rpm

SHA-256: 11462ad46d232945f4abdb0ca7161e688c97a38ad5a0d011a1793fc229cb61ba

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.src.rpm

SHA-256: 70c51b65daaff20bc7aa1fec879a3bd2b875d28f49d845a4764113df805f5bf1

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.src.rpm

SHA-256: b3c8fc0b610fe3f1b40b75fa849d3d73b1a7f63cff5c2c44e7f36b64815b7693

ppc64le

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.ppc64le.rpm

SHA-256: 33214962dd29644ca221b623b671ae2aeca3c6150ef0327f03698fe0dfbb651e

kpatch-patch-5_14_0-284_11_1-debuginfo-1-5.el9_2.ppc64le.rpm

SHA-256: 12abcd8533fb0222d40558c56c458e92a0ade07ccd7f535e018806f6396efaed

kpatch-patch-5_14_0-284_11_1-debugsource-1-5.el9_2.ppc64le.rpm

SHA-256: de9dd1b8b6558a4e43f7799e5dfb8599d57efda624b3667a4b1f82aee86ccde2

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.ppc64le.rpm

SHA-256: 31a92b474e5cf29a2859d626a36eb1e6dd0a536bd34b604886c615086b180706

kpatch-patch-5_14_0-284_18_1-debuginfo-1-4.el9_2.ppc64le.rpm

SHA-256: 17004b3776bbc6a79abda0ee4a62dbc9d165ede0f5e04af4d79cdcaa2bff5aae

kpatch-patch-5_14_0-284_18_1-debugsource-1-4.el9_2.ppc64le.rpm

SHA-256: 50b41e8166959f7db76e8e1fb6043c606d9f2ad70b99517ca7a926f4aae0314c

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.ppc64le.rpm

SHA-256: d0cd2f2fb1f4f8d73df75dd7bfb7b9a353ed733504d89c3a843371541996d9d8

kpatch-patch-5_14_0-284_25_1-debuginfo-1-3.el9_2.ppc64le.rpm

SHA-256: 623724de555e119ae19d4d81be632eb9fff8dd3ef0cdde982e983b2d472e202c

kpatch-patch-5_14_0-284_25_1-debugsource-1-3.el9_2.ppc64le.rpm

SHA-256: 01ee539bc36da63bd283b8841076d734998371aaf4ba55483377dbfcacab886b

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2

SRPM

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.src.rpm

SHA-256: 11462ad46d232945f4abdb0ca7161e688c97a38ad5a0d011a1793fc229cb61ba

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.src.rpm

SHA-256: 70c51b65daaff20bc7aa1fec879a3bd2b875d28f49d845a4764113df805f5bf1

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.src.rpm

SHA-256: b3c8fc0b610fe3f1b40b75fa849d3d73b1a7f63cff5c2c44e7f36b64815b7693

ppc64le

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.ppc64le.rpm

SHA-256: 33214962dd29644ca221b623b671ae2aeca3c6150ef0327f03698fe0dfbb651e

kpatch-patch-5_14_0-284_11_1-debuginfo-1-5.el9_2.ppc64le.rpm

SHA-256: 12abcd8533fb0222d40558c56c458e92a0ade07ccd7f535e018806f6396efaed

kpatch-patch-5_14_0-284_11_1-debugsource-1-5.el9_2.ppc64le.rpm

SHA-256: de9dd1b8b6558a4e43f7799e5dfb8599d57efda624b3667a4b1f82aee86ccde2

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.ppc64le.rpm

SHA-256: 31a92b474e5cf29a2859d626a36eb1e6dd0a536bd34b604886c615086b180706

kpatch-patch-5_14_0-284_18_1-debuginfo-1-4.el9_2.ppc64le.rpm

SHA-256: 17004b3776bbc6a79abda0ee4a62dbc9d165ede0f5e04af4d79cdcaa2bff5aae

kpatch-patch-5_14_0-284_18_1-debugsource-1-4.el9_2.ppc64le.rpm

SHA-256: 50b41e8166959f7db76e8e1fb6043c606d9f2ad70b99517ca7a926f4aae0314c

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.ppc64le.rpm

SHA-256: d0cd2f2fb1f4f8d73df75dd7bfb7b9a353ed733504d89c3a843371541996d9d8

kpatch-patch-5_14_0-284_25_1-debuginfo-1-3.el9_2.ppc64le.rpm

SHA-256: 623724de555e119ae19d4d81be632eb9fff8dd3ef0cdde982e983b2d472e202c

kpatch-patch-5_14_0-284_25_1-debugsource-1-3.el9_2.ppc64le.rpm

SHA-256: 01ee539bc36da63bd283b8841076d734998371aaf4ba55483377dbfcacab886b

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2

SRPM

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.src.rpm

SHA-256: 11462ad46d232945f4abdb0ca7161e688c97a38ad5a0d011a1793fc229cb61ba

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.src.rpm

SHA-256: 70c51b65daaff20bc7aa1fec879a3bd2b875d28f49d845a4764113df805f5bf1

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.src.rpm

SHA-256: b3c8fc0b610fe3f1b40b75fa849d3d73b1a7f63cff5c2c44e7f36b64815b7693

x86_64

kpatch-patch-5_14_0-284_11_1-1-5.el9_2.x86_64.rpm

SHA-256: d22e6b1b9832ef86948f01230969ee36d8dd16f42bc5cc85bd7c0c17c743ccd4

kpatch-patch-5_14_0-284_11_1-debuginfo-1-5.el9_2.x86_64.rpm

SHA-256: 56aa1677fbe0ca0fe29a4d5543674e085dfa25917dc3462324e3a6acbf1d9b37

kpatch-patch-5_14_0-284_11_1-debugsource-1-5.el9_2.x86_64.rpm

SHA-256: b553aeb81116598b3ce8a83cd9222239eab14dc8019d54a1fc075c0f4373a9af

kpatch-patch-5_14_0-284_18_1-1-4.el9_2.x86_64.rpm

SHA-256: 6f09291d6803e63ba70cba3c1af1516b67022ffba87a0f70ed397d96a7c7db90

kpatch-patch-5_14_0-284_18_1-debuginfo-1-4.el9_2.x86_64.rpm

SHA-256: a8e5760b28f6e4c9ab29d4f67a3b39d285f51faf351ca96e9be76b85fcdf88a1

kpatch-patch-5_14_0-284_18_1-debugsource-1-4.el9_2.x86_64.rpm

SHA-256: 64eac2f4d0222e02ce923d80ebd931e4d9ba811062464ca8887d89b6a93e5531

kpatch-patch-5_14_0-284_25_1-1-3.el9_2.x86_64.rpm

SHA-256: 8a22f75bc0e3fe4373a18de5f988158f8531729b0f20eb41ffc54e842cea74db

kpatch-patch-5_14_0-284_25_1-debuginfo-1-3.el9_2.x86_64.rpm

SHA-256: fb0f21e779b2327da1962237d45083fac4cecf969b6cacc006712a428a5efc14

kpatch-patch-5_14_0-284_25_1-debugsource-1-3.el9_2.x86_64.rpm

SHA-256: 9e095495505ffc1ebadcd819c1db5753087d047f54a2893344a5fec6ddbec7fc

Related news

Red Hat Security Advisory 2024-1278-03

Red Hat Security Advisory 2024-1278-03 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Issues addressed include out of bounds write and use-after-free vulnerabilities.

Red Hat Security Advisory 2024-1268-03

Red Hat Security Advisory 2024-1268-03 - An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Issues addressed include null pointer, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2024-0262-03

Red Hat Security Advisory 2024-0262-03 - An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-7423-01

Red Hat Security Advisory 2023-7423-01 - An update for kernel is now available for Red Hat Enterprise Linux 7. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-7294-01

Red Hat Security Advisory 2023-7294-01 - An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support.

Ubuntu Security Notice USN-6442-1

Ubuntu Security Notice 6442-1 - Ross Lagerwall discovered that the Xen netback backend driver in the Linux kernel did not properly handle certain unusual packets from a paravirtualized network frontend, leading to a buffer overflow. An attacker in a guest VM could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the netfilter subsystem in the Linux kernel did not properly handle PIPAPO element removal, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service or execute arbitrary code.

CVE-2023-22130: Oracle Critical Patch Update Advisory - October 2023

Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

Kernel Live Patch Security Notice LSN-0098-1

It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). Various other issues were also addressed.

Red Hat Security Advisory 2023-5627-01

Red Hat Security Advisory 2023-5627-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, null pointer, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5604-01

Red Hat Security Advisory 2023-5604-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, out of bounds write, and use-after-free vulnerabilities.

RHSA-2023:5628: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1095: A NULL pointer dereference flaw was found in the Linux kernel’s netfilter subsystem. The issue could occur due to an error in nf_tables_updtable while freeing a transaction o...

RHSA-2023:5622: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3609: A double-free flaw was found in u32_set_parms in net/sched/cls_u32.c in the Network Scheduler component in the Linux kernel. This flaw allows a local attacker to use a failure event to mishandle the reference counter, leading to a local privilege escalation threat. * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilter subsyst...

RHSA-2023:5574: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3609: A double-free flaw was found in u32_set_parms in net/sched/cls_u32.c in the Network Scheduler component in the Linux kernel. This flaw allows a local attacker to use a failure event to mishandle the reference counter, leading to a local privilege escalation threat. * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilter s...

Ubuntu Security Notice USN-6385-1

Ubuntu Security Notice 6385-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.

Red Hat Security Advisory 2023-5233-01

Red Hat Security Advisory 2023-5233-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.4 images.

Red Hat Security Advisory 2023-5238-01

Red Hat Security Advisory 2023-5238-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-5221-01

Red Hat Security Advisory 2023-5221-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.

RHSA-2023:5235: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate t...

RHSA-2023:5233: Red Hat Security Advisory: OpenShift Virtualization 4.13.4 security and bug fix update

Red Hat OpenShift Virtualization release 4.13.4 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.

RHSA-2023:5221: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3090: A flaw was found in the IPVLAN network driver in the Linux kernel. This issue is caused by missing skb->cb initialization in `__ip_options_echo` and can lead to an out-of-bounds write stack overflow. This may allow a local user to cause a denial of service or potentially achieve local privilege escalation. * CVE-2023-3390: A use-after-free f...

Red Hat Security Advisory 2023-5069-01

Red Hat Security Advisory 2023-5069-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5091-01

Red Hat Security Advisory 2023-5091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5091-01

Red Hat Security Advisory 2023-5091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5091-01

Red Hat Security Advisory 2023-5091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5091-01

Red Hat Security Advisory 2023-5091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5091-01

Red Hat Security Advisory 2023-5091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5091-01

Red Hat Security Advisory 2023-5091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5091-01

Red Hat Security Advisory 2023-5091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5093-01

Red Hat Security Advisory 2023-5093-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-5093-01

Red Hat Security Advisory 2023-5093-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-5093-01

Red Hat Security Advisory 2023-5093-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-5093-01

Red Hat Security Advisory 2023-5093-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

RHSA-2023:5091: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1637: A flaw was found in the Linux kernel X86 CPU Power management when resuming CPU from suspend-to-RAM. This issue could allow a local user unauthorized access to memory from the CPU. * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can...

Debian Security Advisory 5492-1

Debian Linux Security Advisory 5492-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Debian Security Advisory 5492-1

Debian Linux Security Advisory 5492-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Debian Security Advisory 5492-1

Debian Linux Security Advisory 5492-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Kernel Live Patch Security Notice LSN-0097-1

It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Querijn Voet discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Various other vulnerabilities were also discovered and addressed.

Ubuntu Security Notice USN-6342-1

Ubuntu Security Notice 6342-1 - Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information. Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear operations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6341-1

Ubuntu Security Notice 6341-1 - Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the do_prlimit function in the Linux kernel did not properly handle speculative execution barriers. A local attacker could use this to expose sensitive information. It was discovered that a use-after-free vulnerability existed in the IEEE 1394 implementation in the Linux kernel. A privileged attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-4961-01

Red Hat Security Advisory 2023-4961-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-4961-01

Red Hat Security Advisory 2023-4961-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-4961-01

Red Hat Security Advisory 2023-4961-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-4962-01

Red Hat Security Advisory 2023-4962-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.

RHSA-2023:4967: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privileg...

RHSA-2023:4967: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privileg...

RHSA-2023:4967: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privileg...

RHSA-2023:4961: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which ...

RHSA-2023:4961: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which ...

RHSA-2023:4961: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which ...

Ubuntu Security Notice USN-6332-1

Ubuntu Security Notice 6332-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6332-1

Ubuntu Security Notice 6332-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6332-1

Ubuntu Security Notice 6332-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6330-1

Ubuntu Security Notice 6330-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6330-1

Ubuntu Security Notice 6330-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6325-1

Ubuntu Security Notice 6325-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6325-1

Ubuntu Security Notice 6325-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Red Hat Security Advisory 2023-4888-01

Red Hat Security Advisory 2023-4888-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.

Ubuntu Security Notice USN-6318-1

Ubuntu Security Notice 6318-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6318-1

Ubuntu Security Notice 6318-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6318-1

Ubuntu Security Notice 6318-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6316-1

Ubuntu Security Notice 6316-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6315-1

Ubuntu Security Notice 6315-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.

Debian Security Advisory 5480-1

Debian Linux Security Advisory 5480-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Ubuntu Security Notice USN-6285-1

Ubuntu Security Notice 6285-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

Ubuntu Security Notice USN-6285-1

Ubuntu Security Notice 6285-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

Ubuntu Security Notice USN-6285-1

Ubuntu Security Notice 6285-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

Ubuntu Security Notice USN-6285-1

Ubuntu Security Notice 6285-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

Ubuntu Security Notice USN-6285-1

Ubuntu Security Notice 6285-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

CVE-2023-4147: cve-details

A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.

CVE-2023-4004: Invalid Bug ID

A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.

Ubuntu Security Notice USN-6261-1

Ubuntu Security Notice 6261-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

Ubuntu Security Notice USN-6261-1

Ubuntu Security Notice 6261-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

Debian Security Advisory 5461-1

Debian Linux Security Advisory 5461-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Debian Security Advisory 5461-1

Debian Linux Security Advisory 5461-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Ubuntu Security Notice USN-6260-1

Ubuntu Security Notice 6260-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

Ubuntu Security Notice USN-6255-1

Ubuntu Security Notice 6255-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6255-1

Ubuntu Security Notice 6255-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6255-1

Ubuntu Security Notice 6255-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6250-1

Ubuntu Security Notice 6250-1 - Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6250-1

Ubuntu Security Notice 6250-1 - Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6250-1

Ubuntu Security Notice 6250-1 - Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6246-1

Ubuntu Security Notice 6246-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

CVE-2023-3610

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered. We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.

Debian Security Advisory 5453-1

Debian Linux Security Advisory 5453-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Debian Security Advisory 5453-1

Debian Linux Security Advisory 5453-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

CVE-2023-31248: do not ignore genmask when looking up chain by id

Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace

CVE-2023-35001: prevent OOB access in nft_byteorder_eval

Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace