[RHSA-2023:5622] kernel security and bug fix update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609)
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
Low memory deadlock with md devices and external (imsm) metadata handling (BZ#1703180)
cifs: memory leak in smb2_query_symlink (BZ#2166706)
bnxt_en: panic in bnxt_tx_int Redux (BZ#2175062)
NFS client loop in BIND_CONN_TO_SESSION (BZ#2219604)
- ID
- RHSA-2023:5622
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:5622
- Published
-
2023-10-10T00:00:00
(11 months ago) - Modified
-
2023-10-10T00:00:00
(11 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1750
- ALAS-2023-1783
- ALAS-2023-1792
- ALAS2-2023-2050
- ALAS2-2023-2130
- ALAS2-2023-2179
- ALPINE:CVE-2023-32233
- ALSA-2023:3349
- ALSA-2023:3723
- ALSA-2023:5069
- ALSA-2023:5244
- ALSA-2023:7077
- DSA-5402-1
- DSA-5453-1
- DSA-5480-1
- ELSA-2023-12393
- ELSA-2023-12394
- ELSA-2023-12412
- ELSA-2023-12413
- ELSA-2023-12842
- ELSA-2023-3349
- ELSA-2023-3723
- ELSA-2023-5069
- ELSA-2023-5244
- ELSA-2023-5622
- ELSA-2023-6583
- ELSA-2023-7077
- FEDORA-2023-3661f028b8
- FEDORA-2023-e4e985b5dd
- MS:CVE-2023-3609
- RHSA-2023:3349
- RHSA-2023:3350
- RHSA-2023:3351
- RHSA-2023:3705
- RHSA-2023:3708
- RHSA-2023:3723
- RHSA-2023:5069
- RHSA-2023:5091
- RHSA-2023:5093
- RHSA-2023:5221
- RHSA-2023:5244
- RHSA-2023:5255
- RHSA-2023:5574
- RHSA-2023:5621
- RHSA-2023:6901
- RHSA-2023:7077
- RLSA-2023:5244
- SSA:2023-172-02
- SSA:2023-325-01
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3006-1
- SUSE-SU-2023:3171-1
- SUSE-SU-2023:3172-1
- SUSE-SU-2023:3180-1
- SUSE-SU-2023:3182-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3309-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3329-1
- SUSE-SU-2023:3349-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3392-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3566-1
- SUSE-SU-2023:3571-1
- SUSE-SU-2023:3572-1
- SUSE-SU-2023:3576-1
- SUSE-SU-2023:3582-1
- SUSE-SU-2023:3585-1
- SUSE-SU-2023:3592-1
- SUSE-SU-2023:3594-1
- SUSE-SU-2023:3595-1
- SUSE-SU-2023:3596-1
- SUSE-SU-2023:3598-1
- SUSE-SU-2023:3603-1
- SUSE-SU-2023:3607-1
- SUSE-SU-2023:3612-1
- SUSE-SU-2023:3620-1
- SUSE-SU-2023:3621-1
- SUSE-SU-2023:3622-1
- SUSE-SU-2023:3623-1
- SUSE-SU-2023:3627-1
- SUSE-SU-2023:3628-1
- SUSE-SU-2023:3629-1
- SUSE-SU-2023:3630-1
- SUSE-SU-2023:3631-1
- SUSE-SU-2023:3632-1
- SUSE-SU-2023:3644-1
- SUSE-SU-2023:3647-1
- SUSE-SU-2023:3648-1
- SUSE-SU-2023:3653-1
- SUSE-SU-2023:3657-1
- SUSE-SU-2023:3659-1
- SUSE-SU-2023:3668-1
- SUSE-SU-2023:3671-1
- SUSE-SU-2023:3675-1
- SUSE-SU-2023:3676-1
- SUSE-SU-2023:3677-1
- SUSE-SU-2023:3749-1
- SUSE-SU-2023:3768-1
- SUSE-SU-2023:3772-1
- SUSE-SU-2023:3773-1
- SUSE-SU-2023:3783-1
- SUSE-SU-2023:3784-1
- SUSE-SU-2023:3786-1
- SUSE-SU-2023:3788-1
- SUSE-SU-2023:3809-1
- SUSE-SU-2023:3812-1
- SUSE-SU-2023:3838-1
- SUSE-SU-2023:3844-1
- SUSE-SU-2023:3846-1
- SUSE-SU-2023:3889-1
- SUSE-SU-2023:3892-1
- SUSE-SU-2023:3893-1
- SUSE-SU-2023:3922-1
- SUSE-SU-2023:3923-1
- SUSE-SU-2023:3924-1
- SUSE-SU-2023:3928-1
- USN-6122-1
- USN-6123-1
- USN-6124-1
- USN-6127-1
- USN-6130-1
- USN-6131-1
- USN-6132-1
- USN-6135-1
- USN-6149-1
- USN-6150-1
- USN-6162-1
- USN-6175-1
- USN-6186-1
- USN-6222-1
- USN-6246-1
- USN-6247-1
- USN-6248-1
- USN-6250-1
- USN-6251-1
- USN-6252-1
- USN-6254-1
- USN-6255-1
- USN-6256-1
- USN-6260-1
- USN-6261-1
- USN-6285-1
- USN-6315-1
- USN-6317-1
- USN-6318-1
- USN-6321-1
- USN-6324-1
- USN-6325-1
- USN-6328-1
- USN-6329-1
- USN-6330-1
- USN-6331-1
- USN-6332-1
- USN-6346-1
- USN-6348-1
- USN-6357-1
- USN-6385-1
- USN-6397-1
- USN-6460-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2196105 | https://bugzilla.redhat.com/2196105 | |
Bugzilla | 2220892 | https://bugzilla.redhat.com/2220892 | |
Bugzilla | 2225201 | https://bugzilla.redhat.com/2225201 | |
RHSA | RHSA-2023:5622 | https://access.redhat.com/errata/RHSA-2023:5622 | |
CVE | CVE-2023-32233 | https://access.redhat.com/security/cve/CVE-2023-32233 | |
CVE | CVE-2023-35001 | https://access.redhat.com/security/cve/CVE-2023-35001 | |
CVE | CVE-2023-3609 | https://access.redhat.com/security/cve/CVE-2023-3609 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/python-perf?arch=x86_64&distro=redhat-7 | redhat | python-perf | < 3.10.0-1160.102.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/python-perf?arch=s390x&distro=redhat-7 | redhat | python-perf | < 3.10.0-1160.102.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/python-perf?arch=ppc64le&distro=redhat-7 | redhat | python-perf | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/python-perf?arch=ppc64&distro=redhat-7 | redhat | python-perf | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-7 | redhat | perf | < 3.10.0-1160.102.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/perf?arch=s390x&distro=redhat-7 | redhat | perf | < 3.10.0-1160.102.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/perf?arch=ppc64le&distro=redhat-7 | redhat | perf | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/perf?arch=ppc64&distro=redhat-7 | redhat | perf | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.102.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.102.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=x86_64&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-1160.102.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=x86_64&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-1160.102.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-kdump?arch=s390x&distro=redhat-7 | redhat | kernel-kdump | < 3.10.0-1160.102.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-kdump-devel?arch=s390x&distro=redhat-7 | redhat | kernel-kdump-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-doc?distro=redhat-7 | redhat | kernel-doc | < 3.10.0-1160.102.1.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-1160.102.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-1160.102.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64le&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64le&distro=redhat-7 | redhat | kernel-bootwrapper | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64&distro=redhat-7 | redhat | kernel-bootwrapper | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-abi-whitelists?distro=redhat-7 | redhat | kernel-abi-whitelists | < 3.10.0-1160.102.1.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/bpftool?arch=x86_64&distro=redhat-7 | redhat | bpftool | < 3.10.0-1160.102.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/bpftool?arch=s390x&distro=redhat-7 | redhat | bpftool | < 3.10.0-1160.102.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/bpftool?arch=ppc64le&distro=redhat-7 | redhat | bpftool | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/bpftool?arch=ppc64&distro=redhat-7 | redhat | bpftool | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |