[RHSA-2023:6595] linux-firmware security, bug fix, and enhancement update
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi (CVE-2022-27635)
hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi (CVE-2022-40964)
hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi (CVE-2022-46329)
hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi (CVE-2022-36351)
hw amd: Return Address Predictor vulnerability leading to information disclosure (CVE-2023-20569)
hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi (CVE-2022-38076)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.
- ID
- RHSA-2023:6595
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:6595
- Published
-
2023-11-07T00:00:00
(10 months ago) - Modified
-
2023-11-07T00:00:00
(10 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2023-2179
- ALPINE:CVE-2023-20569
- ALSA-2023:6595
- ALSA-2023:7109
- ALSA-2024:0113
- ALSA-2024:3178
- DSA-5475-1
- ELSA-2023-12712
- ELSA-2023-12713
- ELSA-2023-12714
- ELSA-2023-12715
- ELSA-2023-12874
- ELSA-2023-12910
- ELSA-2023-12911
- ELSA-2023-6595
- ELSA-2023-7109
- ELSA-2023-7749
- ELSA-2024-3178
- FEDORA-2023-04473fc41e
- FEDORA-2023-4056a5c165
- FEDORA-2023-638681260a
- FEDORA-2023-dd3ebcea25
- FEDORA-2023-ddfd3073b3
- FEDORA-2023-defb0a89ff
- FEDORA-2023-fff31650c8
- MS:CVE-2023-20569
- RHBA-2023:2977
- RHSA-2023:7109
- RHSA-2023:7513
- RHSA-2024:0113
- RHSA-2024:0134
- RHSA-2024:3178
- RHSA-2024:3939
- SSA:2023-325-01
- SUSE-SU-2023:3262-1
- SUSE-SU-2023:3298-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3309-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3329-1
- SUSE-SU-2023:3349-1
- SUSE-SU-2023:3360-1
- SUSE-SU-2023:3361-1
- SUSE-SU-2023:3362-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:3389-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3392-1
- SUSE-SU-2023:3395-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3446-1
- SUSE-SU-2023:3447-1
- SUSE-SU-2023:3494-1
- SUSE-SU-2023:3495-1
- SUSE-SU-2023:3496-1
- USN-6319-1
- USN-6412-1
- USN-6415-1
- USN-6416-1
- USN-6416-2
- USN-6416-3
- USN-6445-1
- USN-6445-2
- USN-6466-1
- XSA-434
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2207625 | https://bugzilla.redhat.com/2207625 | |
Bugzilla | 2238960 | https://bugzilla.redhat.com/2238960 | |
Bugzilla | 2238961 | https://bugzilla.redhat.com/2238961 | |
Bugzilla | 2238962 | https://bugzilla.redhat.com/2238962 | |
Bugzilla | 2238963 | https://bugzilla.redhat.com/2238963 | |
Bugzilla | 2238964 | https://bugzilla.redhat.com/2238964 | |
RHSA | RHSA-2023:6595 | https://access.redhat.com/errata/RHSA-2023:6595 | |
CVE | CVE-2022-27635 | https://access.redhat.com/security/cve/CVE-2022-27635 | |
CVE | CVE-2022-36351 | https://access.redhat.com/security/cve/CVE-2022-36351 | |
CVE | CVE-2022-38076 | https://access.redhat.com/security/cve/CVE-2022-38076 | |
CVE | CVE-2022-40964 | https://access.redhat.com/security/cve/CVE-2022-40964 | |
CVE | CVE-2022-46329 | https://access.redhat.com/security/cve/CVE-2022-46329 | |
CVE | CVE-2023-20569 | https://access.redhat.com/security/cve/CVE-2023-20569 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/netronome-firmware?distro=redhat-9.3 | redhat | netronome-firmware | < 20230814-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/linux-firmware?distro=redhat-9.3 | redhat | linux-firmware | < 20230814-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/linux-firmware-whence?distro=redhat-9.3 | redhat | linux-firmware-whence | < 20230814-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/libertas-sd8787-firmware?distro=redhat-9.3 | redhat | libertas-sd8787-firmware | < 20230814-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl7260-firmware?distro=redhat-9.3 | redhat | iwl7260-firmware | < 25.30.13.0-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl6050-firmware?distro=redhat-9.3 | redhat | iwl6050-firmware | < 41.28.5.1-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl6000g2b-firmware?distro=redhat-9.3 | redhat | iwl6000g2b-firmware | < 18.168.6.1-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl6000g2a-firmware?distro=redhat-9.3 | redhat | iwl6000g2a-firmware | < 18.168.6.1-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl5150-firmware?distro=redhat-9.3 | redhat | iwl5150-firmware | < 8.24.2.2-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl5000-firmware?distro=redhat-9.3 | redhat | iwl5000-firmware | < 8.83.5.1_1-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl3160-firmware?distro=redhat-9.3 | redhat | iwl3160-firmware | < 25.30.13.0-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl2030-firmware?distro=redhat-9.3 | redhat | iwl2030-firmware | < 18.168.6.1-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl2000-firmware?distro=redhat-9.3 | redhat | iwl2000-firmware | < 18.168.6.1-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl135-firmware?distro=redhat-9.3 | redhat | iwl135-firmware | < 18.168.6.1-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl105-firmware?distro=redhat-9.3 | redhat | iwl105-firmware | < 18.168.6.1-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl1000-firmware?distro=redhat-9.3 | redhat | iwl1000-firmware | < 39.31.5.1-140.el9_3 | redhat-9.3 | ||
Affected | pkg:rpm/redhat/iwl100-firmware?distro=redhat-9.3 | redhat | iwl100-firmware | < 39.31.5.1-140.el9_3 | redhat-9.3 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |