Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2022-4269 CVE-2022-4744 CVE-2023-0266 |
CWE-ID | CWE-833 CWE-415 CWE-416 |
Exploitation vector | Local |
Public exploit | Vulnerability #3 is being exploited in the wild. |
Vulnerable software Subscribe |
Red Hat Enterprise Linux for Real Time Operating systems & Components / Operating system Red Hat Enterprise Linux for Real Time for NFV Operating systems & Components / Operating system kernel-rt (Red Hat package) Operating systems & Components / Operating system package or component |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU73186
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-4269
CWE-ID:
CWE-833 - Deadlock
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an error in the Linux kernel Traffic Control (TC) subsystem. A local user can use a specific network configuration (redirecting egress packets to ingress using TC action "mirred") to trigger a CPU soft lockup.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for Real Time: 9
Red Hat Enterprise Linux for Real Time for NFV: 9
kernel-rt (Red Hat package): before 5.14.0-162.22.2.rt21.186.el9_1
CPE2.3 External linkshttp://access.redhat.com/errata/RHSA-2023:1469
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU74053
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-4744
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the tun_free_netdev() function in the Linux kernel’s TUN/TAP device driver. A local user can trigger a double free error and execute arbitrary code with elevated privileges.
Install updates from vendor's website.
Red Hat Enterprise Linux for Real Time: 9
Red Hat Enterprise Linux for Real Time for NFV: 9
kernel-rt (Red Hat package): before 5.14.0-162.22.2.rt21.186.el9_1
CPE2.3 External linkshttp://access.redhat.com/errata/RHSA-2023:1469
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU71482
Risk: High
CVSSv3.1:
CVE-ID: CVE-2023-0266
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the snd_ctl_elem_read() function in the Linux kernel sound subsystem. A local user can trigger a use-after-free error and execute arbitrary code on the system.
Note, the vulnerability is being actively exploited in the wild.
Install updates from vendor's website.
Red Hat Enterprise Linux for Real Time: 9
Red Hat Enterprise Linux for Real Time for NFV: 9
kernel-rt (Red Hat package): before 5.14.0-162.22.2.rt21.186.el9_1
CPE2.3 External linkshttp://access.redhat.com/errata/RHSA-2023:1469
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?