Red Hat Enterprise Linux 8 update for kpatch-patch



Published: 2023-09-19
Risk Low
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2023-3090
CVE-2023-3390
CVE-2023-35001
CVE-2023-35788
CVE-2023-3776
CVE-2023-4004
CWE-ID CWE-787
CWE-416
Exploitation vector Local
Public exploit Public exploit code for vulnerability #3 is available.
Vulnerable software
Subscribe
Red Hat Enterprise Linux for Power, little endian
Operating systems & Components / Operating system

Red Hat Enterprise Linux for x86_64
Operating systems & Components / Operating system

kpatch-patch-4_18_0-477_21_1 (Red Hat package)
Operating systems & Components / Operating system package or component

kpatch-patch-4_18_0-477_15_1 (Red Hat package)
Operating systems & Components / Operating system package or component

kpatch-patch-4_18_0-477_13_1 (Red Hat package)
Operating systems & Components / Operating system package or component

kpatch-patch-4_18_0-477_10_1 (Red Hat package)
Operating systems & Components / Operating system package or component

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Out-of-bounds write

EUVDB-ID: #VU78010

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-3090

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the ipvlan network driver in Linux kernel. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for Power, little endian: 8

Red Hat Enterprise Linux for x86_64: 8.0

kpatch-patch-4_18_0-477_21_1 (Red Hat package): before 1-1.el8_8

kpatch-patch-4_18_0-477_15_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_13_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_10_1 (Red Hat package): before 1-3.el8_8

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2023:5221


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Use-after-free

EUVDB-ID: #VU78007

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-3390

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within net/netfilter/nf_tables_api.c in the Linux kernel netfilter subsystem. A local user can trigger a use-after-fee error and escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for Power, little endian: 8

Red Hat Enterprise Linux for x86_64: 8.0

kpatch-patch-4_18_0-477_21_1 (Red Hat package): before 1-1.el8_8

kpatch-patch-4_18_0-477_15_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_13_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_10_1 (Red Hat package): before 1-3.el8_8

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2023:5221


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Out-of-bounds write

EUVDB-ID: #VU78326

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-35001

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the nft_byteorder() function. A local user can trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for Power, little endian: 8

Red Hat Enterprise Linux for x86_64: 8.0

kpatch-patch-4_18_0-477_21_1 (Red Hat package): before 1-1.el8_8

kpatch-patch-4_18_0-477_15_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_13_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_10_1 (Red Hat package): before 1-3.el8_8

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2023:5221


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Out-of-bounds write

EUVDB-ID: #VU77502

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-35788

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the fl_set_geneve_opt() function in net/sched/cls_flower.c in Linux kernel. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for Power, little endian: 8

Red Hat Enterprise Linux for x86_64: 8.0

kpatch-patch-4_18_0-477_21_1 (Red Hat package): before 1-1.el8_8

kpatch-patch-4_18_0-477_15_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_13_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_10_1 (Red Hat package): before 1-3.el8_8

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2023:5221


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Use-after-free

EUVDB-ID: #VU79285

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-3776

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the the Linux kernel's net/sched: cls_fw component. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for Power, little endian: 8

Red Hat Enterprise Linux for x86_64: 8.0

kpatch-patch-4_18_0-477_21_1 (Red Hat package): before 1-1.el8_8

kpatch-patch-4_18_0-477_15_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_13_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_10_1 (Red Hat package): before 1-3.el8_8

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2023:5221


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

6) Use-after-free

EUVDB-ID: #VU79498

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-4004

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. A local user can execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for Power, little endian: 8

Red Hat Enterprise Linux for x86_64: 8.0

kpatch-patch-4_18_0-477_21_1 (Red Hat package): before 1-1.el8_8

kpatch-patch-4_18_0-477_15_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_13_1 (Red Hat package): before 1-2.el8_8

kpatch-patch-4_18_0-477_10_1 (Red Hat package): before 1-3.el8_8

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2023:5221


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###