Red Hat Security Advisory: kernel security and bug fix update
Advisory ID: SLSA-2023:5622
Issue Date: 2023-10-10
CVE Numbers: CVE-2023-3609
CVE-2023-32233
CVE-2023-35001
--
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609)
* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
* kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)
Bug Fix(es):
* Low memory deadlock with md devices and external (imsm) metadata handling (BZ#1703180)
* cifs: memory leak in smb2_query_symlink (BZ#2166706)
* bnxt_en: panic in bnxt_tx_int Redux (BZ#2175062)
* NFS client loop in BIND_CONN_TO_SESSION (BZ#2219604)
---
This content is derived from https://access.redhat.com/errata/RHSA-2023:5622
--
SL7
x86_64
bpftool-0:3.10.0-1160.102.1.el7.x86_64
srpm
kernel-0:3.10.0-1160.102.1.el7.src
noarch
kernel-abi-whitelists-0:3.10.0-1160.102.1.el7.noarch
- Scientific Linux Development Team