kernel (SL5)

Red Hat Security Advisory: kernel security and bug fix update
Advisory ID: SLSA-2023:5622
Issue Date: 2023-10-10
CVE Numbers: CVE-2023-3609
CVE-2023-32233
CVE-2023-35001

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609)

* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)

* kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)

Bug Fix(es):

* Low memory deadlock with md devices and external (imsm) metadata handling (BZ#1703180)

* cifs: memory leak in smb2_query_symlink (BZ#2166706)

* bnxt_en: panic in bnxt_tx_int Redux (BZ#2175062)

* NFS client loop in BIND_CONN_TO_SESSION (BZ#2219604)

This content is derived from https://access.redhat.com/errata/RHSA-2023:5622

SL7
x86_64
bpftool-0:3.10.0-1160.102.1.el7.x86_64
srpm
kernel-0:3.10.0-1160.102.1.el7.src
noarch
kernel-abi-whitelists-0:3.10.0-1160.102.1.el7.noarch

– Scientific Linux Development Team