RedHat Linux Kernel Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution and security restriction bypass on the targeted system.
[Updated on 2023-07-19]
Updated Impact, System / Technologies affected, Solutions and Related Links.
Impact
- Remote Code Execution
- Elevation of Privilege
- Denial of Service
- Security Restriction Bypass
System / Technologies affected
- Red Hat CodeReady Linux Builder EUS (v.8.6) - aarch64, ppc64le, x86_64
- Red Hat CodeReady Linux Builder EUS (v.9.0) - aarch64, ppc64le, s390x, x86_64
- Red Hat Enterprise Linux AppStream EUS (v.9.0) - aarch64, noarch, ppc64le, s390x, x86_64
- Red Hat Enterprise Linux BaseOS AUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64
- Red Hat Enterprise Linux BaseOS E4S (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64
- Red Hat Enterprise Linux BaseOS E4S (v. 8.2) - ppc64le, x86_64
- Red Hat Enterprise Linux BaseOS EUS (v.8.6) - aarch64, noarch, ppc64le, s390x, x86_64
- Red Hat Enterprise Linux BaseOS EUS (v.8.6) - ppc64le, x86_64
- Red Hat Enterprise Linux BaseOS EUS (v.9.0) - aarch64, noarch, ppc64le, s390x, x86_64
- Red Hat Enterprise Linux BaseOS TUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64
- Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64
- Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
- Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64
- Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
- Red Hat Enterprise Linux for Real Time (v. 7) - noarch, x86_64
- Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64
- Red Hat Enterprise Linux Real Time EUS (v.9.0) - x86_64
- Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0) - x86_64
- Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2) - x86_64
- Red Hat Enterprise Linux Real Time TUS (v. 8.2) - x86_64
- Red Hat Enterprise Linux Server - AUS 7.4 x86_64
- Red Hat Enterprise Linux Server - AUS 7.6 x86_64
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
- Red Hat Enterprise Linux Server - TUS 7.7 x86_64
- Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
- Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64
- Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
- Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://access.redhat.com/errata/RHSA-2023:4020
- https://access.redhat.com/errata/RHSA-2023:4021
- https://access.redhat.com/errata/RHSA-2023:4023
- https://access.redhat.com/errata/RHSA-2023:4022
- https://access.redhat.com/errata/RHSA-2023:4125
- https://access.redhat.com/errata/RHSA-2023:4126
- https://access.redhat.com/errata/RHSA-2023:4130
- https://access.redhat.com/errata/RHSA-2023:4137
- https://access.redhat.com/errata/RHSA-2023:4138
- https://access.redhat.com/errata/RHSA-2023:4145
- https://access.redhat.com/errata/RHSA-2023:4146
- https://access.redhat.com/errata/RHSA-2023:4150
- https://access.redhat.com/errata/RHSA-2023:4151
Vulnerability Identifier
- CVE-2022-1016
- CVE-2022-2588
- CVE-2022-3564
- CVE-2022-42703
- CVE-2022-42896
- CVE-2023-0461
- CVE-2023-1281
- CVE-2023-1390
- CVE-2023-2002
- CVE-2023-2124
- CVE-2023-2235
- CVE-2023-32233
Source
Related Link
- https://www.auscert.org.au/bulletins/ESB-2023.4034
- https://www.auscert.org.au/bulletins/ESB-2023.4033
- https://www.auscert.org.au/bulletins/ESB-2023.4032
- https://www.auscert.org.au/bulletins/ESB-2023.4031
- https://www.auscert.org.au/bulletins/ESB-2023.4029
- https://www.auscert.org.au/bulletins/ESB-2023.4028
- https://www.auscert.org.au/bulletins/ESB-2023.4027
- https://www.auscert.org.au/bulletins/ESB-2023.4025
- https://www.auscert.org.au/bulletins/ESB-2023.4024
- https://www.auscert.org.au/bulletins/ESB-2023.3888
- https://www.auscert.org.au/bulletins/ESB-2023.3887
- https://www.auscert.org.au/bulletins/ESB-2023.3886
- https://www.auscert.org.au/bulletins/ESB-2023.3885
- https://access.redhat.com/errata/RHSA-2023:4151
- https://access.redhat.com/errata/RHSA-2023:4150
- https://access.redhat.com/errata/RHSA-2023:4146
- https://access.redhat.com/errata/RHSA-2023:4145
- https://access.redhat.com/errata/RHSA-2023:4138
- https://access.redhat.com/errata/RHSA-2023:4137
- https://access.redhat.com/errata/RHSA-2023:4130
- https://access.redhat.com/errata/RHSA-2023:4126
- https://access.redhat.com/errata/RHSA-2023:4125
- https://access.redhat.com/errata/RHSA-2023:4020
- https://access.redhat.com/errata/RHSA-2023:4021
- https://access.redhat.com/errata/RHSA-2023:4023
- https://access.redhat.com/errata/RHSA-2023:4022
Related Tags
Share with