Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:4696 - Security Advisory
Issued:
2023-08-22
Updated:
2023-08-22

RHSA-2023:4696 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
  • hw: amd: Cross-Process Information Leak (CVE-2023-20593)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.6 x86_64

Fixes

  • BZ - 2196105 - CVE-2023-32233 kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
  • BZ - 2217845 - CVE-2023-20593 hw: amd: Cross-Process Information Leak

CVEs

  • CVE-2023-20593
  • CVE-2023-32233

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 7.6

SRPM
kernel-3.10.0-957.105.1.el7.src.rpm SHA-256: fbb029e7f7f22ef43ac5691291dbec64249ad4b3c4f5e7961f7d13a2b7ea6eda
x86_64
bpftool-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 2005c9ef8fa2aea8493e35fec9914d366fffaf0c1a5cb56ebe33aea90bd47196
kernel-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: a99a0a0ee29e8671735c32701f3491c5fa87f924c5ea9df5ecace5bd7cf799ad
kernel-abi-whitelists-3.10.0-957.105.1.el7.noarch.rpm SHA-256: 0b490ba30811916e7c7c5789f86a2ce32638bf42b9b04325e968bc935e3c3345
kernel-debug-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: b2353f32355b1bc157c92700bec2e378900ded5dbdf036eab6f8127f082ba964
kernel-debug-debuginfo-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: d0a47ae8c2d0ee86ca2aed14ab9692fc859b568225a85d464f47a6f4fcbba7f4
kernel-debug-debuginfo-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: d0a47ae8c2d0ee86ca2aed14ab9692fc859b568225a85d464f47a6f4fcbba7f4
kernel-debug-devel-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: cc4f7088c62ebac6a9b9ba03b71723444e862e5669abeaa02e8d5feffdb49cd8
kernel-debuginfo-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 6a7deac23526c7be08e27baa0278d78670f1e3a1e324b393e11a8cd19fff40c3
kernel-debuginfo-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 6a7deac23526c7be08e27baa0278d78670f1e3a1e324b393e11a8cd19fff40c3
kernel-debuginfo-common-x86_64-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 90d7bab701a0f3f0ebb8a09bfd055f6054ed3686a0850871d45d7a5fc26be17c
kernel-debuginfo-common-x86_64-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 90d7bab701a0f3f0ebb8a09bfd055f6054ed3686a0850871d45d7a5fc26be17c
kernel-devel-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 965b0cd0f53244e9bee1e61bbb50d0ccb8507f71abad41f3ce103b0690573e77
kernel-doc-3.10.0-957.105.1.el7.noarch.rpm SHA-256: 926f473495db7904b3f9e532c58bb39d9ca2118f918fd35267d6110eabaa6b1a
kernel-headers-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: c0a461cf3e423ac727934da4a6afd951e3d88b2a30c2b84022028b1444053e4e
kernel-tools-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 067978d80dbbca733c935cd326a2ce55e18cd7cee2305c56c62602f4edb505af
kernel-tools-debuginfo-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 4203f462ebf9456cf775a45cebfc18a876928f370dee2627b784ef08b4a0204d
kernel-tools-debuginfo-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 4203f462ebf9456cf775a45cebfc18a876928f370dee2627b784ef08b4a0204d
kernel-tools-libs-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: f599b8cd29a4dac4521d3f3e0174ae4f391fdb17a9c1bd71d90efc488e140be3
kernel-tools-libs-devel-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 4ce958d49a48eddbceba743a19cbe35eb5d5070b25f982954bd5c2caf11b4053
perf-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 9a5c5f55a3e6adaa0e47d5192a63ae981ed512eaa4021fdb691701344e5ca8f7
perf-debuginfo-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 53891d663dca1b50a3e01329fdebe3f2e6e7a949507c87eedab3f4384408fc61
perf-debuginfo-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 53891d663dca1b50a3e01329fdebe3f2e6e7a949507c87eedab3f4384408fc61
python-perf-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 516e43c84ea54cceb22366271d03a3490068f67cef37f18e75296fe74c960d6d
python-perf-debuginfo-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 7bfe381472ced1779b3f416e5b6c4213fb4594dbf8159e23bc44d09a11de2756
python-perf-debuginfo-3.10.0-957.105.1.el7.x86_64.rpm SHA-256: 7bfe381472ced1779b3f416e5b6c4213fb4594dbf8159e23bc44d09a11de2756

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Statement effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter