Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:5419 - Security Advisory
Issued:
2023-10-03
Updated:
2023-10-03

RHSA-2023:5419 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
  • hw: amd: Cross-Process Information Leak (CVE-2023-20593)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64

Fixes

  • BZ - 2196105 - CVE-2023-32233 kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
  • BZ - 2217845 - CVE-2023-20593 hw: amd: Cross-Process Information Leak

CVEs

  • CVE-2023-20593
  • CVE-2023-32233

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 7.7

SRPM
kernel-3.10.0-1062.79.1.el7.src.rpm SHA-256: 791800653d44223f6e22e5ce66abc97a534c5b41b7f8f36c0e7f8082ce4b1a96
x86_64
bpftool-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 551c49df31d93f7e3e40a0221a83bfffbd8bebf1196699a4b1cae9abf1912594
bpftool-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 4453c279fc8807939a694cd51caa9c4005ef9278f1b9692dac9e799cb2857283
bpftool-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 4453c279fc8807939a694cd51caa9c4005ef9278f1b9692dac9e799cb2857283
kernel-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 607c3a33cad2a051ec85d110c88a139fde678ec4ad72d02fffc4e927e4799033
kernel-abi-whitelists-3.10.0-1062.79.1.el7.noarch.rpm SHA-256: 3077f30c88f085bca23d13f57b79ee6d194210823c8fc5d656acf167b7287434
kernel-debug-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 7f68dc3092036196c70d019d387c29630e24c479de8dd2115c4b757e154748da
kernel-debug-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 43a78e941b8742e1b61ad53253df5cd6edb03c2d5ffc004a59c4f80ee728f51f
kernel-debug-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 43a78e941b8742e1b61ad53253df5cd6edb03c2d5ffc004a59c4f80ee728f51f
kernel-debug-devel-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 493270079f2e6caa416b046ded69aa09984370e2b55a3d2cdd050065777fbd86
kernel-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 48c8c3cef26474c76e26f40fc555179eb1399bf69a6727f99c927930ce9c5bf8
kernel-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 48c8c3cef26474c76e26f40fc555179eb1399bf69a6727f99c927930ce9c5bf8
kernel-debuginfo-common-x86_64-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 172082b3ae68e241f4b36cb3ca3e79a86c551e8315a6ec537b17c9635febc375
kernel-debuginfo-common-x86_64-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 172082b3ae68e241f4b36cb3ca3e79a86c551e8315a6ec537b17c9635febc375
kernel-devel-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: da300fb6ff9d21ee7ac211f5094771028fba88244550a7522e495bef9bd2e0d7
kernel-doc-3.10.0-1062.79.1.el7.noarch.rpm SHA-256: b6c2c098adcd78ae2b0ec9c83834b9fbb668e3902662056ba838a9e491a174d5
kernel-headers-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 5ba90d70d4254ff022fe7e2984ba924c98b0d2f2241a6b1475d69c21b3d9388e
kernel-tools-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: dae8025b1b94fec901a5383b84f924e3ebd8fd227195e426a52a77c8dc1aab62
kernel-tools-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 37579e11bdb6d256badde4ac76ffd1a764c1df5f7821afbddb83260b4c3f1abd
kernel-tools-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 37579e11bdb6d256badde4ac76ffd1a764c1df5f7821afbddb83260b4c3f1abd
kernel-tools-libs-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 20328dab0b6587c3921f679de40935c49f457b911944f28c761ea42a0d4a6f2a
kernel-tools-libs-devel-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: ef37a276127959826fddf1512de8c8e73629b00a9f3638e4e30a9de1172241a4
perf-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 1126675ef4a947ab06da8cbbb020a6dd051069d0d559b6c9b695b97eab764e7f
perf-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 7b63b790af7b34bd3e22f635d8acbeace44eb9fb19b802695f0a1fe13a24d0fd
perf-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 7b63b790af7b34bd3e22f635d8acbeace44eb9fb19b802695f0a1fe13a24d0fd
python-perf-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: de0a926326671a7f9ef3e6e120c85fe8262a0ec1ea81d444a04e11d3a23f1037
python-perf-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 9920d205e717bd4bf6bf06b036906019cd2559b48335618050358468742ed508
python-perf-debuginfo-3.10.0-1062.79.1.el7.x86_64.rpm SHA-256: 9920d205e717bd4bf6bf06b036906019cd2559b48335618050358468742ed508

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility