EGI SVG Advisories

Advisory-EGI-SVG-2023-52

‘ADVISORY’ [TLP:CLEAR] HIGH risk Multiple linux Kernel Vulnerabilities

Date: 2023-09-21
Updated: 2023-10-19, 2023-10-24

Red Hat has produced a new release of RHEL9, fixing multiple HIGH risk
vulnerabilities. [R 1] Some also affect RHEL8, some RHEL7.
A further release [R 17] of RHEL8 fixes most of the vulnerabilities affecting RHEL8.

UPDATE 2023-10-19

Most vulnerabilities are now fixed including for RHEL7.

CVE IDS, CVSS SCORES, AND AFFECTED SOFTWARE VERSIONS

EGI SVG ID : EGI-SVG-2023-52

CVE’s only affecting RHEL9:-

CVE ID/CVSS Score : CVE-2023-3610/7.8 [R 2]
CVE ID/CVSS Score : CVE-2023-4147/7.8 [R 3]
CVE ID/CVSS Score : CVE-2023-31248/7.8 [R 4]

CVE’s affecting RHEL9 and RHEL8:-

CVE ID/CVSS Score : CVE-2023-3390/7.8 [R 5]
CVE ID/CVSS Score : CVE-2023-4004/7.8 [R 6]
CVE ID/CVSS Score : CVE-2023-21102/7.8 [R 7]
CVE ID/CVSS Score : CVE-2023-1637/5.5 [R 8]

CVE’s affecting RHEL9, RHEL8 and RHEL7:-

CVE ID/CVSS Score : CVE-2023-35001/7.8 [R 9]
CVE ID/CVSS Score : CVE-2023-3776/7.0 [R 10]
CVE ID/CVSS Score : CVE-2023-20593/6.5 [R 11]

ACTIONS REQUIRED/RECOMMENDED

Sites running RHEL9 and derivatives are recommended to update relevant
components as soon as possible, when a patched version is available
see references below.

Sites running RHEL8 are also recommended to update relevant components,
as most of the vulnerabilities affecting RHEL8 have also been fixed.

Sites running RHEL7 are also recommneded to update releavant components,
where patches are available.

Sites running RHEL7 are recommended to carry out mitigation,
unless this disables functionality required, again see references below.

UPDATE CVE-2023-35001 has been fixed for RHEL7.

Sites running various linux derivatives should see references below.

MORE INFORMATION

For CVE-2023-20593 (Zenbleed) [R 11] we have already sent and ‘ALERT’
and placed this on our public advisories.
There is also a RHEL7 patch relating to this.

STATUS OF THIS ADVISORY

TLP:CLEAR information - Unlimited distribution

https://advisories.egi.eu/Advisory-EGI-SVG-2023-52

Minor updates may be made without re-distribution to the sites.

CONTACT AND OTHER INFORMATION ON SVG

Comments or questions should be sent to svg-rat at mailman.egi.eu

Vulnerabilities relevant for EGI can be reported at report-vulnerability at egi.eu

(see [R 99] for further details, and other information on SVG)

REFERENCES

CREDITS

SVG was alerted to these vulnerabilities by Mischa Salle