AlmaLinux 9 : kernel (ALSA-2023:5069)

high Nessus Plugin ID 181428


The remote AlmaLinux host is missing one or more security updates.


The remote AlmaLinux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALSA-2023:5069 advisory.

- A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks. (CVE-2023-1637)

- An issue in Zen 2 CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information. (CVE-2023-20593)

- In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel (CVE-2023-21102)

- Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace (CVE-2023-31248)

- A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97. (CVE-2023-3390)

- Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace (CVE-2023-35001)

- A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered. We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795. (CVE-2023-3610)

- A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.

- A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system. (CVE-2023-4004)

- A use-after-free flaw was found in the Linux kernel's Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 181428

File Name: alma_linux_ALSA-2023-5069.nasl

Version: 1.1

Type: local

Published: 9/14/2023

Updated: 10/23/2023

Supported Sensors: Nessus

Risk Information


Risk Factor: Critical

Score: 9.0


Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2023-4147


Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:alma:linux:kernel-tools, p-cpe:/a:alma:linux:kernel-debug-modules-extra, cpe:/o:alma:linux:9::appstream, p-cpe:/a:alma:linux:kernel-tools-libs-devel, p-cpe:/a:alma:linux:kernel-zfcpdump-devel-matched, p-cpe:/a:alma:linux:kernel-modules-core, p-cpe:/a:alma:linux:rtla, p-cpe:/a:alma:linux:kernel, p-cpe:/a:alma:linux:kernel-64k-core, p-cpe:/a:alma:linux:kernel-64k-modules-core, p-cpe:/a:alma:linux:kernel-64k-devel, p-cpe:/a:alma:linux:kernel-64k-debug-devel, p-cpe:/a:alma:linux:kernel-debug, p-cpe:/a:alma:linux:kernel-core, p-cpe:/a:alma:linux:kernel-zfcpdump-core, p-cpe:/a:alma:linux:kernel-zfcpdump-modules-core, cpe:/o:alma:linux:9::supplementary, p-cpe:/a:alma:linux:kernel-zfcpdump, p-cpe:/a:alma:linux:kernel-zfcpdump-modules-extra, p-cpe:/a:alma:linux:perf, p-cpe:/a:alma:linux:kernel-64k-debug-modules-core, p-cpe:/a:alma:linux:kernel-debug-core, p-cpe:/a:alma:linux:kernel-debug-modules-core, p-cpe:/a:alma:linux:kernel-modules, p-cpe:/a:alma:linux:kernel-64k-debug-modules-extra, cpe:/o:alma:linux:9::highavailability, cpe:/o:alma:linux:9::nfv, cpe:/o:alma:linux:9::resilientstorage, p-cpe:/a:alma:linux:kernel-64k-debug-core, p-cpe:/a:alma:linux:kernel-zfcpdump-modules, p-cpe:/a:alma:linux:kernel-64k, cpe:/o:alma:linux:9::sap_hana, p-cpe:/a:alma:linux:kernel-64k-devel-matched, p-cpe:/a:alma:linux:kernel-64k-debug-devel-matched, cpe:/o:alma:linux:9::sap, p-cpe:/a:alma:linux:kernel-debug-modules, p-cpe:/a:alma:linux:kernel-devel-matched, p-cpe:/a:alma:linux:bpftool, cpe:/o:alma:linux:9::crb, p-cpe:/a:alma:linux:kernel-devel, cpe:/o:alma:linux:9::realtime, p-cpe:/a:alma:linux:python3-perf, p-cpe:/a:alma:linux:kernel-debug-devel, p-cpe:/a:alma:linux:kernel-debug-devel-matched, p-cpe:/a:alma:linux:kernel-uki-virt, p-cpe:/a:alma:linux:kernel-zfcpdump-devel, p-cpe:/a:alma:linux:kernel-64k-modules-extra, p-cpe:/a:alma:linux:kernel-modules-extra, p-cpe:/a:alma:linux:kernel-tools-libs, cpe:/o:alma:linux:9, p-cpe:/a:alma:linux:kernel-64k-modules, p-cpe:/a:alma:linux:kernel-64k-debug, p-cpe:/a:alma:linux:kernel-64k-debug-modules, p-cpe:/a:alma:linux:kernel-abi-stablelists, p-cpe:/a:alma:linux:kernel-debug-uki-virt, cpe:/o:alma:linux:9::baseos

Required KB Items: Host/local_checks_enabled, Host/AlmaLinux/release, Host/AlmaLinux/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/12/2023

Vulnerability Publication Date: 2/17/2023

Reference Information

CVE: CVE-2023-1637, CVE-2023-20593, CVE-2023-21102, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3610, CVE-2023-3776, CVE-2023-4004, CVE-2023-4147

CWE: 1239, 125, 200, 226, 385, 413, 416