Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:5589: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-42896: A use-after-free flaw was found in the Linux kernel’s implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via Bluetooth if within proximity of the victim.
  • CVE-2023-4128: A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.
Red Hat Security Data
#vulnerability#linux#red_hat#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
  • kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Z-Stream request for “double free issue in filelayout_alloc_commit_info” (BZ#2212823)
  • Hyper-V RHEL-8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2227262)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64

Fixes

  • BZ - 2147364 - CVE-2022-42896 kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
  • BZ - 2225511 - CVE-2023-4128 kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route

Red Hat Enterprise Linux Server - AUS 8.2

SRPM

kernel-4.18.0-193.116.1.el8_2.src.rpm

SHA-256: 5d3c69cc982cb85f3e0f65dae9a04c891e4415d15186ac8441bcc2843a9be3bf

x86_64

bpftool-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 6ac8ad2c906779ff883ba80158f51142430025e3d291c5d1b0af0bcf4ad8e34d

bpftool-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 544783556bd0d669e93915588c66a4c9910e3e8359446a02bc930b2a510f7652

kernel-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 990fd56c06145eaf20e59e348bf2226a50cde1270644fa972249e01ed4179183

kernel-abi-whitelists-4.18.0-193.116.1.el8_2.noarch.rpm

SHA-256: ffb5cf15da68ca26c740b68d0b89408c9ab66e816899d15efdd9f274c660c57b

kernel-core-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 9e1e8a63d3d48e0fcfe156d16a52cb15d08e19c71d66c43a1492e9c9aaf98823

kernel-cross-headers-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: f6dcea9853e76ad5b3fbdd54aa324114b90e4db58f1f46a5329b057bfec28088

kernel-debug-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 62bf7c2228b2df6880796391b799337f043abfd152008c6e25fa78b34dc5f393

kernel-debug-core-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: c3ce1de8a578142078442a693930cffc72e71792563eb88fdcaa48f9098e1a7f

kernel-debug-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: f6be34904e643f27597792e4f94dc0d21c4941f75147d28b9b0ee561bbf6ef50

kernel-debug-devel-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 3d59a7fd0a1eab3f8775390b79d9351b93ff013ae9aaf4010d2e9395428c7dc7

kernel-debug-modules-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 5f347d632081c5d1fac33559224e50fd34a32073e419358db2f42c152e7cd98c

kernel-debug-modules-extra-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 198bed9e187b3e062895879400ecbba0f0ba5302458506c63391bf7fd5fe46fc

kernel-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 54ce9361c03bf5560b688e6ed6800c41dbda166a1bb2bec3dadfd42d7e1c2a99

kernel-debuginfo-common-x86_64-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: bd30f9618c16a760e772f412c7421e9f01f2e6dea7b6752b58fdf827ca3cb8a1

kernel-devel-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 83b22d7102f4f962432f9d9a26fbafc8cb0188bd0e38ec34158d5b452bffb822

kernel-doc-4.18.0-193.116.1.el8_2.noarch.rpm

SHA-256: 55078e948652b845b0610d5f954e139b13bf1078685cb201bedb2f1083f3c083

kernel-headers-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 44173519b935bd8510a537f82eea05a2efea2a07c605695260f3cde8a6d5d6fc

kernel-modules-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: caab2b8c56366a18d0ea9c7af438449d50e158fa183e3fee26c13a0128b11946

kernel-modules-extra-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 0cfc39e7c4c251264a631c91712cca51a6d385bdf2a3840f89b50f5f2bc3235e

kernel-tools-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 3222ab3e71e4879c1bdc158425d8aef1a00dceeec2e461f0921d35cce362f45c

kernel-tools-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 34a845418626116f6be0068e69a4960eebbe95b52603e760222d5c580d04939b

kernel-tools-libs-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: b8802ed849a6b1c793d4dced9a267643b8129e70b66763cada48d913fa2e0ba9

perf-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 8276ed18fcbbaa0054768107b25fc9feedcb0a487bc4c29d1cb512d1f809f555

perf-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 01abf8d01c56330936fa980e62d4aeda19a25259f8d588b2fc63169c05aebba2

python3-perf-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: b271d26f5df1d8c4135d723167fcebec16aad019d258c942d0588ffa8af9b3f5

python3-perf-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: c2fd913a50b048f21af94dd73a1dc7af372c3df8365c547381cd17937709df9e

Red Hat Enterprise Linux Server - TUS 8.2

SRPM

kernel-4.18.0-193.116.1.el8_2.src.rpm

SHA-256: 5d3c69cc982cb85f3e0f65dae9a04c891e4415d15186ac8441bcc2843a9be3bf

x86_64

bpftool-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 6ac8ad2c906779ff883ba80158f51142430025e3d291c5d1b0af0bcf4ad8e34d

bpftool-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 544783556bd0d669e93915588c66a4c9910e3e8359446a02bc930b2a510f7652

kernel-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 990fd56c06145eaf20e59e348bf2226a50cde1270644fa972249e01ed4179183

kernel-abi-whitelists-4.18.0-193.116.1.el8_2.noarch.rpm

SHA-256: ffb5cf15da68ca26c740b68d0b89408c9ab66e816899d15efdd9f274c660c57b

kernel-core-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 9e1e8a63d3d48e0fcfe156d16a52cb15d08e19c71d66c43a1492e9c9aaf98823

kernel-cross-headers-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: f6dcea9853e76ad5b3fbdd54aa324114b90e4db58f1f46a5329b057bfec28088

kernel-debug-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 62bf7c2228b2df6880796391b799337f043abfd152008c6e25fa78b34dc5f393

kernel-debug-core-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: c3ce1de8a578142078442a693930cffc72e71792563eb88fdcaa48f9098e1a7f

kernel-debug-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: f6be34904e643f27597792e4f94dc0d21c4941f75147d28b9b0ee561bbf6ef50

kernel-debug-devel-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 3d59a7fd0a1eab3f8775390b79d9351b93ff013ae9aaf4010d2e9395428c7dc7

kernel-debug-modules-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 5f347d632081c5d1fac33559224e50fd34a32073e419358db2f42c152e7cd98c

kernel-debug-modules-extra-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 198bed9e187b3e062895879400ecbba0f0ba5302458506c63391bf7fd5fe46fc

kernel-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 54ce9361c03bf5560b688e6ed6800c41dbda166a1bb2bec3dadfd42d7e1c2a99

kernel-debuginfo-common-x86_64-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: bd30f9618c16a760e772f412c7421e9f01f2e6dea7b6752b58fdf827ca3cb8a1

kernel-devel-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 83b22d7102f4f962432f9d9a26fbafc8cb0188bd0e38ec34158d5b452bffb822

kernel-doc-4.18.0-193.116.1.el8_2.noarch.rpm

SHA-256: 55078e948652b845b0610d5f954e139b13bf1078685cb201bedb2f1083f3c083

kernel-headers-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 44173519b935bd8510a537f82eea05a2efea2a07c605695260f3cde8a6d5d6fc

kernel-modules-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: caab2b8c56366a18d0ea9c7af438449d50e158fa183e3fee26c13a0128b11946

kernel-modules-extra-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 0cfc39e7c4c251264a631c91712cca51a6d385bdf2a3840f89b50f5f2bc3235e

kernel-tools-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 3222ab3e71e4879c1bdc158425d8aef1a00dceeec2e461f0921d35cce362f45c

kernel-tools-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 34a845418626116f6be0068e69a4960eebbe95b52603e760222d5c580d04939b

kernel-tools-libs-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: b8802ed849a6b1c793d4dced9a267643b8129e70b66763cada48d913fa2e0ba9

perf-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 8276ed18fcbbaa0054768107b25fc9feedcb0a487bc4c29d1cb512d1f809f555

perf-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 01abf8d01c56330936fa980e62d4aeda19a25259f8d588b2fc63169c05aebba2

python3-perf-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: b271d26f5df1d8c4135d723167fcebec16aad019d258c942d0588ffa8af9b3f5

python3-perf-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: c2fd913a50b048f21af94dd73a1dc7af372c3df8365c547381cd17937709df9e

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2

SRPM

kernel-4.18.0-193.116.1.el8_2.src.rpm

SHA-256: 5d3c69cc982cb85f3e0f65dae9a04c891e4415d15186ac8441bcc2843a9be3bf

ppc64le

bpftool-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: f90fdfce110a80afdeee932204a0e6578061199ef4bfeaf2f9eaed301e2bdf57

bpftool-debuginfo-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 1646a17905b7630c204a79ef5af91adf2a88d1afd973c7ca908e879ad62e9bf0

kernel-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: d160760740bde818787bf849a85ffd14d5df6d457c109ae128cbc7537014a26e

kernel-abi-whitelists-4.18.0-193.116.1.el8_2.noarch.rpm

SHA-256: ffb5cf15da68ca26c740b68d0b89408c9ab66e816899d15efdd9f274c660c57b

kernel-core-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 89543353b7ad45403ca354091d6d7ee7f919705c65db03bd4265e7317027146b

kernel-cross-headers-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: ae56c41d9d72baf643882db4e7a7df7f234ae5b81217ac54783efa8da496dcca

kernel-debug-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 82c71634909ebe795587c2e02937002e6cacd267070acc6d8dbeb248066c1735

kernel-debug-core-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 9cc98f0edf38b5d627ab04c67f72d9283c7545aac926df41b405f45cca33715f

kernel-debug-debuginfo-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 4e5dd5f3afaf00191a7018314e84546199399d9e75b703cbfaf30bc0e98ea59c

kernel-debug-devel-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 7f2b79e63bc0b86d290456321adc32631c008f096fca8e2234031ba02ea215d7

kernel-debug-modules-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 7945fc7395d36d799822ac69cb016b937f89f4185b30ce554a83c0dc6862d910

kernel-debug-modules-extra-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 2747419c0144cb58689b22cd58e269870d9fbe1e44440d042b30298833d5b346

kernel-debuginfo-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 22418041c703b71e0367a86b23e3f98f00f92dc8f951b91896c02b2528fba994

kernel-debuginfo-common-ppc64le-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 097692ccbeb919c7a839e43f9efbaa9c92b8e3d461144ce3724913ae371d2057

kernel-devel-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: c0b3372b0232ca0042c8e4167d5271b31cce887db37926713d736308f25d85f4

kernel-doc-4.18.0-193.116.1.el8_2.noarch.rpm

SHA-256: 55078e948652b845b0610d5f954e139b13bf1078685cb201bedb2f1083f3c083

kernel-headers-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 10a411160748c07179914fc636554082a0f2a904eaa4c1a2d4a7dbe65e52d454

kernel-modules-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 1c3690ce5afd869e96fffdb584f3cf40d4acedb95a4cf06fab8e8d9c8458234b

kernel-modules-extra-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 16905c5254776ba2e1a539dfaa67c9b6798db16ca7dcced4cde1431047f7b66b

kernel-tools-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: c8da26c309b8772234ffdb2580f0502e3f3a2d62a7ac2bea7958ddf381feaf9d

kernel-tools-debuginfo-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: a830d0f6bd1a42c64f9c525d5bc36050154135dc0204fe96cc5d4aa8244fdfbf

kernel-tools-libs-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 8085b9eef844e57e28dd8b9526492867a2626456f55b2bfc21b6d5a4a50d6dc0

perf-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: f7ab9f6e11784ebdfcf505f37088bf88b986b8fde9058b953680e53fd46f3a78

perf-debuginfo-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 980e38997f7e9723b0c26821d1340e13fdb96a4961977b37bac9d53847831a9c

python3-perf-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: a5cbd4a5271464e5a350d0363d84cdd436d4df014154a0e0c2518d258bfd4023

python3-perf-debuginfo-4.18.0-193.116.1.el8_2.ppc64le.rpm

SHA-256: 1d32bfc7b4ca221c5f2a40ec24a4bde25cf306970704520457d23e5207fe3475

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2

SRPM

kernel-4.18.0-193.116.1.el8_2.src.rpm

SHA-256: 5d3c69cc982cb85f3e0f65dae9a04c891e4415d15186ac8441bcc2843a9be3bf

x86_64

bpftool-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 6ac8ad2c906779ff883ba80158f51142430025e3d291c5d1b0af0bcf4ad8e34d

bpftool-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 544783556bd0d669e93915588c66a4c9910e3e8359446a02bc930b2a510f7652

kernel-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 990fd56c06145eaf20e59e348bf2226a50cde1270644fa972249e01ed4179183

kernel-abi-whitelists-4.18.0-193.116.1.el8_2.noarch.rpm

SHA-256: ffb5cf15da68ca26c740b68d0b89408c9ab66e816899d15efdd9f274c660c57b

kernel-core-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 9e1e8a63d3d48e0fcfe156d16a52cb15d08e19c71d66c43a1492e9c9aaf98823

kernel-cross-headers-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: f6dcea9853e76ad5b3fbdd54aa324114b90e4db58f1f46a5329b057bfec28088

kernel-debug-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 62bf7c2228b2df6880796391b799337f043abfd152008c6e25fa78b34dc5f393

kernel-debug-core-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: c3ce1de8a578142078442a693930cffc72e71792563eb88fdcaa48f9098e1a7f

kernel-debug-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: f6be34904e643f27597792e4f94dc0d21c4941f75147d28b9b0ee561bbf6ef50

kernel-debug-devel-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 3d59a7fd0a1eab3f8775390b79d9351b93ff013ae9aaf4010d2e9395428c7dc7

kernel-debug-modules-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 5f347d632081c5d1fac33559224e50fd34a32073e419358db2f42c152e7cd98c

kernel-debug-modules-extra-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 198bed9e187b3e062895879400ecbba0f0ba5302458506c63391bf7fd5fe46fc

kernel-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 54ce9361c03bf5560b688e6ed6800c41dbda166a1bb2bec3dadfd42d7e1c2a99

kernel-debuginfo-common-x86_64-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: bd30f9618c16a760e772f412c7421e9f01f2e6dea7b6752b58fdf827ca3cb8a1

kernel-devel-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 83b22d7102f4f962432f9d9a26fbafc8cb0188bd0e38ec34158d5b452bffb822

kernel-doc-4.18.0-193.116.1.el8_2.noarch.rpm

SHA-256: 55078e948652b845b0610d5f954e139b13bf1078685cb201bedb2f1083f3c083

kernel-headers-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 44173519b935bd8510a537f82eea05a2efea2a07c605695260f3cde8a6d5d6fc

kernel-modules-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: caab2b8c56366a18d0ea9c7af438449d50e158fa183e3fee26c13a0128b11946

kernel-modules-extra-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 0cfc39e7c4c251264a631c91712cca51a6d385bdf2a3840f89b50f5f2bc3235e

kernel-tools-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 3222ab3e71e4879c1bdc158425d8aef1a00dceeec2e461f0921d35cce362f45c

kernel-tools-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 34a845418626116f6be0068e69a4960eebbe95b52603e760222d5c580d04939b

kernel-tools-libs-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: b8802ed849a6b1c793d4dced9a267643b8129e70b66763cada48d913fa2e0ba9

perf-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 8276ed18fcbbaa0054768107b25fc9feedcb0a487bc4c29d1cb512d1f809f555

perf-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: 01abf8d01c56330936fa980e62d4aeda19a25259f8d588b2fc63169c05aebba2

python3-perf-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: b271d26f5df1d8c4135d723167fcebec16aad019d258c942d0588ffa8af9b3f5

python3-perf-debuginfo-4.18.0-193.116.1.el8_2.x86_64.rpm

SHA-256: c2fd913a50b048f21af94dd73a1dc7af372c3df8365c547381cd17937709df9e

Related news

Red Hat Security Advisory 2024-0261-03

Red Hat Security Advisory 2024-0261-03 - An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-7539-01

Red Hat Security Advisory 2023-7539-01 - An update for kernel is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-7424-01

Red Hat Security Advisory 2023-7424-01 - An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-7077-01

Red Hat Security Advisory 2023-7077-01 - An update for kernel is now available for Red Hat Enterprise Linux 8. Issues addressed include buffer overflow, denial of service, double free, information leakage, memory leak, null pointer, out of bounds access, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5775-01

Red Hat Security Advisory 2023-5775-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Kernel Live Patch Security Notice LSN-0098-1

It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). Various other issues were also addressed.

Red Hat Security Advisory 2023-5628-01

Red Hat Security Advisory 2023-5628-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5603-01

Red Hat Security Advisory 2023-5603-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5580-01

Red Hat Security Advisory 2023-5580-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-5575-01

Red Hat Security Advisory 2023-5575-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.

RHSA-2023:5628: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1095: A NULL pointer dereference flaw was found in the Linux kernel’s netfilter subsystem. The issue could occur due to an error in nf_tables_updtable while freeing a transaction o...

RHSA-2023:5580: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could exec...

RHSA-2023:5548: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3090: A flaw was found in the IPVLAN network driver in the Linux kernel. This issue is caused by missing skb->cb initialization in `__ip_options_echo` and can lead to an out-of-bounds write stack overflow. This may allow a local user to cause a denial of service or potentially achieve local privilege escalation. * CVE-202...

Ubuntu Security Notice USN-6386-3

Ubuntu Security Notice 6386-3 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6396-1

Ubuntu Security Notice 6396-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information.

Ubuntu Security Notice USN-6386-1

Ubuntu Security Notice 6386-1 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6385-1

Ubuntu Security Notice 6385-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.

Red Hat Security Advisory 2023-5235-01

Red Hat Security Advisory 2023-5235-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-5238-01

Red Hat Security Advisory 2023-5238-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

Ubuntu Security Notice USN-6383-1

Ubuntu Security Notice 6383-1 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that the ARM64 KVM implementation in the Linux kernel did not properly restrict hypervisor memory access. An attacker in a guest VM could use this to execute arbitrary code in the host OS.

RHSA-2023:5235: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate t...

CVE-2023-4128: Invalid Bug ID

A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.

RHSA-2023:3461: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connec...

Ubuntu Security Notice USN-5918-1

Ubuntu Security Notice 5918-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5875-1

Ubuntu Security Notice 5875-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5863-1

Ubuntu Security Notice 5863-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5832-1

Ubuntu Security Notice 5832-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5829-1

Ubuntu Security Notice 5829-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5813-1

Ubuntu Security Notice 5813-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5802-1

Ubuntu Security Notice 5802-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5794-1

Ubuntu Security Notice 5794-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

CVE-2022-42896: 🐧🕺

There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url