Headline
RHSA-2023:3431: Red Hat Security Advisory: kpatch-patch security update
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
- CVE-2022-4378: A stack overflow flaw was found in the Linux kernel’s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Synopsis
Important: kpatch-patch security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
- kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
Fixes
- BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
- BZ - 2152548 - CVE-2022-4378 kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.src.rpm
SHA-256: de93dcd3b8aa5b5889ef182746811ba3a873b843c6c9c95e8323e161c7f6b901
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.src.rpm
SHA-256: b3a5050ac2c12de8fb9a31caf8328c9cfafc082387f6a543235ee12bcbfda628
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.src.rpm
SHA-256: 31af4081eeecc31579008c1be4103f3ecc490a9561c18439c82fa77aa0f20f6e
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.src.rpm
SHA-256: cb5ebc23ede670a9d03a502ae972491a84802ef17424a35c9444eec290ef6e6a
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.src.rpm
SHA-256: de9e7f007900a3d0f9c572e0c29e7002a4be0f88432f6b11027d0c09a697a2f4
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.src.rpm
SHA-256: f3628ac5f79ccc51e0a289dcc81c14b516348216f3975d2174b81ae57a479b2e
x86_64
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.x86_64.rpm
SHA-256: 0a0e2dbd0a5663525527c70f2cac95bad418187b9ae71ed729aa45e2b10f5e3a
kpatch-patch-4_18_0-372_36_1-debuginfo-1-6.el8_6.x86_64.rpm
SHA-256: d7f6f9ab57dccb8269ab69ba7b5b9d7c698d673113149e8b8dff4d11f781bc87
kpatch-patch-4_18_0-372_36_1-debugsource-1-6.el8_6.x86_64.rpm
SHA-256: afbb73bc9ac6c010b748ef03102b56c0a246ff00217a1f2484e5a772b0737e02
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.x86_64.rpm
SHA-256: 3abe74941eb42e4c6a9c4e28c1beb1091a96b61c4e13093ff3b45699880fd1b5
kpatch-patch-4_18_0-372_40_1-debuginfo-1-6.el8_6.x86_64.rpm
SHA-256: 76cb3bc2b99fea8546aa1015dac819186877456adb9fa6c0e67ea665f2d7a6de
kpatch-patch-4_18_0-372_40_1-debugsource-1-6.el8_6.x86_64.rpm
SHA-256: 462f8ad074745c0c6acd757f2ef9ab12eea783a3a421c32b226952bda594a06f
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.x86_64.rpm
SHA-256: d08da9842e9447837377c20b41576cd7dde73f955d4ae6346bcc3cf24ee280ba
kpatch-patch-4_18_0-372_41_1-debuginfo-1-5.el8_6.x86_64.rpm
SHA-256: ae4a3b86128dc2cc84491a4aed19416fafddc931d42f4985ddfab7c9033cfe7b
kpatch-patch-4_18_0-372_41_1-debugsource-1-5.el8_6.x86_64.rpm
SHA-256: c719ef43f9b061f6e20bcd580282f86e91d2c53650de942550f77f89679c9169
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.x86_64.rpm
SHA-256: 46b40bda7171dfc43615f6a1b29a2f49a84c25cdf131f92e546bcedfefad553d
kpatch-patch-4_18_0-372_46_1-debuginfo-1-3.el8_6.x86_64.rpm
SHA-256: c8799be3e1de0162db2992d0c69cc92bb2a96bf0022771f9f2a86e58f2cd6cbf
kpatch-patch-4_18_0-372_46_1-debugsource-1-3.el8_6.x86_64.rpm
SHA-256: 6902cc394bd6bc5a0b3044f2898fbc50382e72c59fce60534d9d2f3eecc6fe44
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.x86_64.rpm
SHA-256: 26de0d823e0236b92f602363214c019637f3bab7b9725096cf589e7aa6aeb23f
kpatch-patch-4_18_0-372_51_1-debuginfo-1-2.el8_6.x86_64.rpm
SHA-256: 25e7c804f00a570ce02f1c3e4790b21fd06fa5b4093ad80ce249a961e87515c3
kpatch-patch-4_18_0-372_51_1-debugsource-1-2.el8_6.x86_64.rpm
SHA-256: e2abc4b09c6c3ff2e554ab7249d1c325d640a8946ec3f2d54d967a7021beeebe
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.x86_64.rpm
SHA-256: 41f18539538f8e5c6057437d3b48af6f408135ec65244ae833ad5d1d4b3b183a
kpatch-patch-4_18_0-372_52_1-debuginfo-1-1.el8_6.x86_64.rpm
SHA-256: 8f18ea0d192900a9caf8b3d9db03b9593cb70ef94452130a884351c37c5d91ec
kpatch-patch-4_18_0-372_52_1-debugsource-1-1.el8_6.x86_64.rpm
SHA-256: 6a982925c5a62c3f025e2a59713700b8f7d5fbdd5242fd9c4932d8c88a693c6c
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.src.rpm
SHA-256: de93dcd3b8aa5b5889ef182746811ba3a873b843c6c9c95e8323e161c7f6b901
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.src.rpm
SHA-256: b3a5050ac2c12de8fb9a31caf8328c9cfafc082387f6a543235ee12bcbfda628
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.src.rpm
SHA-256: 31af4081eeecc31579008c1be4103f3ecc490a9561c18439c82fa77aa0f20f6e
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.src.rpm
SHA-256: cb5ebc23ede670a9d03a502ae972491a84802ef17424a35c9444eec290ef6e6a
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.src.rpm
SHA-256: de9e7f007900a3d0f9c572e0c29e7002a4be0f88432f6b11027d0c09a697a2f4
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.src.rpm
SHA-256: f3628ac5f79ccc51e0a289dcc81c14b516348216f3975d2174b81ae57a479b2e
x86_64
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.x86_64.rpm
SHA-256: 0a0e2dbd0a5663525527c70f2cac95bad418187b9ae71ed729aa45e2b10f5e3a
kpatch-patch-4_18_0-372_36_1-debuginfo-1-6.el8_6.x86_64.rpm
SHA-256: d7f6f9ab57dccb8269ab69ba7b5b9d7c698d673113149e8b8dff4d11f781bc87
kpatch-patch-4_18_0-372_36_1-debugsource-1-6.el8_6.x86_64.rpm
SHA-256: afbb73bc9ac6c010b748ef03102b56c0a246ff00217a1f2484e5a772b0737e02
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.x86_64.rpm
SHA-256: 3abe74941eb42e4c6a9c4e28c1beb1091a96b61c4e13093ff3b45699880fd1b5
kpatch-patch-4_18_0-372_40_1-debuginfo-1-6.el8_6.x86_64.rpm
SHA-256: 76cb3bc2b99fea8546aa1015dac819186877456adb9fa6c0e67ea665f2d7a6de
kpatch-patch-4_18_0-372_40_1-debugsource-1-6.el8_6.x86_64.rpm
SHA-256: 462f8ad074745c0c6acd757f2ef9ab12eea783a3a421c32b226952bda594a06f
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.x86_64.rpm
SHA-256: d08da9842e9447837377c20b41576cd7dde73f955d4ae6346bcc3cf24ee280ba
kpatch-patch-4_18_0-372_41_1-debuginfo-1-5.el8_6.x86_64.rpm
SHA-256: ae4a3b86128dc2cc84491a4aed19416fafddc931d42f4985ddfab7c9033cfe7b
kpatch-patch-4_18_0-372_41_1-debugsource-1-5.el8_6.x86_64.rpm
SHA-256: c719ef43f9b061f6e20bcd580282f86e91d2c53650de942550f77f89679c9169
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.x86_64.rpm
SHA-256: 46b40bda7171dfc43615f6a1b29a2f49a84c25cdf131f92e546bcedfefad553d
kpatch-patch-4_18_0-372_46_1-debuginfo-1-3.el8_6.x86_64.rpm
SHA-256: c8799be3e1de0162db2992d0c69cc92bb2a96bf0022771f9f2a86e58f2cd6cbf
kpatch-patch-4_18_0-372_46_1-debugsource-1-3.el8_6.x86_64.rpm
SHA-256: 6902cc394bd6bc5a0b3044f2898fbc50382e72c59fce60534d9d2f3eecc6fe44
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.x86_64.rpm
SHA-256: 26de0d823e0236b92f602363214c019637f3bab7b9725096cf589e7aa6aeb23f
kpatch-patch-4_18_0-372_51_1-debuginfo-1-2.el8_6.x86_64.rpm
SHA-256: 25e7c804f00a570ce02f1c3e4790b21fd06fa5b4093ad80ce249a961e87515c3
kpatch-patch-4_18_0-372_51_1-debugsource-1-2.el8_6.x86_64.rpm
SHA-256: e2abc4b09c6c3ff2e554ab7249d1c325d640a8946ec3f2d54d967a7021beeebe
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.x86_64.rpm
SHA-256: 41f18539538f8e5c6057437d3b48af6f408135ec65244ae833ad5d1d4b3b183a
kpatch-patch-4_18_0-372_52_1-debuginfo-1-1.el8_6.x86_64.rpm
SHA-256: 8f18ea0d192900a9caf8b3d9db03b9593cb70ef94452130a884351c37c5d91ec
kpatch-patch-4_18_0-372_52_1-debugsource-1-1.el8_6.x86_64.rpm
SHA-256: 6a982925c5a62c3f025e2a59713700b8f7d5fbdd5242fd9c4932d8c88a693c6c
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.src.rpm
SHA-256: de93dcd3b8aa5b5889ef182746811ba3a873b843c6c9c95e8323e161c7f6b901
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.src.rpm
SHA-256: b3a5050ac2c12de8fb9a31caf8328c9cfafc082387f6a543235ee12bcbfda628
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.src.rpm
SHA-256: 31af4081eeecc31579008c1be4103f3ecc490a9561c18439c82fa77aa0f20f6e
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.src.rpm
SHA-256: cb5ebc23ede670a9d03a502ae972491a84802ef17424a35c9444eec290ef6e6a
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.src.rpm
SHA-256: de9e7f007900a3d0f9c572e0c29e7002a4be0f88432f6b11027d0c09a697a2f4
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.src.rpm
SHA-256: f3628ac5f79ccc51e0a289dcc81c14b516348216f3975d2174b81ae57a479b2e
ppc64le
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.ppc64le.rpm
SHA-256: be99e4c682d53313be54d2dffdd6d3545ca13943c580df7f3792963c4dadf8ac
kpatch-patch-4_18_0-372_36_1-debuginfo-1-6.el8_6.ppc64le.rpm
SHA-256: 315b9aabce6bcdcbaf16cdf4a2bcf2fdf93bc5cc8981cca1a9e8b5397e86e3d9
kpatch-patch-4_18_0-372_36_1-debugsource-1-6.el8_6.ppc64le.rpm
SHA-256: 7dd62c81640b8fcd021689fd16c95d1c846e6a1737e0d7ef2680145dbd25f1aa
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.ppc64le.rpm
SHA-256: 8e308ac5aef9602e7cbc20ff29d3796003ab5c99c7ef6cb88dc03163db3e544a
kpatch-patch-4_18_0-372_40_1-debuginfo-1-6.el8_6.ppc64le.rpm
SHA-256: 32f1fb3c94f67e851e81eab08b9349d25d5ecb204528020668359aeb169f11ac
kpatch-patch-4_18_0-372_40_1-debugsource-1-6.el8_6.ppc64le.rpm
SHA-256: a2bfb613146e88c2a25395346e4d52a628e4faf5aee2ff687d2cd7975ec90ef6
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.ppc64le.rpm
SHA-256: c6c80b8e38678317508ca5eae976989e54b055d14a5cd5396c2fc8a277c805b4
kpatch-patch-4_18_0-372_41_1-debuginfo-1-5.el8_6.ppc64le.rpm
SHA-256: fe9586137c12eafa522291ae2a3ffc26837c553bdfe18c20ba10e4a1c6a41b4d
kpatch-patch-4_18_0-372_41_1-debugsource-1-5.el8_6.ppc64le.rpm
SHA-256: 27bf9eb6927a59a07ba04a6630394b982066834c6d21c8d4cfdad15d35a784c0
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.ppc64le.rpm
SHA-256: 1661aaeae056b1d1fac99e7a46fd7a6c225ce591dbb6efdae12be04f5c98452b
kpatch-patch-4_18_0-372_46_1-debuginfo-1-3.el8_6.ppc64le.rpm
SHA-256: 0bcc38ab9f4b06ba0e8438db8db58acf67be5f0f1ae752b734b17d087f5c1234
kpatch-patch-4_18_0-372_46_1-debugsource-1-3.el8_6.ppc64le.rpm
SHA-256: 6a78bb7bdd297c9b7df80474f9646dc6668db334c4df8a72b43b2078e05edf29
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.ppc64le.rpm
SHA-256: 36c6993008c5f5ee2a61c6d44a67272a7707dfd31881cbe18fa3a12de1e5fb53
kpatch-patch-4_18_0-372_51_1-debuginfo-1-2.el8_6.ppc64le.rpm
SHA-256: 7634f10b80232be071a4e921bd80e6a76346338ed8c24bd72bb066810393091a
kpatch-patch-4_18_0-372_51_1-debugsource-1-2.el8_6.ppc64le.rpm
SHA-256: 6eb3d0ec5cb0056be204dd4353c7e9a962cc2513b917a5d0c469979112a6c257
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.ppc64le.rpm
SHA-256: 070edd42f524e0a95e7d5a3bcab4ae634b29ef34cf3b1db85e13b6a07c9126e7
kpatch-patch-4_18_0-372_52_1-debuginfo-1-1.el8_6.ppc64le.rpm
SHA-256: 9f1bbc0ad576b4104570458fbfb7f27bf793db8e3a42ebb90d4ec9fd18283e4c
kpatch-patch-4_18_0-372_52_1-debugsource-1-1.el8_6.ppc64le.rpm
SHA-256: d448d4835c24493367aae23586e63ab6e9addd761f0f8c85ec3150843f45c3cd
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.src.rpm
SHA-256: de93dcd3b8aa5b5889ef182746811ba3a873b843c6c9c95e8323e161c7f6b901
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.src.rpm
SHA-256: b3a5050ac2c12de8fb9a31caf8328c9cfafc082387f6a543235ee12bcbfda628
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.src.rpm
SHA-256: 31af4081eeecc31579008c1be4103f3ecc490a9561c18439c82fa77aa0f20f6e
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.src.rpm
SHA-256: cb5ebc23ede670a9d03a502ae972491a84802ef17424a35c9444eec290ef6e6a
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.src.rpm
SHA-256: de9e7f007900a3d0f9c572e0c29e7002a4be0f88432f6b11027d0c09a697a2f4
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.src.rpm
SHA-256: f3628ac5f79ccc51e0a289dcc81c14b516348216f3975d2174b81ae57a479b2e
x86_64
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.x86_64.rpm
SHA-256: 0a0e2dbd0a5663525527c70f2cac95bad418187b9ae71ed729aa45e2b10f5e3a
kpatch-patch-4_18_0-372_36_1-debuginfo-1-6.el8_6.x86_64.rpm
SHA-256: d7f6f9ab57dccb8269ab69ba7b5b9d7c698d673113149e8b8dff4d11f781bc87
kpatch-patch-4_18_0-372_36_1-debugsource-1-6.el8_6.x86_64.rpm
SHA-256: afbb73bc9ac6c010b748ef03102b56c0a246ff00217a1f2484e5a772b0737e02
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.x86_64.rpm
SHA-256: 3abe74941eb42e4c6a9c4e28c1beb1091a96b61c4e13093ff3b45699880fd1b5
kpatch-patch-4_18_0-372_40_1-debuginfo-1-6.el8_6.x86_64.rpm
SHA-256: 76cb3bc2b99fea8546aa1015dac819186877456adb9fa6c0e67ea665f2d7a6de
kpatch-patch-4_18_0-372_40_1-debugsource-1-6.el8_6.x86_64.rpm
SHA-256: 462f8ad074745c0c6acd757f2ef9ab12eea783a3a421c32b226952bda594a06f
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.x86_64.rpm
SHA-256: d08da9842e9447837377c20b41576cd7dde73f955d4ae6346bcc3cf24ee280ba
kpatch-patch-4_18_0-372_41_1-debuginfo-1-5.el8_6.x86_64.rpm
SHA-256: ae4a3b86128dc2cc84491a4aed19416fafddc931d42f4985ddfab7c9033cfe7b
kpatch-patch-4_18_0-372_41_1-debugsource-1-5.el8_6.x86_64.rpm
SHA-256: c719ef43f9b061f6e20bcd580282f86e91d2c53650de942550f77f89679c9169
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.x86_64.rpm
SHA-256: 46b40bda7171dfc43615f6a1b29a2f49a84c25cdf131f92e546bcedfefad553d
kpatch-patch-4_18_0-372_46_1-debuginfo-1-3.el8_6.x86_64.rpm
SHA-256: c8799be3e1de0162db2992d0c69cc92bb2a96bf0022771f9f2a86e58f2cd6cbf
kpatch-patch-4_18_0-372_46_1-debugsource-1-3.el8_6.x86_64.rpm
SHA-256: 6902cc394bd6bc5a0b3044f2898fbc50382e72c59fce60534d9d2f3eecc6fe44
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.x86_64.rpm
SHA-256: 26de0d823e0236b92f602363214c019637f3bab7b9725096cf589e7aa6aeb23f
kpatch-patch-4_18_0-372_51_1-debuginfo-1-2.el8_6.x86_64.rpm
SHA-256: 25e7c804f00a570ce02f1c3e4790b21fd06fa5b4093ad80ce249a961e87515c3
kpatch-patch-4_18_0-372_51_1-debugsource-1-2.el8_6.x86_64.rpm
SHA-256: e2abc4b09c6c3ff2e554ab7249d1c325d640a8946ec3f2d54d967a7021beeebe
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.x86_64.rpm
SHA-256: 41f18539538f8e5c6057437d3b48af6f408135ec65244ae833ad5d1d4b3b183a
kpatch-patch-4_18_0-372_52_1-debuginfo-1-1.el8_6.x86_64.rpm
SHA-256: 8f18ea0d192900a9caf8b3d9db03b9593cb70ef94452130a884351c37c5d91ec
kpatch-patch-4_18_0-372_52_1-debugsource-1-1.el8_6.x86_64.rpm
SHA-256: 6a982925c5a62c3f025e2a59713700b8f7d5fbdd5242fd9c4932d8c88a693c6c
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.src.rpm
SHA-256: de93dcd3b8aa5b5889ef182746811ba3a873b843c6c9c95e8323e161c7f6b901
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.src.rpm
SHA-256: b3a5050ac2c12de8fb9a31caf8328c9cfafc082387f6a543235ee12bcbfda628
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.src.rpm
SHA-256: 31af4081eeecc31579008c1be4103f3ecc490a9561c18439c82fa77aa0f20f6e
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.src.rpm
SHA-256: cb5ebc23ede670a9d03a502ae972491a84802ef17424a35c9444eec290ef6e6a
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.src.rpm
SHA-256: de9e7f007900a3d0f9c572e0c29e7002a4be0f88432f6b11027d0c09a697a2f4
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.src.rpm
SHA-256: f3628ac5f79ccc51e0a289dcc81c14b516348216f3975d2174b81ae57a479b2e
ppc64le
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.ppc64le.rpm
SHA-256: be99e4c682d53313be54d2dffdd6d3545ca13943c580df7f3792963c4dadf8ac
kpatch-patch-4_18_0-372_36_1-debuginfo-1-6.el8_6.ppc64le.rpm
SHA-256: 315b9aabce6bcdcbaf16cdf4a2bcf2fdf93bc5cc8981cca1a9e8b5397e86e3d9
kpatch-patch-4_18_0-372_36_1-debugsource-1-6.el8_6.ppc64le.rpm
SHA-256: 7dd62c81640b8fcd021689fd16c95d1c846e6a1737e0d7ef2680145dbd25f1aa
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.ppc64le.rpm
SHA-256: 8e308ac5aef9602e7cbc20ff29d3796003ab5c99c7ef6cb88dc03163db3e544a
kpatch-patch-4_18_0-372_40_1-debuginfo-1-6.el8_6.ppc64le.rpm
SHA-256: 32f1fb3c94f67e851e81eab08b9349d25d5ecb204528020668359aeb169f11ac
kpatch-patch-4_18_0-372_40_1-debugsource-1-6.el8_6.ppc64le.rpm
SHA-256: a2bfb613146e88c2a25395346e4d52a628e4faf5aee2ff687d2cd7975ec90ef6
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.ppc64le.rpm
SHA-256: c6c80b8e38678317508ca5eae976989e54b055d14a5cd5396c2fc8a277c805b4
kpatch-patch-4_18_0-372_41_1-debuginfo-1-5.el8_6.ppc64le.rpm
SHA-256: fe9586137c12eafa522291ae2a3ffc26837c553bdfe18c20ba10e4a1c6a41b4d
kpatch-patch-4_18_0-372_41_1-debugsource-1-5.el8_6.ppc64le.rpm
SHA-256: 27bf9eb6927a59a07ba04a6630394b982066834c6d21c8d4cfdad15d35a784c0
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.ppc64le.rpm
SHA-256: 1661aaeae056b1d1fac99e7a46fd7a6c225ce591dbb6efdae12be04f5c98452b
kpatch-patch-4_18_0-372_46_1-debuginfo-1-3.el8_6.ppc64le.rpm
SHA-256: 0bcc38ab9f4b06ba0e8438db8db58acf67be5f0f1ae752b734b17d087f5c1234
kpatch-patch-4_18_0-372_46_1-debugsource-1-3.el8_6.ppc64le.rpm
SHA-256: 6a78bb7bdd297c9b7df80474f9646dc6668db334c4df8a72b43b2078e05edf29
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.ppc64le.rpm
SHA-256: 36c6993008c5f5ee2a61c6d44a67272a7707dfd31881cbe18fa3a12de1e5fb53
kpatch-patch-4_18_0-372_51_1-debuginfo-1-2.el8_6.ppc64le.rpm
SHA-256: 7634f10b80232be071a4e921bd80e6a76346338ed8c24bd72bb066810393091a
kpatch-patch-4_18_0-372_51_1-debugsource-1-2.el8_6.ppc64le.rpm
SHA-256: 6eb3d0ec5cb0056be204dd4353c7e9a962cc2513b917a5d0c469979112a6c257
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.ppc64le.rpm
SHA-256: 070edd42f524e0a95e7d5a3bcab4ae634b29ef34cf3b1db85e13b6a07c9126e7
kpatch-patch-4_18_0-372_52_1-debuginfo-1-1.el8_6.ppc64le.rpm
SHA-256: 9f1bbc0ad576b4104570458fbfb7f27bf793db8e3a42ebb90d4ec9fd18283e4c
kpatch-patch-4_18_0-372_52_1-debugsource-1-1.el8_6.ppc64le.rpm
SHA-256: d448d4835c24493367aae23586e63ab6e9addd761f0f8c85ec3150843f45c3cd
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.src.rpm
SHA-256: de93dcd3b8aa5b5889ef182746811ba3a873b843c6c9c95e8323e161c7f6b901
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.src.rpm
SHA-256: b3a5050ac2c12de8fb9a31caf8328c9cfafc082387f6a543235ee12bcbfda628
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.src.rpm
SHA-256: 31af4081eeecc31579008c1be4103f3ecc490a9561c18439c82fa77aa0f20f6e
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.src.rpm
SHA-256: cb5ebc23ede670a9d03a502ae972491a84802ef17424a35c9444eec290ef6e6a
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.src.rpm
SHA-256: de9e7f007900a3d0f9c572e0c29e7002a4be0f88432f6b11027d0c09a697a2f4
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.src.rpm
SHA-256: f3628ac5f79ccc51e0a289dcc81c14b516348216f3975d2174b81ae57a479b2e
x86_64
kpatch-patch-4_18_0-372_36_1-1-6.el8_6.x86_64.rpm
SHA-256: 0a0e2dbd0a5663525527c70f2cac95bad418187b9ae71ed729aa45e2b10f5e3a
kpatch-patch-4_18_0-372_36_1-debuginfo-1-6.el8_6.x86_64.rpm
SHA-256: d7f6f9ab57dccb8269ab69ba7b5b9d7c698d673113149e8b8dff4d11f781bc87
kpatch-patch-4_18_0-372_36_1-debugsource-1-6.el8_6.x86_64.rpm
SHA-256: afbb73bc9ac6c010b748ef03102b56c0a246ff00217a1f2484e5a772b0737e02
kpatch-patch-4_18_0-372_40_1-1-6.el8_6.x86_64.rpm
SHA-256: 3abe74941eb42e4c6a9c4e28c1beb1091a96b61c4e13093ff3b45699880fd1b5
kpatch-patch-4_18_0-372_40_1-debuginfo-1-6.el8_6.x86_64.rpm
SHA-256: 76cb3bc2b99fea8546aa1015dac819186877456adb9fa6c0e67ea665f2d7a6de
kpatch-patch-4_18_0-372_40_1-debugsource-1-6.el8_6.x86_64.rpm
SHA-256: 462f8ad074745c0c6acd757f2ef9ab12eea783a3a421c32b226952bda594a06f
kpatch-patch-4_18_0-372_41_1-1-5.el8_6.x86_64.rpm
SHA-256: d08da9842e9447837377c20b41576cd7dde73f955d4ae6346bcc3cf24ee280ba
kpatch-patch-4_18_0-372_41_1-debuginfo-1-5.el8_6.x86_64.rpm
SHA-256: ae4a3b86128dc2cc84491a4aed19416fafddc931d42f4985ddfab7c9033cfe7b
kpatch-patch-4_18_0-372_41_1-debugsource-1-5.el8_6.x86_64.rpm
SHA-256: c719ef43f9b061f6e20bcd580282f86e91d2c53650de942550f77f89679c9169
kpatch-patch-4_18_0-372_46_1-1-3.el8_6.x86_64.rpm
SHA-256: 46b40bda7171dfc43615f6a1b29a2f49a84c25cdf131f92e546bcedfefad553d
kpatch-patch-4_18_0-372_46_1-debuginfo-1-3.el8_6.x86_64.rpm
SHA-256: c8799be3e1de0162db2992d0c69cc92bb2a96bf0022771f9f2a86e58f2cd6cbf
kpatch-patch-4_18_0-372_46_1-debugsource-1-3.el8_6.x86_64.rpm
SHA-256: 6902cc394bd6bc5a0b3044f2898fbc50382e72c59fce60534d9d2f3eecc6fe44
kpatch-patch-4_18_0-372_51_1-1-2.el8_6.x86_64.rpm
SHA-256: 26de0d823e0236b92f602363214c019637f3bab7b9725096cf589e7aa6aeb23f
kpatch-patch-4_18_0-372_51_1-debuginfo-1-2.el8_6.x86_64.rpm
SHA-256: 25e7c804f00a570ce02f1c3e4790b21fd06fa5b4093ad80ce249a961e87515c3
kpatch-patch-4_18_0-372_51_1-debugsource-1-2.el8_6.x86_64.rpm
SHA-256: e2abc4b09c6c3ff2e554ab7249d1c325d640a8946ec3f2d54d967a7021beeebe
kpatch-patch-4_18_0-372_52_1-1-1.el8_6.x86_64.rpm
SHA-256: 41f18539538f8e5c6057437d3b48af6f408135ec65244ae833ad5d1d4b3b183a
kpatch-patch-4_18_0-372_52_1-debuginfo-1-1.el8_6.x86_64.rpm
SHA-256: 8f18ea0d192900a9caf8b3d9db03b9593cb70ef94452130a884351c37c5d91ec
kpatch-patch-4_18_0-372_52_1-debugsource-1-1.el8_6.x86_64.rpm
SHA-256: 6a982925c5a62c3f025e2a59713700b8f7d5fbdd5242fd9c4932d8c88a693c6c
Related news
IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 254138
Red Hat Security Advisory 2023-4150-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-4021-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include double free and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-3491-01 - An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Issues addressed include a use-after-free vulnerability.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux So...
Red Hat Security Advisory 2023-1584-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled docume...
Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...
Red Hat Security Advisory 2023-1221-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-1220-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1109-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Red Hat Security Advisory 2023-1008-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-1008-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-0945-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack overflow flaw was found in th...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP blue...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP blue...
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetoo...
Red Hat Security Advisory 2023-0858-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Ubuntu Security Notice 5809-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.