Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:0441: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
Red Hat Security Data
#vulnerability#linux#red_hat#rpm#sap

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2147572 - CVE-2022-4139 kernel: i915: Incorrect GPU TLB flush can lead to random memory access

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-4.el8_6.src.rpm

SHA-256: babb0ecdc48ed96c865d1153e6bed15edad6b72da915dd03cb5aa691e9ace030

kpatch-patch-4_18_0-372_16_1-1-4.el8_6.src.rpm

SHA-256: 3bc237b3d752035c367a6e304ce7a4b3e5caeb23437cc07100fd603675506084

kpatch-patch-4_18_0-372_19_1-1-3.el8_6.src.rpm

SHA-256: ba378a9d97589bdae6fc05e018f494732238caa200856eb9750c397e413b4313

kpatch-patch-4_18_0-372_26_1-1-3.el8_6.src.rpm

SHA-256: 4577966ead808f730d92c9aee544b32997afc22452d4dd12e82d03339c1ad4bc

kpatch-patch-4_18_0-372_32_1-1-2.el8_6.src.rpm

SHA-256: 237f6fe16df1ed7dabf53ff427040254e4045141ad038e4af0b4ddb77345e825

kpatch-patch-4_18_0-372_36_1-1-1.el8_6.src.rpm

SHA-256: b05d9538fa103afd71469c7c280981542611178623311df2c7fe3600ffb97501

kpatch-patch-4_18_0-372_40_1-1-1.el8_6.src.rpm

SHA-256: d75ee6560d8b5a419a8e76e8471629fcbc7ad20be5440763f1c871d3dfbb8a53

x86_64

kpatch-patch-4_18_0-372_13_1-1-4.el8_6.x86_64.rpm

SHA-256: 96c62a8797c44ba4ba26210c450f3e19d9f21aa55b5176e4b359a384200b4472

kpatch-patch-4_18_0-372_13_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 894fd4d917dd7b8188b6eced3906eb15805c3cf2534d22bc1a34dea898ed935f

kpatch-patch-4_18_0-372_13_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 62b549d0abc306f28ff0257fc6781dd62091194d09f8494ccaf008cba33da717

kpatch-patch-4_18_0-372_16_1-1-4.el8_6.x86_64.rpm

SHA-256: 6edd0921a9eaad64abc8d647812afd6d8e46d8fa831b86fda5757645bbf885f9

kpatch-patch-4_18_0-372_16_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 67e29479ce9be436e4e8dd9d9155ba47cb44b7b4d4f734ac9e971bfafb0b5be3

kpatch-patch-4_18_0-372_16_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 4d1ed73b6090dd4be657b709bd54f043576c69860d5bd44073c78d3318a51e9a

kpatch-patch-4_18_0-372_19_1-1-3.el8_6.x86_64.rpm

SHA-256: e520b1462e8288e218a1c5a8c9b1c61c0c580033a1ac0ad775e4964c0467bb62

kpatch-patch-4_18_0-372_19_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: 3e28cb510325ed422b81395cd3061c8871e95431a70a67e1cae580930e01e8d6

kpatch-patch-4_18_0-372_19_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: 44cd40576f9e1bb9f13eb430a9a8307aadcb612f4fe783f47db406d2d3d89b8d

kpatch-patch-4_18_0-372_26_1-1-3.el8_6.x86_64.rpm

SHA-256: b8917323d80f3e6274d2272f17e4cccf55f7a66eb347b596e5e6ff753fe82cfc

kpatch-patch-4_18_0-372_26_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: 13394efa8c492dd66aa8db5f6d92c48b79b3e47563c4f0ff9ccc9cc1abc52152

kpatch-patch-4_18_0-372_26_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: e06b2849757604bdab041a8e9b1c4f2927727285688a33bf2adeb060ab0c8ca7

kpatch-patch-4_18_0-372_32_1-1-2.el8_6.x86_64.rpm

SHA-256: eca1466bd2ce2974e4cd18411f0b83d353c5b99252accdafcc02f1c5a13db81f

kpatch-patch-4_18_0-372_32_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: 046f33c637b33c20ce91f820390ed2ad7b52bacd5b4ff0657b41d52dc8cca0bb

kpatch-patch-4_18_0-372_32_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 16710ad94ff5d14e2b85f85476a781bf85361c5687da317658ce56467372c7f3

kpatch-patch-4_18_0-372_36_1-1-1.el8_6.x86_64.rpm

SHA-256: 6654ead54996c764e8c0dc1e3490b9e7309efbdd2c1e3b09fd4957ccdb221275

kpatch-patch-4_18_0-372_36_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 96f87cb974b903e8db207c0036410c5ecb622345223aa8c968562b36c3054a70

kpatch-patch-4_18_0-372_36_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 94a288cdab558c3e4579ea54ad8d52360caf333b92c3835ad5aadbf1bd752612

kpatch-patch-4_18_0-372_40_1-1-1.el8_6.x86_64.rpm

SHA-256: 03096f2051240ed954de54c74c46495c2521427ce386d8da06847c79c7bd1311

kpatch-patch-4_18_0-372_40_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 5f2d771d3809351fa6e61d2fad1601d170e71cf86fec62aa47dad7c5fc2bccf2

kpatch-patch-4_18_0-372_40_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 1e022d0c7b90db98ba501fb759e5e408da54a06b2f69397a8ea3b21aa015e09e

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-4.el8_6.src.rpm

SHA-256: babb0ecdc48ed96c865d1153e6bed15edad6b72da915dd03cb5aa691e9ace030

kpatch-patch-4_18_0-372_16_1-1-4.el8_6.src.rpm

SHA-256: 3bc237b3d752035c367a6e304ce7a4b3e5caeb23437cc07100fd603675506084

kpatch-patch-4_18_0-372_19_1-1-3.el8_6.src.rpm

SHA-256: ba378a9d97589bdae6fc05e018f494732238caa200856eb9750c397e413b4313

kpatch-patch-4_18_0-372_26_1-1-3.el8_6.src.rpm

SHA-256: 4577966ead808f730d92c9aee544b32997afc22452d4dd12e82d03339c1ad4bc

kpatch-patch-4_18_0-372_32_1-1-2.el8_6.src.rpm

SHA-256: 237f6fe16df1ed7dabf53ff427040254e4045141ad038e4af0b4ddb77345e825

kpatch-patch-4_18_0-372_36_1-1-1.el8_6.src.rpm

SHA-256: b05d9538fa103afd71469c7c280981542611178623311df2c7fe3600ffb97501

kpatch-patch-4_18_0-372_40_1-1-1.el8_6.src.rpm

SHA-256: d75ee6560d8b5a419a8e76e8471629fcbc7ad20be5440763f1c871d3dfbb8a53

x86_64

kpatch-patch-4_18_0-372_13_1-1-4.el8_6.x86_64.rpm

SHA-256: 96c62a8797c44ba4ba26210c450f3e19d9f21aa55b5176e4b359a384200b4472

kpatch-patch-4_18_0-372_13_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 894fd4d917dd7b8188b6eced3906eb15805c3cf2534d22bc1a34dea898ed935f

kpatch-patch-4_18_0-372_13_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 62b549d0abc306f28ff0257fc6781dd62091194d09f8494ccaf008cba33da717

kpatch-patch-4_18_0-372_16_1-1-4.el8_6.x86_64.rpm

SHA-256: 6edd0921a9eaad64abc8d647812afd6d8e46d8fa831b86fda5757645bbf885f9

kpatch-patch-4_18_0-372_16_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 67e29479ce9be436e4e8dd9d9155ba47cb44b7b4d4f734ac9e971bfafb0b5be3

kpatch-patch-4_18_0-372_16_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 4d1ed73b6090dd4be657b709bd54f043576c69860d5bd44073c78d3318a51e9a

kpatch-patch-4_18_0-372_19_1-1-3.el8_6.x86_64.rpm

SHA-256: e520b1462e8288e218a1c5a8c9b1c61c0c580033a1ac0ad775e4964c0467bb62

kpatch-patch-4_18_0-372_19_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: 3e28cb510325ed422b81395cd3061c8871e95431a70a67e1cae580930e01e8d6

kpatch-patch-4_18_0-372_19_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: 44cd40576f9e1bb9f13eb430a9a8307aadcb612f4fe783f47db406d2d3d89b8d

kpatch-patch-4_18_0-372_26_1-1-3.el8_6.x86_64.rpm

SHA-256: b8917323d80f3e6274d2272f17e4cccf55f7a66eb347b596e5e6ff753fe82cfc

kpatch-patch-4_18_0-372_26_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: 13394efa8c492dd66aa8db5f6d92c48b79b3e47563c4f0ff9ccc9cc1abc52152

kpatch-patch-4_18_0-372_26_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: e06b2849757604bdab041a8e9b1c4f2927727285688a33bf2adeb060ab0c8ca7

kpatch-patch-4_18_0-372_32_1-1-2.el8_6.x86_64.rpm

SHA-256: eca1466bd2ce2974e4cd18411f0b83d353c5b99252accdafcc02f1c5a13db81f

kpatch-patch-4_18_0-372_32_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: 046f33c637b33c20ce91f820390ed2ad7b52bacd5b4ff0657b41d52dc8cca0bb

kpatch-patch-4_18_0-372_32_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 16710ad94ff5d14e2b85f85476a781bf85361c5687da317658ce56467372c7f3

kpatch-patch-4_18_0-372_36_1-1-1.el8_6.x86_64.rpm

SHA-256: 6654ead54996c764e8c0dc1e3490b9e7309efbdd2c1e3b09fd4957ccdb221275

kpatch-patch-4_18_0-372_36_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 96f87cb974b903e8db207c0036410c5ecb622345223aa8c968562b36c3054a70

kpatch-patch-4_18_0-372_36_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 94a288cdab558c3e4579ea54ad8d52360caf333b92c3835ad5aadbf1bd752612

kpatch-patch-4_18_0-372_40_1-1-1.el8_6.x86_64.rpm

SHA-256: 03096f2051240ed954de54c74c46495c2521427ce386d8da06847c79c7bd1311

kpatch-patch-4_18_0-372_40_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 5f2d771d3809351fa6e61d2fad1601d170e71cf86fec62aa47dad7c5fc2bccf2

kpatch-patch-4_18_0-372_40_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 1e022d0c7b90db98ba501fb759e5e408da54a06b2f69397a8ea3b21aa015e09e

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-4.el8_6.src.rpm

SHA-256: babb0ecdc48ed96c865d1153e6bed15edad6b72da915dd03cb5aa691e9ace030

kpatch-patch-4_18_0-372_16_1-1-4.el8_6.src.rpm

SHA-256: 3bc237b3d752035c367a6e304ce7a4b3e5caeb23437cc07100fd603675506084

kpatch-patch-4_18_0-372_19_1-1-3.el8_6.src.rpm

SHA-256: ba378a9d97589bdae6fc05e018f494732238caa200856eb9750c397e413b4313

kpatch-patch-4_18_0-372_26_1-1-3.el8_6.src.rpm

SHA-256: 4577966ead808f730d92c9aee544b32997afc22452d4dd12e82d03339c1ad4bc

kpatch-patch-4_18_0-372_32_1-1-2.el8_6.src.rpm

SHA-256: 237f6fe16df1ed7dabf53ff427040254e4045141ad038e4af0b4ddb77345e825

kpatch-patch-4_18_0-372_36_1-1-1.el8_6.src.rpm

SHA-256: b05d9538fa103afd71469c7c280981542611178623311df2c7fe3600ffb97501

kpatch-patch-4_18_0-372_40_1-1-1.el8_6.src.rpm

SHA-256: d75ee6560d8b5a419a8e76e8471629fcbc7ad20be5440763f1c871d3dfbb8a53

ppc64le

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-4.el8_6.src.rpm

SHA-256: babb0ecdc48ed96c865d1153e6bed15edad6b72da915dd03cb5aa691e9ace030

kpatch-patch-4_18_0-372_16_1-1-4.el8_6.src.rpm

SHA-256: 3bc237b3d752035c367a6e304ce7a4b3e5caeb23437cc07100fd603675506084

kpatch-patch-4_18_0-372_19_1-1-3.el8_6.src.rpm

SHA-256: ba378a9d97589bdae6fc05e018f494732238caa200856eb9750c397e413b4313

kpatch-patch-4_18_0-372_26_1-1-3.el8_6.src.rpm

SHA-256: 4577966ead808f730d92c9aee544b32997afc22452d4dd12e82d03339c1ad4bc

kpatch-patch-4_18_0-372_32_1-1-2.el8_6.src.rpm

SHA-256: 237f6fe16df1ed7dabf53ff427040254e4045141ad038e4af0b4ddb77345e825

kpatch-patch-4_18_0-372_36_1-1-1.el8_6.src.rpm

SHA-256: b05d9538fa103afd71469c7c280981542611178623311df2c7fe3600ffb97501

kpatch-patch-4_18_0-372_40_1-1-1.el8_6.src.rpm

SHA-256: d75ee6560d8b5a419a8e76e8471629fcbc7ad20be5440763f1c871d3dfbb8a53

x86_64

kpatch-patch-4_18_0-372_13_1-1-4.el8_6.x86_64.rpm

SHA-256: 96c62a8797c44ba4ba26210c450f3e19d9f21aa55b5176e4b359a384200b4472

kpatch-patch-4_18_0-372_13_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 894fd4d917dd7b8188b6eced3906eb15805c3cf2534d22bc1a34dea898ed935f

kpatch-patch-4_18_0-372_13_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 62b549d0abc306f28ff0257fc6781dd62091194d09f8494ccaf008cba33da717

kpatch-patch-4_18_0-372_16_1-1-4.el8_6.x86_64.rpm

SHA-256: 6edd0921a9eaad64abc8d647812afd6d8e46d8fa831b86fda5757645bbf885f9

kpatch-patch-4_18_0-372_16_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 67e29479ce9be436e4e8dd9d9155ba47cb44b7b4d4f734ac9e971bfafb0b5be3

kpatch-patch-4_18_0-372_16_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 4d1ed73b6090dd4be657b709bd54f043576c69860d5bd44073c78d3318a51e9a

kpatch-patch-4_18_0-372_19_1-1-3.el8_6.x86_64.rpm

SHA-256: e520b1462e8288e218a1c5a8c9b1c61c0c580033a1ac0ad775e4964c0467bb62

kpatch-patch-4_18_0-372_19_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: 3e28cb510325ed422b81395cd3061c8871e95431a70a67e1cae580930e01e8d6

kpatch-patch-4_18_0-372_19_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: 44cd40576f9e1bb9f13eb430a9a8307aadcb612f4fe783f47db406d2d3d89b8d

kpatch-patch-4_18_0-372_26_1-1-3.el8_6.x86_64.rpm

SHA-256: b8917323d80f3e6274d2272f17e4cccf55f7a66eb347b596e5e6ff753fe82cfc

kpatch-patch-4_18_0-372_26_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: 13394efa8c492dd66aa8db5f6d92c48b79b3e47563c4f0ff9ccc9cc1abc52152

kpatch-patch-4_18_0-372_26_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: e06b2849757604bdab041a8e9b1c4f2927727285688a33bf2adeb060ab0c8ca7

kpatch-patch-4_18_0-372_32_1-1-2.el8_6.x86_64.rpm

SHA-256: eca1466bd2ce2974e4cd18411f0b83d353c5b99252accdafcc02f1c5a13db81f

kpatch-patch-4_18_0-372_32_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: 046f33c637b33c20ce91f820390ed2ad7b52bacd5b4ff0657b41d52dc8cca0bb

kpatch-patch-4_18_0-372_32_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 16710ad94ff5d14e2b85f85476a781bf85361c5687da317658ce56467372c7f3

kpatch-patch-4_18_0-372_36_1-1-1.el8_6.x86_64.rpm

SHA-256: 6654ead54996c764e8c0dc1e3490b9e7309efbdd2c1e3b09fd4957ccdb221275

kpatch-patch-4_18_0-372_36_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 96f87cb974b903e8db207c0036410c5ecb622345223aa8c968562b36c3054a70

kpatch-patch-4_18_0-372_36_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 94a288cdab558c3e4579ea54ad8d52360caf333b92c3835ad5aadbf1bd752612

kpatch-patch-4_18_0-372_40_1-1-1.el8_6.x86_64.rpm

SHA-256: 03096f2051240ed954de54c74c46495c2521427ce386d8da06847c79c7bd1311

kpatch-patch-4_18_0-372_40_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 5f2d771d3809351fa6e61d2fad1601d170e71cf86fec62aa47dad7c5fc2bccf2

kpatch-patch-4_18_0-372_40_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 1e022d0c7b90db98ba501fb759e5e408da54a06b2f69397a8ea3b21aa015e09e

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-4.el8_6.src.rpm

SHA-256: babb0ecdc48ed96c865d1153e6bed15edad6b72da915dd03cb5aa691e9ace030

kpatch-patch-4_18_0-372_16_1-1-4.el8_6.src.rpm

SHA-256: 3bc237b3d752035c367a6e304ce7a4b3e5caeb23437cc07100fd603675506084

kpatch-patch-4_18_0-372_19_1-1-3.el8_6.src.rpm

SHA-256: ba378a9d97589bdae6fc05e018f494732238caa200856eb9750c397e413b4313

kpatch-patch-4_18_0-372_26_1-1-3.el8_6.src.rpm

SHA-256: 4577966ead808f730d92c9aee544b32997afc22452d4dd12e82d03339c1ad4bc

kpatch-patch-4_18_0-372_32_1-1-2.el8_6.src.rpm

SHA-256: 237f6fe16df1ed7dabf53ff427040254e4045141ad038e4af0b4ddb77345e825

kpatch-patch-4_18_0-372_36_1-1-1.el8_6.src.rpm

SHA-256: b05d9538fa103afd71469c7c280981542611178623311df2c7fe3600ffb97501

kpatch-patch-4_18_0-372_40_1-1-1.el8_6.src.rpm

SHA-256: d75ee6560d8b5a419a8e76e8471629fcbc7ad20be5440763f1c871d3dfbb8a53

ppc64le

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-4.el8_6.src.rpm

SHA-256: babb0ecdc48ed96c865d1153e6bed15edad6b72da915dd03cb5aa691e9ace030

kpatch-patch-4_18_0-372_16_1-1-4.el8_6.src.rpm

SHA-256: 3bc237b3d752035c367a6e304ce7a4b3e5caeb23437cc07100fd603675506084

kpatch-patch-4_18_0-372_19_1-1-3.el8_6.src.rpm

SHA-256: ba378a9d97589bdae6fc05e018f494732238caa200856eb9750c397e413b4313

kpatch-patch-4_18_0-372_26_1-1-3.el8_6.src.rpm

SHA-256: 4577966ead808f730d92c9aee544b32997afc22452d4dd12e82d03339c1ad4bc

kpatch-patch-4_18_0-372_32_1-1-2.el8_6.src.rpm

SHA-256: 237f6fe16df1ed7dabf53ff427040254e4045141ad038e4af0b4ddb77345e825

kpatch-patch-4_18_0-372_36_1-1-1.el8_6.src.rpm

SHA-256: b05d9538fa103afd71469c7c280981542611178623311df2c7fe3600ffb97501

kpatch-patch-4_18_0-372_40_1-1-1.el8_6.src.rpm

SHA-256: d75ee6560d8b5a419a8e76e8471629fcbc7ad20be5440763f1c871d3dfbb8a53

x86_64

kpatch-patch-4_18_0-372_13_1-1-4.el8_6.x86_64.rpm

SHA-256: 96c62a8797c44ba4ba26210c450f3e19d9f21aa55b5176e4b359a384200b4472

kpatch-patch-4_18_0-372_13_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 894fd4d917dd7b8188b6eced3906eb15805c3cf2534d22bc1a34dea898ed935f

kpatch-patch-4_18_0-372_13_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 62b549d0abc306f28ff0257fc6781dd62091194d09f8494ccaf008cba33da717

kpatch-patch-4_18_0-372_16_1-1-4.el8_6.x86_64.rpm

SHA-256: 6edd0921a9eaad64abc8d647812afd6d8e46d8fa831b86fda5757645bbf885f9

kpatch-patch-4_18_0-372_16_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 67e29479ce9be436e4e8dd9d9155ba47cb44b7b4d4f734ac9e971bfafb0b5be3

kpatch-patch-4_18_0-372_16_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 4d1ed73b6090dd4be657b709bd54f043576c69860d5bd44073c78d3318a51e9a

kpatch-patch-4_18_0-372_19_1-1-3.el8_6.x86_64.rpm

SHA-256: e520b1462e8288e218a1c5a8c9b1c61c0c580033a1ac0ad775e4964c0467bb62

kpatch-patch-4_18_0-372_19_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: 3e28cb510325ed422b81395cd3061c8871e95431a70a67e1cae580930e01e8d6

kpatch-patch-4_18_0-372_19_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: 44cd40576f9e1bb9f13eb430a9a8307aadcb612f4fe783f47db406d2d3d89b8d

kpatch-patch-4_18_0-372_26_1-1-3.el8_6.x86_64.rpm

SHA-256: b8917323d80f3e6274d2272f17e4cccf55f7a66eb347b596e5e6ff753fe82cfc

kpatch-patch-4_18_0-372_26_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: 13394efa8c492dd66aa8db5f6d92c48b79b3e47563c4f0ff9ccc9cc1abc52152

kpatch-patch-4_18_0-372_26_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: e06b2849757604bdab041a8e9b1c4f2927727285688a33bf2adeb060ab0c8ca7

kpatch-patch-4_18_0-372_32_1-1-2.el8_6.x86_64.rpm

SHA-256: eca1466bd2ce2974e4cd18411f0b83d353c5b99252accdafcc02f1c5a13db81f

kpatch-patch-4_18_0-372_32_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: 046f33c637b33c20ce91f820390ed2ad7b52bacd5b4ff0657b41d52dc8cca0bb

kpatch-patch-4_18_0-372_32_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 16710ad94ff5d14e2b85f85476a781bf85361c5687da317658ce56467372c7f3

kpatch-patch-4_18_0-372_36_1-1-1.el8_6.x86_64.rpm

SHA-256: 6654ead54996c764e8c0dc1e3490b9e7309efbdd2c1e3b09fd4957ccdb221275

kpatch-patch-4_18_0-372_36_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 96f87cb974b903e8db207c0036410c5ecb622345223aa8c968562b36c3054a70

kpatch-patch-4_18_0-372_36_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 94a288cdab558c3e4579ea54ad8d52360caf333b92c3835ad5aadbf1bd752612

kpatch-patch-4_18_0-372_40_1-1-1.el8_6.x86_64.rpm

SHA-256: 03096f2051240ed954de54c74c46495c2521427ce386d8da06847c79c7bd1311

kpatch-patch-4_18_0-372_40_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 5f2d771d3809351fa6e61d2fad1601d170e71cf86fec62aa47dad7c5fc2bccf2

kpatch-patch-4_18_0-372_40_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 1e022d0c7b90db98ba501fb759e5e408da54a06b2f69397a8ea3b21aa015e09e

Related news

CVE-2023-23694: DSA-2023-071: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities – 7.0.450

Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

Ubuntu Security Notice USN-5962-1

Ubuntu Security Notice 5962-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5950-1

Ubuntu Security Notice 5950-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5941-1

Ubuntu Security Notice 5941-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5940-1

Ubuntu Security Notice 5940-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5939-1

Ubuntu Security Notice 5939-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5935-1

Ubuntu Security Notice 5935-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5912-1

Ubuntu Security Notice 5912-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-0859-01

Red Hat Security Advisory 2023-0859-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include code execution and integer overflow vulnerabilities.

RHSA-2023:0859: Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update batch#4 (oVirt-4.5.3-4)

An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4139: An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system. * CVE-2022-47629: A vulnerability was found in the Libksba library, due to an integer ...

Ubuntu Security Notice USN-5859-1

Ubuntu Security Notice 5859-1 - Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the Netronome Ethernet driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-0499-01

Red Hat Security Advisory 2023-0499-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

RHSA-2023:0531: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0536: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0526: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0499: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

Red Hat Security Advisory 2023-0441-01

Red Hat Security Advisory 2023-0441-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-0440-01

Red Hat Security Advisory 2023-0440-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.

RHSA-2023:0440: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions

RHSA-2023:0334: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-30594: ...

Red Hat Security Advisory 2023-0123-01

Red Hat Security Advisory 2023-0123-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-0101-01

Red Hat Security Advisory 2023-0101-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.

RHSA-2023:0101: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0123: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

CVE-2023-0036: en/security-disclosure/2023/2023-01.md · OpenHarmony/security - Gitee.com

platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]