Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:1559: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
  • CVE-2023-0266: A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue.
Red Hat Security Data
#vulnerability#windows#linux#red_hat#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
  • ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • iavf: Fix updating statistics (BZ#2142509)
  • RHEL8.4: Backport the new cgroup slab memory controller in v.5.9 (BZ#2164636)
  • Windows Server 2019 guest randomly pauses with “KVM: entry failed, hardware error 0x80000021” (BZ#2166371)
  • RHEL8.3: Backport upstream locking changes up to v5.6 (BZ#2170061)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64

Fixes

  • BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
  • BZ - 2163379 - CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF

Red Hat Enterprise Linux Server - AUS 8.2

SRPM

kernel-4.18.0-193.105.1.el8_2.src.rpm

SHA-256: 26d88d139fd4bb3f99c70b1b5faf9156a385e24521eb7d9141151babb9a8be99

x86_64

bpftool-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 94a6d90be4b80e8c400c5bb1aea8b78c340e8428db852b57ae7cba628681ee22

bpftool-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: d8a95002eab8115f2f5b3dceea6fa9994bd2b7544335004da27b3821bd291fca

kernel-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 0824b404f9ca94f48b1ada15ccb2eed81321a4da7ef883536da815c1fb8a4df8

kernel-abi-whitelists-4.18.0-193.105.1.el8_2.noarch.rpm

SHA-256: 93b0d4df5474fc1e16d03e0f8a8753e121888649f0b29f86713aed41d2ce31c9

kernel-core-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 0494b0c2156e07d2b46248804fcb8c7e7a08b019f5a35fea00f8d3718e63c654

kernel-cross-headers-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: a911ffdb4cd65c146a81ec1e6997ec9ce654787ae10721733dc66d2b8b1efeff

kernel-debug-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: fa8c2dc08efe39efd96a6c6faf4b4612559b28c8d3bb83815d75f874f0ba182f

kernel-debug-core-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 98bb278e9cb758e284ce917196cadbcc58fa758f74edc9e0547842aa7f2020e1

kernel-debug-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: f0c8104ff6c8dc82792c2600947d31df8039b5cdc091a8a2e00067d610275842

kernel-debug-devel-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: d0a4b80ff1312183e1f22c1b20d2d5bf2f57f548d5b39e308e7578009d0acf5a

kernel-debug-modules-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 055d0deec07dee5feeb83aebeec87fedbfb0d6548a3ef461929ca8bf13834aa0

kernel-debug-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 5cbcadc47366e81f9ef1da643bd62d9774ad0b892c0044e18f692d0bba593453

kernel-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 92d1decc3c616b098f1bcb1dd56f74faf0f490226a9b52d61e3e7dcd494daea9

kernel-debuginfo-common-x86_64-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 7da99b1868694cba5efa3fc041a8aee53bd511a187ba0553a32db038fe432a28

kernel-devel-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 14f1e1c7e3cfa5c6f15cb4d43b7ca32927109c49f395cbab109e61ec0c67ba44

kernel-doc-4.18.0-193.105.1.el8_2.noarch.rpm

SHA-256: 99d40551a4b4da72eb909c8cd6f078dbce63a27b079926ef9e106c509f48e386

kernel-headers-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 6ca23ba72a5895e0349bd454fbc4fe6e4c6bebb1dd8de0cb5a1f4b43e4730caf

kernel-modules-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 03543ef9c63a9db829dfa775c7edb06eb94afb23c30713e6201e778a0007efd0

kernel-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 4ce991104734a3b564c9dcca9f5d9e9b4f0ffca0e4873683a1ebad8c4dd83e8d

kernel-tools-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 9a19d9e49368e63fc684d21782cbd2d4797d5090bac5828875cb45f8281fd18b

kernel-tools-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 3a25d7f5e28e30bb8b712b965d71facc53b2f13d4284380c9bdec70601bdbfdd

kernel-tools-libs-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: c534134f253f3fc26dd6976ffd06514210277eb667dfb7cd79cdd2adbe3f4482

perf-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: b0a3d107b3627df7f525d485c8739152839b448b04a260613a41c3f521f6a1ba

perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 8253684f159e7876ace5548d46f22f68b8928e044646d1f302b336f39eaa1552

python3-perf-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: fe23c8d5c1fadd7cadc8fa1c0d193395d2de7302fd116cc5a7b725ea83eb7e7e

python3-perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 3e57e3813208cbfe40a4ed3e9fae6b98f45abdd13c615a32fb5137b2cc17e6be

Red Hat Enterprise Linux Server - TUS 8.2

SRPM

kernel-4.18.0-193.105.1.el8_2.src.rpm

SHA-256: 26d88d139fd4bb3f99c70b1b5faf9156a385e24521eb7d9141151babb9a8be99

x86_64

bpftool-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 94a6d90be4b80e8c400c5bb1aea8b78c340e8428db852b57ae7cba628681ee22

bpftool-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: d8a95002eab8115f2f5b3dceea6fa9994bd2b7544335004da27b3821bd291fca

kernel-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 0824b404f9ca94f48b1ada15ccb2eed81321a4da7ef883536da815c1fb8a4df8

kernel-abi-whitelists-4.18.0-193.105.1.el8_2.noarch.rpm

SHA-256: 93b0d4df5474fc1e16d03e0f8a8753e121888649f0b29f86713aed41d2ce31c9

kernel-core-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 0494b0c2156e07d2b46248804fcb8c7e7a08b019f5a35fea00f8d3718e63c654

kernel-cross-headers-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: a911ffdb4cd65c146a81ec1e6997ec9ce654787ae10721733dc66d2b8b1efeff

kernel-debug-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: fa8c2dc08efe39efd96a6c6faf4b4612559b28c8d3bb83815d75f874f0ba182f

kernel-debug-core-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 98bb278e9cb758e284ce917196cadbcc58fa758f74edc9e0547842aa7f2020e1

kernel-debug-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: f0c8104ff6c8dc82792c2600947d31df8039b5cdc091a8a2e00067d610275842

kernel-debug-devel-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: d0a4b80ff1312183e1f22c1b20d2d5bf2f57f548d5b39e308e7578009d0acf5a

kernel-debug-modules-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 055d0deec07dee5feeb83aebeec87fedbfb0d6548a3ef461929ca8bf13834aa0

kernel-debug-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 5cbcadc47366e81f9ef1da643bd62d9774ad0b892c0044e18f692d0bba593453

kernel-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 92d1decc3c616b098f1bcb1dd56f74faf0f490226a9b52d61e3e7dcd494daea9

kernel-debuginfo-common-x86_64-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 7da99b1868694cba5efa3fc041a8aee53bd511a187ba0553a32db038fe432a28

kernel-devel-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 14f1e1c7e3cfa5c6f15cb4d43b7ca32927109c49f395cbab109e61ec0c67ba44

kernel-doc-4.18.0-193.105.1.el8_2.noarch.rpm

SHA-256: 99d40551a4b4da72eb909c8cd6f078dbce63a27b079926ef9e106c509f48e386

kernel-headers-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 6ca23ba72a5895e0349bd454fbc4fe6e4c6bebb1dd8de0cb5a1f4b43e4730caf

kernel-modules-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 03543ef9c63a9db829dfa775c7edb06eb94afb23c30713e6201e778a0007efd0

kernel-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 4ce991104734a3b564c9dcca9f5d9e9b4f0ffca0e4873683a1ebad8c4dd83e8d

kernel-tools-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 9a19d9e49368e63fc684d21782cbd2d4797d5090bac5828875cb45f8281fd18b

kernel-tools-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 3a25d7f5e28e30bb8b712b965d71facc53b2f13d4284380c9bdec70601bdbfdd

kernel-tools-libs-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: c534134f253f3fc26dd6976ffd06514210277eb667dfb7cd79cdd2adbe3f4482

perf-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: b0a3d107b3627df7f525d485c8739152839b448b04a260613a41c3f521f6a1ba

perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 8253684f159e7876ace5548d46f22f68b8928e044646d1f302b336f39eaa1552

python3-perf-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: fe23c8d5c1fadd7cadc8fa1c0d193395d2de7302fd116cc5a7b725ea83eb7e7e

python3-perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 3e57e3813208cbfe40a4ed3e9fae6b98f45abdd13c615a32fb5137b2cc17e6be

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2

SRPM

kernel-4.18.0-193.105.1.el8_2.src.rpm

SHA-256: 26d88d139fd4bb3f99c70b1b5faf9156a385e24521eb7d9141151babb9a8be99

ppc64le

bpftool-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 40a6988d775a30923513a0e03303aa2bfcd7aaad4c71757a97048b5f4b6687a2

bpftool-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 0852089427af36d67efb4bf55d2cb6bc9bc971dfd4da72a3a8c5e3c32107124a

kernel-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 900bc52997aad1fff08be96dbaf58bc66d1669c3ff75c6a0f6a1faec0106346b

kernel-abi-whitelists-4.18.0-193.105.1.el8_2.noarch.rpm

SHA-256: 93b0d4df5474fc1e16d03e0f8a8753e121888649f0b29f86713aed41d2ce31c9

kernel-core-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 227a180102752498ecfbccfc8e54a8283146bded9de6ebe1c7e08b3a04d9fe96

kernel-cross-headers-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: ab3353a71727ea7618497182e3948fb2be10c5f2f55716fe9a3e4cd1a2351c42

kernel-debug-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: c4c37f2851f434dd703d4def043c3804427a36bc1d9eeb67daf914fce9afd031

kernel-debug-core-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: ebc844956017d8e67abfc9ddbbf9ebe263ae15cb7388353da4301fa444ece01a

kernel-debug-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 9d7896535827708523b73f4d6f3d5c88e8dd72ccad39982b4b0cfb7eaab90876

kernel-debug-devel-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 44a1a246601119d745f3f09156148aea4fe3cefdb26a0e4612f1da6a6dd6f0c9

kernel-debug-modules-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 6298f4f655bf5fcab08548d4c2708d4541a09af34369a38fac90d47298925f7a

kernel-debug-modules-extra-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 88b76c9e4e1a5d984aaf4c2d209625c20994e0eb4fa8f35d7d9f0a5be28edb83

kernel-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 8ce8a87bf7e5d1b97adcd779f5564892d7405bac3f50de40da031a372a0a04da

kernel-debuginfo-common-ppc64le-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: f5b0c0d3c59c01f0950d3958b2d6af6edc39f42ca002ced3d07e43fe47618734

kernel-devel-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: b5684a0ccd50fbf4e36040417223e8e89b00553ad0b9d17e45f6d0b11a567d29

kernel-doc-4.18.0-193.105.1.el8_2.noarch.rpm

SHA-256: 99d40551a4b4da72eb909c8cd6f078dbce63a27b079926ef9e106c509f48e386

kernel-headers-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: b5855625850b2e55db967855588a29f7a66212d91fb19d632a39eac52cc12d6a

kernel-modules-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 5850827a95639785a3b1195e8e6067be781e56a4c2e3454525c1fe8700edbac3

kernel-modules-extra-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 5ce3cb5be1ec402aaa0688a694ccc0eafe96c8e3dac36b889c79b3b8d427f65f

kernel-tools-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 6d4b454004aff5743635691a5fc7a549f013d6e2d61c7c1ee334ba6b8ebcc1e8

kernel-tools-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: a31b504dfd07f315e2b1e3fc4490c04b9efa8a59d19b84b8df510c1e26c30900

kernel-tools-libs-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 29db104e93e8387d39faf3e74142876175e80a5d070d9cddb320452999ba7c20

perf-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: a5da9b0fe74fa2259c7a77c068085c6ff0cb59d736edb7a508d160e5ab3585b7

perf-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 26a24cde82fcc988198911974870f23e9c9d8b26fa8ce4493f4c067e4f7d1f01

python3-perf-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 965f4c02b6fc71bcafdda7fa39c56001ff0bae5c1edcf2a3a580ad7d35363cea

python3-perf-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm

SHA-256: 71a4c6f77d4bc1723a66ca2bf752b1adca045c75882a07caebb87822f335069b

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2

SRPM

kernel-4.18.0-193.105.1.el8_2.src.rpm

SHA-256: 26d88d139fd4bb3f99c70b1b5faf9156a385e24521eb7d9141151babb9a8be99

x86_64

bpftool-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 94a6d90be4b80e8c400c5bb1aea8b78c340e8428db852b57ae7cba628681ee22

bpftool-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: d8a95002eab8115f2f5b3dceea6fa9994bd2b7544335004da27b3821bd291fca

kernel-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 0824b404f9ca94f48b1ada15ccb2eed81321a4da7ef883536da815c1fb8a4df8

kernel-abi-whitelists-4.18.0-193.105.1.el8_2.noarch.rpm

SHA-256: 93b0d4df5474fc1e16d03e0f8a8753e121888649f0b29f86713aed41d2ce31c9

kernel-core-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 0494b0c2156e07d2b46248804fcb8c7e7a08b019f5a35fea00f8d3718e63c654

kernel-cross-headers-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: a911ffdb4cd65c146a81ec1e6997ec9ce654787ae10721733dc66d2b8b1efeff

kernel-debug-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: fa8c2dc08efe39efd96a6c6faf4b4612559b28c8d3bb83815d75f874f0ba182f

kernel-debug-core-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 98bb278e9cb758e284ce917196cadbcc58fa758f74edc9e0547842aa7f2020e1

kernel-debug-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: f0c8104ff6c8dc82792c2600947d31df8039b5cdc091a8a2e00067d610275842

kernel-debug-devel-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: d0a4b80ff1312183e1f22c1b20d2d5bf2f57f548d5b39e308e7578009d0acf5a

kernel-debug-modules-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 055d0deec07dee5feeb83aebeec87fedbfb0d6548a3ef461929ca8bf13834aa0

kernel-debug-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 5cbcadc47366e81f9ef1da643bd62d9774ad0b892c0044e18f692d0bba593453

kernel-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 92d1decc3c616b098f1bcb1dd56f74faf0f490226a9b52d61e3e7dcd494daea9

kernel-debuginfo-common-x86_64-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 7da99b1868694cba5efa3fc041a8aee53bd511a187ba0553a32db038fe432a28

kernel-devel-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 14f1e1c7e3cfa5c6f15cb4d43b7ca32927109c49f395cbab109e61ec0c67ba44

kernel-doc-4.18.0-193.105.1.el8_2.noarch.rpm

SHA-256: 99d40551a4b4da72eb909c8cd6f078dbce63a27b079926ef9e106c509f48e386

kernel-headers-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 6ca23ba72a5895e0349bd454fbc4fe6e4c6bebb1dd8de0cb5a1f4b43e4730caf

kernel-modules-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 03543ef9c63a9db829dfa775c7edb06eb94afb23c30713e6201e778a0007efd0

kernel-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 4ce991104734a3b564c9dcca9f5d9e9b4f0ffca0e4873683a1ebad8c4dd83e8d

kernel-tools-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 9a19d9e49368e63fc684d21782cbd2d4797d5090bac5828875cb45f8281fd18b

kernel-tools-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 3a25d7f5e28e30bb8b712b965d71facc53b2f13d4284380c9bdec70601bdbfdd

kernel-tools-libs-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: c534134f253f3fc26dd6976ffd06514210277eb667dfb7cd79cdd2adbe3f4482

perf-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: b0a3d107b3627df7f525d485c8739152839b448b04a260613a41c3f521f6a1ba

perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 8253684f159e7876ace5548d46f22f68b8928e044646d1f302b336f39eaa1552

python3-perf-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: fe23c8d5c1fadd7cadc8fa1c0d193395d2de7302fd116cc5a7b725ea83eb7e7e

python3-perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm

SHA-256: 3e57e3813208cbfe40a4ed3e9fae6b98f45abdd13c615a32fb5137b2cc17e6be

Related news

CVE-2023-30994: Security Bulletin: IBM QRadar SIEM includes components with known vulnerabilities

IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 254138

Red Hat Security Advisory 2023-4150-01

Red Hat Security Advisory 2023-4150-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-4021-01

Red Hat Security Advisory 2023-4021-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include double free and use-after-free vulnerabilities.

RHSA-2023:3491: Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update

An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or poten...

Apple's iOS 16.5 Fixes 3 Security Bugs Already Used in Attacks

Plus: Microsoft patches two zero-day flaws, Google’s Android and Chrome get some much-needed updates, and more.

CVE-2023-23694: DSA-2023-071: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities – 7.0.450

Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

Red Hat Security Advisory 2023-2104-01

Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-1953-01

Red Hat Security Advisory 2023-1953-01 - Red Hat OpenShift Logging Subsystem 5.6.5 update. Issues addressed include cross site scripting and denial of service vulnerabilities.

Red Hat Security Advisory 2023-1677-01

Red Hat Security Advisory 2023-1677-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow and integer overflow vulnerabilities.

Ubuntu Security Notice USN-6009-1

Ubuntu Security Notice 6009-1 - It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6000-1

Ubuntu Security Notice 6000-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Red Hat Security Advisory 2023-1659-01

Red Hat Security Advisory 2023-1659-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-1557-01

Red Hat Security Advisory 2023-1557-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

RHSA-2023:1590: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. In this flaw a normal privileged, local attacker may impact the system due to a locking issue in the compat path, leading to a kernel information leak prob...

RHSA-2023:1588: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue.

Ubuntu Security Notice USN-5987-1

Ubuntu Security Notice 5987-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.

Google reveals spyware attack on Android, iOS, and Chrome

By Habiba Rashid Google's Threat Analysis Group (TAG) labeled the spyware campaign as limited but highly targeted. This is a post from HackRead.com Read the original post: Google reveals spyware attack on Android, iOS, and Chrome

Spyware Vendors Caught Exploiting Zero-Day Vulnerabilities on Android and iOS Devices

A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to target Android and iOS devices, Google's Threat Analysis Group (TAG) has revealed. The two distinct campaigns were both limited and highly targeted, taking advantage of the patch gap between the release of a fix and when it was actually deployed on the targeted devices. "These

Ubuntu Security Notice USN-5979-1

Ubuntu Security Notice 5979-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that a race condition existed in the Xen network backend driver in the Linux kernel when handling dropped packets in certain circumstances. An attacker could use this to cause a denial of service.

Red Hat Security Advisory 2023-1470-01

Red Hat Security Advisory 2023-1470-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a double free vulnerability.

RHSA-2023:1470: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of se...

RHSA-2023:1469: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...

RHSA-2023:1435: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack ove...

Red Hat Security Advisory 2023-1251-01

Red Hat Security Advisory 2023-1251-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-1202-01

Red Hat Security Advisory 2023-1202-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.

RHSA-2023:0856: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in ho...

Ubuntu Security Notice USN-5774-1

Ubuntu Security Notice 5774-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5773-1

Ubuntu Security Notice 5773-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5754-2

Ubuntu Security Notice 5754-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.

CVE-2022-41802: en/security-disclosure/2022/2022-12.md · OpenHarmony/security - Gitee.com

Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.

Ubuntu Security Notice USN-5758-1

Ubuntu Security Notice 5758-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the video4linux driver for Empia based TV cards in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5757-2

Ubuntu Security Notice 5757-2 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the video4linux driver for Empia based TV cards in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5755-1

Ubuntu Security Notice 5755-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

CVE-2022-3564

A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.