Headline
RHSA-2023:1559: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
- CVE-2023-0266: A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue.
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
- ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- iavf: Fix updating statistics (BZ#2142509)
- RHEL8.4: Backport the new cgroup slab memory controller in v.5.9 (BZ#2164636)
- Windows Server 2019 guest randomly pauses with “KVM: entry failed, hardware error 0x80000021” (BZ#2166371)
- RHEL8.3: Backport upstream locking changes up to v5.6 (BZ#2170061)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux Server - TUS 8.2 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
Fixes
- BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
- BZ - 2163379 - CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
Red Hat Enterprise Linux Server - AUS 8.2
SRPM
kernel-4.18.0-193.105.1.el8_2.src.rpm
SHA-256: 26d88d139fd4bb3f99c70b1b5faf9156a385e24521eb7d9141151babb9a8be99
x86_64
bpftool-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 94a6d90be4b80e8c400c5bb1aea8b78c340e8428db852b57ae7cba628681ee22
bpftool-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: d8a95002eab8115f2f5b3dceea6fa9994bd2b7544335004da27b3821bd291fca
kernel-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 0824b404f9ca94f48b1ada15ccb2eed81321a4da7ef883536da815c1fb8a4df8
kernel-abi-whitelists-4.18.0-193.105.1.el8_2.noarch.rpm
SHA-256: 93b0d4df5474fc1e16d03e0f8a8753e121888649f0b29f86713aed41d2ce31c9
kernel-core-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 0494b0c2156e07d2b46248804fcb8c7e7a08b019f5a35fea00f8d3718e63c654
kernel-cross-headers-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: a911ffdb4cd65c146a81ec1e6997ec9ce654787ae10721733dc66d2b8b1efeff
kernel-debug-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: fa8c2dc08efe39efd96a6c6faf4b4612559b28c8d3bb83815d75f874f0ba182f
kernel-debug-core-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 98bb278e9cb758e284ce917196cadbcc58fa758f74edc9e0547842aa7f2020e1
kernel-debug-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: f0c8104ff6c8dc82792c2600947d31df8039b5cdc091a8a2e00067d610275842
kernel-debug-devel-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: d0a4b80ff1312183e1f22c1b20d2d5bf2f57f548d5b39e308e7578009d0acf5a
kernel-debug-modules-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 055d0deec07dee5feeb83aebeec87fedbfb0d6548a3ef461929ca8bf13834aa0
kernel-debug-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 5cbcadc47366e81f9ef1da643bd62d9774ad0b892c0044e18f692d0bba593453
kernel-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 92d1decc3c616b098f1bcb1dd56f74faf0f490226a9b52d61e3e7dcd494daea9
kernel-debuginfo-common-x86_64-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 7da99b1868694cba5efa3fc041a8aee53bd511a187ba0553a32db038fe432a28
kernel-devel-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 14f1e1c7e3cfa5c6f15cb4d43b7ca32927109c49f395cbab109e61ec0c67ba44
kernel-doc-4.18.0-193.105.1.el8_2.noarch.rpm
SHA-256: 99d40551a4b4da72eb909c8cd6f078dbce63a27b079926ef9e106c509f48e386
kernel-headers-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 6ca23ba72a5895e0349bd454fbc4fe6e4c6bebb1dd8de0cb5a1f4b43e4730caf
kernel-modules-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 03543ef9c63a9db829dfa775c7edb06eb94afb23c30713e6201e778a0007efd0
kernel-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 4ce991104734a3b564c9dcca9f5d9e9b4f0ffca0e4873683a1ebad8c4dd83e8d
kernel-tools-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 9a19d9e49368e63fc684d21782cbd2d4797d5090bac5828875cb45f8281fd18b
kernel-tools-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 3a25d7f5e28e30bb8b712b965d71facc53b2f13d4284380c9bdec70601bdbfdd
kernel-tools-libs-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: c534134f253f3fc26dd6976ffd06514210277eb667dfb7cd79cdd2adbe3f4482
perf-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: b0a3d107b3627df7f525d485c8739152839b448b04a260613a41c3f521f6a1ba
perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 8253684f159e7876ace5548d46f22f68b8928e044646d1f302b336f39eaa1552
python3-perf-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: fe23c8d5c1fadd7cadc8fa1c0d193395d2de7302fd116cc5a7b725ea83eb7e7e
python3-perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 3e57e3813208cbfe40a4ed3e9fae6b98f45abdd13c615a32fb5137b2cc17e6be
Red Hat Enterprise Linux Server - TUS 8.2
SRPM
kernel-4.18.0-193.105.1.el8_2.src.rpm
SHA-256: 26d88d139fd4bb3f99c70b1b5faf9156a385e24521eb7d9141151babb9a8be99
x86_64
bpftool-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 94a6d90be4b80e8c400c5bb1aea8b78c340e8428db852b57ae7cba628681ee22
bpftool-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: d8a95002eab8115f2f5b3dceea6fa9994bd2b7544335004da27b3821bd291fca
kernel-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 0824b404f9ca94f48b1ada15ccb2eed81321a4da7ef883536da815c1fb8a4df8
kernel-abi-whitelists-4.18.0-193.105.1.el8_2.noarch.rpm
SHA-256: 93b0d4df5474fc1e16d03e0f8a8753e121888649f0b29f86713aed41d2ce31c9
kernel-core-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 0494b0c2156e07d2b46248804fcb8c7e7a08b019f5a35fea00f8d3718e63c654
kernel-cross-headers-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: a911ffdb4cd65c146a81ec1e6997ec9ce654787ae10721733dc66d2b8b1efeff
kernel-debug-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: fa8c2dc08efe39efd96a6c6faf4b4612559b28c8d3bb83815d75f874f0ba182f
kernel-debug-core-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 98bb278e9cb758e284ce917196cadbcc58fa758f74edc9e0547842aa7f2020e1
kernel-debug-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: f0c8104ff6c8dc82792c2600947d31df8039b5cdc091a8a2e00067d610275842
kernel-debug-devel-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: d0a4b80ff1312183e1f22c1b20d2d5bf2f57f548d5b39e308e7578009d0acf5a
kernel-debug-modules-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 055d0deec07dee5feeb83aebeec87fedbfb0d6548a3ef461929ca8bf13834aa0
kernel-debug-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 5cbcadc47366e81f9ef1da643bd62d9774ad0b892c0044e18f692d0bba593453
kernel-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 92d1decc3c616b098f1bcb1dd56f74faf0f490226a9b52d61e3e7dcd494daea9
kernel-debuginfo-common-x86_64-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 7da99b1868694cba5efa3fc041a8aee53bd511a187ba0553a32db038fe432a28
kernel-devel-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 14f1e1c7e3cfa5c6f15cb4d43b7ca32927109c49f395cbab109e61ec0c67ba44
kernel-doc-4.18.0-193.105.1.el8_2.noarch.rpm
SHA-256: 99d40551a4b4da72eb909c8cd6f078dbce63a27b079926ef9e106c509f48e386
kernel-headers-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 6ca23ba72a5895e0349bd454fbc4fe6e4c6bebb1dd8de0cb5a1f4b43e4730caf
kernel-modules-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 03543ef9c63a9db829dfa775c7edb06eb94afb23c30713e6201e778a0007efd0
kernel-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 4ce991104734a3b564c9dcca9f5d9e9b4f0ffca0e4873683a1ebad8c4dd83e8d
kernel-tools-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 9a19d9e49368e63fc684d21782cbd2d4797d5090bac5828875cb45f8281fd18b
kernel-tools-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 3a25d7f5e28e30bb8b712b965d71facc53b2f13d4284380c9bdec70601bdbfdd
kernel-tools-libs-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: c534134f253f3fc26dd6976ffd06514210277eb667dfb7cd79cdd2adbe3f4482
perf-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: b0a3d107b3627df7f525d485c8739152839b448b04a260613a41c3f521f6a1ba
perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 8253684f159e7876ace5548d46f22f68b8928e044646d1f302b336f39eaa1552
python3-perf-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: fe23c8d5c1fadd7cadc8fa1c0d193395d2de7302fd116cc5a7b725ea83eb7e7e
python3-perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 3e57e3813208cbfe40a4ed3e9fae6b98f45abdd13c615a32fb5137b2cc17e6be
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2
SRPM
kernel-4.18.0-193.105.1.el8_2.src.rpm
SHA-256: 26d88d139fd4bb3f99c70b1b5faf9156a385e24521eb7d9141151babb9a8be99
ppc64le
bpftool-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 40a6988d775a30923513a0e03303aa2bfcd7aaad4c71757a97048b5f4b6687a2
bpftool-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 0852089427af36d67efb4bf55d2cb6bc9bc971dfd4da72a3a8c5e3c32107124a
kernel-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 900bc52997aad1fff08be96dbaf58bc66d1669c3ff75c6a0f6a1faec0106346b
kernel-abi-whitelists-4.18.0-193.105.1.el8_2.noarch.rpm
SHA-256: 93b0d4df5474fc1e16d03e0f8a8753e121888649f0b29f86713aed41d2ce31c9
kernel-core-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 227a180102752498ecfbccfc8e54a8283146bded9de6ebe1c7e08b3a04d9fe96
kernel-cross-headers-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: ab3353a71727ea7618497182e3948fb2be10c5f2f55716fe9a3e4cd1a2351c42
kernel-debug-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: c4c37f2851f434dd703d4def043c3804427a36bc1d9eeb67daf914fce9afd031
kernel-debug-core-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: ebc844956017d8e67abfc9ddbbf9ebe263ae15cb7388353da4301fa444ece01a
kernel-debug-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 9d7896535827708523b73f4d6f3d5c88e8dd72ccad39982b4b0cfb7eaab90876
kernel-debug-devel-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 44a1a246601119d745f3f09156148aea4fe3cefdb26a0e4612f1da6a6dd6f0c9
kernel-debug-modules-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 6298f4f655bf5fcab08548d4c2708d4541a09af34369a38fac90d47298925f7a
kernel-debug-modules-extra-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 88b76c9e4e1a5d984aaf4c2d209625c20994e0eb4fa8f35d7d9f0a5be28edb83
kernel-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 8ce8a87bf7e5d1b97adcd779f5564892d7405bac3f50de40da031a372a0a04da
kernel-debuginfo-common-ppc64le-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: f5b0c0d3c59c01f0950d3958b2d6af6edc39f42ca002ced3d07e43fe47618734
kernel-devel-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: b5684a0ccd50fbf4e36040417223e8e89b00553ad0b9d17e45f6d0b11a567d29
kernel-doc-4.18.0-193.105.1.el8_2.noarch.rpm
SHA-256: 99d40551a4b4da72eb909c8cd6f078dbce63a27b079926ef9e106c509f48e386
kernel-headers-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: b5855625850b2e55db967855588a29f7a66212d91fb19d632a39eac52cc12d6a
kernel-modules-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 5850827a95639785a3b1195e8e6067be781e56a4c2e3454525c1fe8700edbac3
kernel-modules-extra-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 5ce3cb5be1ec402aaa0688a694ccc0eafe96c8e3dac36b889c79b3b8d427f65f
kernel-tools-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 6d4b454004aff5743635691a5fc7a549f013d6e2d61c7c1ee334ba6b8ebcc1e8
kernel-tools-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: a31b504dfd07f315e2b1e3fc4490c04b9efa8a59d19b84b8df510c1e26c30900
kernel-tools-libs-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 29db104e93e8387d39faf3e74142876175e80a5d070d9cddb320452999ba7c20
perf-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: a5da9b0fe74fa2259c7a77c068085c6ff0cb59d736edb7a508d160e5ab3585b7
perf-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 26a24cde82fcc988198911974870f23e9c9d8b26fa8ce4493f4c067e4f7d1f01
python3-perf-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 965f4c02b6fc71bcafdda7fa39c56001ff0bae5c1edcf2a3a580ad7d35363cea
python3-perf-debuginfo-4.18.0-193.105.1.el8_2.ppc64le.rpm
SHA-256: 71a4c6f77d4bc1723a66ca2bf752b1adca045c75882a07caebb87822f335069b
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2
SRPM
kernel-4.18.0-193.105.1.el8_2.src.rpm
SHA-256: 26d88d139fd4bb3f99c70b1b5faf9156a385e24521eb7d9141151babb9a8be99
x86_64
bpftool-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 94a6d90be4b80e8c400c5bb1aea8b78c340e8428db852b57ae7cba628681ee22
bpftool-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: d8a95002eab8115f2f5b3dceea6fa9994bd2b7544335004da27b3821bd291fca
kernel-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 0824b404f9ca94f48b1ada15ccb2eed81321a4da7ef883536da815c1fb8a4df8
kernel-abi-whitelists-4.18.0-193.105.1.el8_2.noarch.rpm
SHA-256: 93b0d4df5474fc1e16d03e0f8a8753e121888649f0b29f86713aed41d2ce31c9
kernel-core-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 0494b0c2156e07d2b46248804fcb8c7e7a08b019f5a35fea00f8d3718e63c654
kernel-cross-headers-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: a911ffdb4cd65c146a81ec1e6997ec9ce654787ae10721733dc66d2b8b1efeff
kernel-debug-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: fa8c2dc08efe39efd96a6c6faf4b4612559b28c8d3bb83815d75f874f0ba182f
kernel-debug-core-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 98bb278e9cb758e284ce917196cadbcc58fa758f74edc9e0547842aa7f2020e1
kernel-debug-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: f0c8104ff6c8dc82792c2600947d31df8039b5cdc091a8a2e00067d610275842
kernel-debug-devel-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: d0a4b80ff1312183e1f22c1b20d2d5bf2f57f548d5b39e308e7578009d0acf5a
kernel-debug-modules-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 055d0deec07dee5feeb83aebeec87fedbfb0d6548a3ef461929ca8bf13834aa0
kernel-debug-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 5cbcadc47366e81f9ef1da643bd62d9774ad0b892c0044e18f692d0bba593453
kernel-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 92d1decc3c616b098f1bcb1dd56f74faf0f490226a9b52d61e3e7dcd494daea9
kernel-debuginfo-common-x86_64-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 7da99b1868694cba5efa3fc041a8aee53bd511a187ba0553a32db038fe432a28
kernel-devel-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 14f1e1c7e3cfa5c6f15cb4d43b7ca32927109c49f395cbab109e61ec0c67ba44
kernel-doc-4.18.0-193.105.1.el8_2.noarch.rpm
SHA-256: 99d40551a4b4da72eb909c8cd6f078dbce63a27b079926ef9e106c509f48e386
kernel-headers-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 6ca23ba72a5895e0349bd454fbc4fe6e4c6bebb1dd8de0cb5a1f4b43e4730caf
kernel-modules-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 03543ef9c63a9db829dfa775c7edb06eb94afb23c30713e6201e778a0007efd0
kernel-modules-extra-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 4ce991104734a3b564c9dcca9f5d9e9b4f0ffca0e4873683a1ebad8c4dd83e8d
kernel-tools-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 9a19d9e49368e63fc684d21782cbd2d4797d5090bac5828875cb45f8281fd18b
kernel-tools-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 3a25d7f5e28e30bb8b712b965d71facc53b2f13d4284380c9bdec70601bdbfdd
kernel-tools-libs-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: c534134f253f3fc26dd6976ffd06514210277eb667dfb7cd79cdd2adbe3f4482
perf-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: b0a3d107b3627df7f525d485c8739152839b448b04a260613a41c3f521f6a1ba
perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 8253684f159e7876ace5548d46f22f68b8928e044646d1f302b336f39eaa1552
python3-perf-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: fe23c8d5c1fadd7cadc8fa1c0d193395d2de7302fd116cc5a7b725ea83eb7e7e
python3-perf-debuginfo-4.18.0-193.105.1.el8_2.x86_64.rpm
SHA-256: 3e57e3813208cbfe40a4ed3e9fae6b98f45abdd13c615a32fb5137b2cc17e6be
Related news
IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 254138
Red Hat Security Advisory 2023-4150-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-4021-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include double free and use-after-free vulnerabilities.
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or poten...
Plus: Microsoft patches two zero-day flaws, Google’s Android and Chrome get some much-needed updates, and more.
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-1953-01 - Red Hat OpenShift Logging Subsystem 5.6.5 update. Issues addressed include cross site scripting and denial of service vulnerabilities.
Red Hat Security Advisory 2023-1677-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow and integer overflow vulnerabilities.
Ubuntu Security Notice 6009-1 - It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6000-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Red Hat Security Advisory 2023-1659-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-1557-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. In this flaw a normal privileged, local attacker may impact the system due to a locking issue in the compat path, leading to a kernel information leak prob...
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue.
Ubuntu Security Notice 5987-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.
By Habiba Rashid Google's Threat Analysis Group (TAG) labeled the spyware campaign as limited but highly targeted. This is a post from HackRead.com Read the original post: Google reveals spyware attack on Android, iOS, and Chrome
A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to target Android and iOS devices, Google's Threat Analysis Group (TAG) has revealed. The two distinct campaigns were both limited and highly targeted, taking advantage of the patch gap between the release of a fix and when it was actually deployed on the targeted devices. "These
Ubuntu Security Notice 5979-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that a race condition existed in the Xen network backend driver in the Linux kernel when handling dropped packets in certain circumstances. An attacker could use this to cause a denial of service.
Red Hat Security Advisory 2023-1470-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a double free vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of se...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack ove...
Red Hat Security Advisory 2023-1251-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1202-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in ho...
Ubuntu Security Notice 5774-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5773-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5754-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
Ubuntu Security Notice 5758-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the video4linux driver for Empia based TV cards in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5757-2 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the video4linux driver for Empia based TV cards in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5755-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.