Headline
RHSA-2023:3461: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-42896: A use-after-free flaw was found in the Linux kernel’s implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via Bluetooth if within proximity of the victim.
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Ethernet Port Configuration Tool (EPCT) not supported with in-tree ice driver (BZ#2176867)
- Proactively Backport MM fixes for el8.5 - 2nd round (BZ#2188306)
- kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188626)
- Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189598)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
Fixes
- BZ - 2147364 - CVE-2022-42896 kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
kernel-4.18.0-305.91.1.el8_4.src.rpm
SHA-256: b00b6b4254ed3cd0adcc31c88c1d34e1e8e408c346754f0a7c69425cefa2846f
x86_64
bpftool-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 08022db4f81cd1c07d6fb08fe394197d9c3396f7a1b5d27256f3974000464412
bpftool-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 14f53cfa05943fbf5fa14f8c9947be761e4709a1c31522a2478bacacafaecf59
kernel-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: ebb6eaafea6fd7c79a1904e9e0b4c1ef65989299f5d4fc65234449d23042c188
kernel-abi-stablelists-4.18.0-305.91.1.el8_4.noarch.rpm
SHA-256: eb928b96aa02e5a96ad1ed841f59c7fc16877cd62f08a37f88a2697c634be055
kernel-core-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 8793b7215148d02e532ab473aa66338b27623df9ba1feee2477aacbb0e01322c
kernel-cross-headers-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: eb946749b7d14034368ef5828b10086c5bb279634306381403fa9b17b4ddf7bd
kernel-debug-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 276041441d458af27c5fe1a59a9423a3dc5ab6642dace2bb7ab08907470c9dfe
kernel-debug-core-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 1b35c2790247cd68a57b7dc3a9b938d967ebc5159418550a5c74e85026cfc727
kernel-debug-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 98d91d4caa835c4a6c508347a6dfbd554ed853d5ea2bf2fe1a0f7e6c9543386d
kernel-debug-devel-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 26fa49a4014d298c657e6634ed9d55ed9d633c6c039b5605cebb5534a4f33755
kernel-debug-modules-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 32973a75705d8b759e4ec5410933a45b1f8b753ab1906a036124abc58aff7224
kernel-debug-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: b5c9c7ba94764d47b84315adce6bebbec93e8aa15d7748c655d0b7c4bcb5db3f
kernel-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: f962a51453d884e1380b9408640b8dc2c20bdffab32a5eccd49079d866d21705
kernel-debuginfo-common-x86_64-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: ee0be413c7ed1499c52135c7494001d201cdade4ea1a3f2b2478430a88ebf869
kernel-devel-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 95cc8fcb4cf04eeae9a07f951a9394748cdc53f5e134dcc6c553058887067330
kernel-doc-4.18.0-305.91.1.el8_4.noarch.rpm
SHA-256: fa16fb6ea448918d11a2e63bbdf8f3d7d23825691d90cb84eda8b09854686ff8
kernel-headers-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: f42530109637f1386c4ad5274d611ef3003d0d0526771bceb70193edfe25995e
kernel-modules-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: eee1bbdc8dca0a85ee3ae827b51a01211c1b08d7111f58a0204fd3fd402251bd
kernel-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: a87159228b0258ae3f08a3af1c2571fa9273aed9bbde51f35f43d9b04f39aa60
kernel-tools-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 8a09e88e97b8dccd62b3c8fa22071bb6c83d9891a719363b395cb76fd338cd07
kernel-tools-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: dfe891bc9cd7ddb3f0946b3de750b56ec90fb52e05e04ab444ec7d11cf8ac463
kernel-tools-libs-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: ce9b95f6e781b1292b7b22335ffc74d28da5eca11e628671be2b57a2c91725d9
perf-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: c405fa2bbf455d0b78bb8f9939dcafce293e8e6bec3fcd4c67d3f76e9726ed4a
perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 881799dc4cc9592b585b6f135454ed9ea60d15f8db445417cb4d7ac3bfd2caa8
python3-perf-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 08cba33a3da2afdea3a9dff0667d707c27a9954f0bba28724ea8520bc0757cf0
python3-perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: de6a847e2fd56972b8501ac8edf619b45e765af1c0981deef7d179e23122d4c4
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
kernel-4.18.0-305.91.1.el8_4.src.rpm
SHA-256: b00b6b4254ed3cd0adcc31c88c1d34e1e8e408c346754f0a7c69425cefa2846f
x86_64
bpftool-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 08022db4f81cd1c07d6fb08fe394197d9c3396f7a1b5d27256f3974000464412
bpftool-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 14f53cfa05943fbf5fa14f8c9947be761e4709a1c31522a2478bacacafaecf59
kernel-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: ebb6eaafea6fd7c79a1904e9e0b4c1ef65989299f5d4fc65234449d23042c188
kernel-abi-stablelists-4.18.0-305.91.1.el8_4.noarch.rpm
SHA-256: eb928b96aa02e5a96ad1ed841f59c7fc16877cd62f08a37f88a2697c634be055
kernel-core-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 8793b7215148d02e532ab473aa66338b27623df9ba1feee2477aacbb0e01322c
kernel-cross-headers-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: eb946749b7d14034368ef5828b10086c5bb279634306381403fa9b17b4ddf7bd
kernel-debug-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 276041441d458af27c5fe1a59a9423a3dc5ab6642dace2bb7ab08907470c9dfe
kernel-debug-core-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 1b35c2790247cd68a57b7dc3a9b938d967ebc5159418550a5c74e85026cfc727
kernel-debug-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 98d91d4caa835c4a6c508347a6dfbd554ed853d5ea2bf2fe1a0f7e6c9543386d
kernel-debug-devel-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 26fa49a4014d298c657e6634ed9d55ed9d633c6c039b5605cebb5534a4f33755
kernel-debug-modules-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 32973a75705d8b759e4ec5410933a45b1f8b753ab1906a036124abc58aff7224
kernel-debug-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: b5c9c7ba94764d47b84315adce6bebbec93e8aa15d7748c655d0b7c4bcb5db3f
kernel-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: f962a51453d884e1380b9408640b8dc2c20bdffab32a5eccd49079d866d21705
kernel-debuginfo-common-x86_64-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: ee0be413c7ed1499c52135c7494001d201cdade4ea1a3f2b2478430a88ebf869
kernel-devel-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 95cc8fcb4cf04eeae9a07f951a9394748cdc53f5e134dcc6c553058887067330
kernel-doc-4.18.0-305.91.1.el8_4.noarch.rpm
SHA-256: fa16fb6ea448918d11a2e63bbdf8f3d7d23825691d90cb84eda8b09854686ff8
kernel-headers-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: f42530109637f1386c4ad5274d611ef3003d0d0526771bceb70193edfe25995e
kernel-modules-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: eee1bbdc8dca0a85ee3ae827b51a01211c1b08d7111f58a0204fd3fd402251bd
kernel-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: a87159228b0258ae3f08a3af1c2571fa9273aed9bbde51f35f43d9b04f39aa60
kernel-tools-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 8a09e88e97b8dccd62b3c8fa22071bb6c83d9891a719363b395cb76fd338cd07
kernel-tools-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: dfe891bc9cd7ddb3f0946b3de750b56ec90fb52e05e04ab444ec7d11cf8ac463
kernel-tools-libs-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: ce9b95f6e781b1292b7b22335ffc74d28da5eca11e628671be2b57a2c91725d9
perf-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: c405fa2bbf455d0b78bb8f9939dcafce293e8e6bec3fcd4c67d3f76e9726ed4a
perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 881799dc4cc9592b585b6f135454ed9ea60d15f8db445417cb4d7ac3bfd2caa8
python3-perf-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 08cba33a3da2afdea3a9dff0667d707c27a9954f0bba28724ea8520bc0757cf0
python3-perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: de6a847e2fd56972b8501ac8edf619b45e765af1c0981deef7d179e23122d4c4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.91.1.el8_4.src.rpm
SHA-256: b00b6b4254ed3cd0adcc31c88c1d34e1e8e408c346754f0a7c69425cefa2846f
ppc64le
bpftool-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: ae9306c8eabb39e04caceec17de1a455e0329dddf200e7cfa48ea13fb6bd6494
bpftool-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 2d301ab0bf6cde9ff6c3c33f76d5aef33e4432280e0c8dcc363930387fd1a38b
kernel-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 25aebcc823b2450375114395ead4d54aee92a4badf9562416a60fd3f6dd54afd
kernel-abi-stablelists-4.18.0-305.91.1.el8_4.noarch.rpm
SHA-256: eb928b96aa02e5a96ad1ed841f59c7fc16877cd62f08a37f88a2697c634be055
kernel-core-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 6f9329b61879e32001f21fffb3f9e05ee16d15bd9fdbd79860e2227ba8b21dc9
kernel-cross-headers-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 2adbbc2f6c035489a8f80b2778e5bac7888b20a7b940b25b7df4b37b8e10dc8a
kernel-debug-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: f447549e656ad4b7a07cb1f1b78118c3bfab5d6e2708592799e2c9d5f3029ead
kernel-debug-core-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 755063bc323b4b2c55631c0d0cfdce6e91193c682087b7990ff1fe0a555273e4
kernel-debug-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: f8a36eb440ae5092a53bcdf315469901d3214192b1d2dc144255f7eab8281a53
kernel-debug-devel-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 4e0dfbc1a51715a23249a46bb1fa824367a7f5b0be47d23c9ffcfaa3b70a47ed
kernel-debug-modules-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 84e31600f268d5193e5c7b1711900f324647dd96c3132e599e21138f2d7b0c88
kernel-debug-modules-extra-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 6cacec8de57324e5c8ddaa0760e3693c2db9160af449ce8522142ba873461ed6
kernel-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 7e8f16cf2de22a6a97daf7928e7c0c1cb10f5935fee0aedba1d2c6653ea694d3
kernel-debuginfo-common-ppc64le-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 3cf08747ac2ddb58e3a520367bc898a5c00d04711b039270315a630e9715ef22
kernel-devel-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 1e4a97da036ab72ff90053dd8c6dfa14564caf0401edaf45631d3b2a97008236
kernel-doc-4.18.0-305.91.1.el8_4.noarch.rpm
SHA-256: fa16fb6ea448918d11a2e63bbdf8f3d7d23825691d90cb84eda8b09854686ff8
kernel-headers-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: e2350f877281de323181b2d840f1066bbe08a2e57759c8bd259589a7aea503a7
kernel-modules-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: d188882cdfeb3bdd1be18bc62ed52c199774fcd54d15cbb8b91e9894c138d3f3
kernel-modules-extra-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 954928f0928c81d6a281d5ff9b68d5db020d7dabe4ed8bc98351bffc481c78d4
kernel-tools-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 2946d32e73683d2f7e4901d0997f9889d86689122ac8cd182c115937e1a0fb52
kernel-tools-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 3dbde15efa28d3d3496aad4a95171780bc3db58edbb98b1df81d0862e25a9a3a
kernel-tools-libs-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 5b439cc4b954a6207cc6e8b6d15bd376367240b765690ae44b9e2cdac9644bc4
perf-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 9ce77954d949a95996f652864deceb65b6b7d37e5317bf4c6d9cc2c0da0d9cb4
perf-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 9b0a5ccf826172435e42e75b7a48706039e43b8a9c26c2ba06e06d1b7065c055
python3-perf-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 2d2c30b28a4f4b92f2c039a6e6889fa432fb06620a4d46858466585ab1ac1b36
python3-perf-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm
SHA-256: 5e7f83ab43f738116758fb7948c5e6f431d1176a0bab06719f510162a3662987
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.91.1.el8_4.src.rpm
SHA-256: b00b6b4254ed3cd0adcc31c88c1d34e1e8e408c346754f0a7c69425cefa2846f
x86_64
bpftool-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 08022db4f81cd1c07d6fb08fe394197d9c3396f7a1b5d27256f3974000464412
bpftool-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 14f53cfa05943fbf5fa14f8c9947be761e4709a1c31522a2478bacacafaecf59
kernel-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: ebb6eaafea6fd7c79a1904e9e0b4c1ef65989299f5d4fc65234449d23042c188
kernel-abi-stablelists-4.18.0-305.91.1.el8_4.noarch.rpm
SHA-256: eb928b96aa02e5a96ad1ed841f59c7fc16877cd62f08a37f88a2697c634be055
kernel-core-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 8793b7215148d02e532ab473aa66338b27623df9ba1feee2477aacbb0e01322c
kernel-cross-headers-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: eb946749b7d14034368ef5828b10086c5bb279634306381403fa9b17b4ddf7bd
kernel-debug-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 276041441d458af27c5fe1a59a9423a3dc5ab6642dace2bb7ab08907470c9dfe
kernel-debug-core-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 1b35c2790247cd68a57b7dc3a9b938d967ebc5159418550a5c74e85026cfc727
kernel-debug-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 98d91d4caa835c4a6c508347a6dfbd554ed853d5ea2bf2fe1a0f7e6c9543386d
kernel-debug-devel-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 26fa49a4014d298c657e6634ed9d55ed9d633c6c039b5605cebb5534a4f33755
kernel-debug-modules-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 32973a75705d8b759e4ec5410933a45b1f8b753ab1906a036124abc58aff7224
kernel-debug-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: b5c9c7ba94764d47b84315adce6bebbec93e8aa15d7748c655d0b7c4bcb5db3f
kernel-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: f962a51453d884e1380b9408640b8dc2c20bdffab32a5eccd49079d866d21705
kernel-debuginfo-common-x86_64-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: ee0be413c7ed1499c52135c7494001d201cdade4ea1a3f2b2478430a88ebf869
kernel-devel-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 95cc8fcb4cf04eeae9a07f951a9394748cdc53f5e134dcc6c553058887067330
kernel-doc-4.18.0-305.91.1.el8_4.noarch.rpm
SHA-256: fa16fb6ea448918d11a2e63bbdf8f3d7d23825691d90cb84eda8b09854686ff8
kernel-headers-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: f42530109637f1386c4ad5274d611ef3003d0d0526771bceb70193edfe25995e
kernel-modules-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: eee1bbdc8dca0a85ee3ae827b51a01211c1b08d7111f58a0204fd3fd402251bd
kernel-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: a87159228b0258ae3f08a3af1c2571fa9273aed9bbde51f35f43d9b04f39aa60
kernel-tools-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 8a09e88e97b8dccd62b3c8fa22071bb6c83d9891a719363b395cb76fd338cd07
kernel-tools-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: dfe891bc9cd7ddb3f0946b3de750b56ec90fb52e05e04ab444ec7d11cf8ac463
kernel-tools-libs-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: ce9b95f6e781b1292b7b22335ffc74d28da5eca11e628671be2b57a2c91725d9
perf-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: c405fa2bbf455d0b78bb8f9939dcafce293e8e6bec3fcd4c67d3f76e9726ed4a
perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 881799dc4cc9592b585b6f135454ed9ea60d15f8db445417cb4d7ac3bfd2caa8
python3-perf-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: 08cba33a3da2afdea3a9dff0667d707c27a9954f0bba28724ea8520bc0757cf0
python3-perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm
SHA-256: de6a847e2fd56972b8501ac8edf619b45e765af1c0981deef7d179e23122d4c4
Related news
Red Hat Security Advisory 2024-1323-03 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Issues addressed include out of bounds write and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5580-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_co...
Red Hat Security Advisory 2023-4517-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via B...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code l...
Red Hat Security Advisory 2023-4138-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-4137-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-3517-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Ubuntu Security Notice 5914-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5863-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5832-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5831-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5829-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5814-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5813-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5803-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamas Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5802-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5794-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.