Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:3461: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-42896: A use-after-free flaw was found in the Linux kernel’s implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via Bluetooth if within proximity of the victim.
Red Hat Security Data
#vulnerability#linux#red_hat#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Ethernet Port Configuration Tool (EPCT) not supported with in-tree ice driver (BZ#2176867)
  • Proactively Backport MM fixes for el8.5 - 2nd round (BZ#2188306)
  • kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188626)
  • Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189598)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2147364 - CVE-2022-42896 kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

kernel-4.18.0-305.91.1.el8_4.src.rpm

SHA-256: b00b6b4254ed3cd0adcc31c88c1d34e1e8e408c346754f0a7c69425cefa2846f

x86_64

bpftool-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 08022db4f81cd1c07d6fb08fe394197d9c3396f7a1b5d27256f3974000464412

bpftool-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 14f53cfa05943fbf5fa14f8c9947be761e4709a1c31522a2478bacacafaecf59

kernel-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: ebb6eaafea6fd7c79a1904e9e0b4c1ef65989299f5d4fc65234449d23042c188

kernel-abi-stablelists-4.18.0-305.91.1.el8_4.noarch.rpm

SHA-256: eb928b96aa02e5a96ad1ed841f59c7fc16877cd62f08a37f88a2697c634be055

kernel-core-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 8793b7215148d02e532ab473aa66338b27623df9ba1feee2477aacbb0e01322c

kernel-cross-headers-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: eb946749b7d14034368ef5828b10086c5bb279634306381403fa9b17b4ddf7bd

kernel-debug-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 276041441d458af27c5fe1a59a9423a3dc5ab6642dace2bb7ab08907470c9dfe

kernel-debug-core-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 1b35c2790247cd68a57b7dc3a9b938d967ebc5159418550a5c74e85026cfc727

kernel-debug-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 98d91d4caa835c4a6c508347a6dfbd554ed853d5ea2bf2fe1a0f7e6c9543386d

kernel-debug-devel-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 26fa49a4014d298c657e6634ed9d55ed9d633c6c039b5605cebb5534a4f33755

kernel-debug-modules-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 32973a75705d8b759e4ec5410933a45b1f8b753ab1906a036124abc58aff7224

kernel-debug-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: b5c9c7ba94764d47b84315adce6bebbec93e8aa15d7748c655d0b7c4bcb5db3f

kernel-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: f962a51453d884e1380b9408640b8dc2c20bdffab32a5eccd49079d866d21705

kernel-debuginfo-common-x86_64-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: ee0be413c7ed1499c52135c7494001d201cdade4ea1a3f2b2478430a88ebf869

kernel-devel-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 95cc8fcb4cf04eeae9a07f951a9394748cdc53f5e134dcc6c553058887067330

kernel-doc-4.18.0-305.91.1.el8_4.noarch.rpm

SHA-256: fa16fb6ea448918d11a2e63bbdf8f3d7d23825691d90cb84eda8b09854686ff8

kernel-headers-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: f42530109637f1386c4ad5274d611ef3003d0d0526771bceb70193edfe25995e

kernel-modules-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: eee1bbdc8dca0a85ee3ae827b51a01211c1b08d7111f58a0204fd3fd402251bd

kernel-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: a87159228b0258ae3f08a3af1c2571fa9273aed9bbde51f35f43d9b04f39aa60

kernel-tools-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 8a09e88e97b8dccd62b3c8fa22071bb6c83d9891a719363b395cb76fd338cd07

kernel-tools-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: dfe891bc9cd7ddb3f0946b3de750b56ec90fb52e05e04ab444ec7d11cf8ac463

kernel-tools-libs-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: ce9b95f6e781b1292b7b22335ffc74d28da5eca11e628671be2b57a2c91725d9

perf-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: c405fa2bbf455d0b78bb8f9939dcafce293e8e6bec3fcd4c67d3f76e9726ed4a

perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 881799dc4cc9592b585b6f135454ed9ea60d15f8db445417cb4d7ac3bfd2caa8

python3-perf-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 08cba33a3da2afdea3a9dff0667d707c27a9954f0bba28724ea8520bc0757cf0

python3-perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: de6a847e2fd56972b8501ac8edf619b45e765af1c0981deef7d179e23122d4c4

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

kernel-4.18.0-305.91.1.el8_4.src.rpm

SHA-256: b00b6b4254ed3cd0adcc31c88c1d34e1e8e408c346754f0a7c69425cefa2846f

x86_64

bpftool-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 08022db4f81cd1c07d6fb08fe394197d9c3396f7a1b5d27256f3974000464412

bpftool-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 14f53cfa05943fbf5fa14f8c9947be761e4709a1c31522a2478bacacafaecf59

kernel-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: ebb6eaafea6fd7c79a1904e9e0b4c1ef65989299f5d4fc65234449d23042c188

kernel-abi-stablelists-4.18.0-305.91.1.el8_4.noarch.rpm

SHA-256: eb928b96aa02e5a96ad1ed841f59c7fc16877cd62f08a37f88a2697c634be055

kernel-core-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 8793b7215148d02e532ab473aa66338b27623df9ba1feee2477aacbb0e01322c

kernel-cross-headers-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: eb946749b7d14034368ef5828b10086c5bb279634306381403fa9b17b4ddf7bd

kernel-debug-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 276041441d458af27c5fe1a59a9423a3dc5ab6642dace2bb7ab08907470c9dfe

kernel-debug-core-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 1b35c2790247cd68a57b7dc3a9b938d967ebc5159418550a5c74e85026cfc727

kernel-debug-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 98d91d4caa835c4a6c508347a6dfbd554ed853d5ea2bf2fe1a0f7e6c9543386d

kernel-debug-devel-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 26fa49a4014d298c657e6634ed9d55ed9d633c6c039b5605cebb5534a4f33755

kernel-debug-modules-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 32973a75705d8b759e4ec5410933a45b1f8b753ab1906a036124abc58aff7224

kernel-debug-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: b5c9c7ba94764d47b84315adce6bebbec93e8aa15d7748c655d0b7c4bcb5db3f

kernel-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: f962a51453d884e1380b9408640b8dc2c20bdffab32a5eccd49079d866d21705

kernel-debuginfo-common-x86_64-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: ee0be413c7ed1499c52135c7494001d201cdade4ea1a3f2b2478430a88ebf869

kernel-devel-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 95cc8fcb4cf04eeae9a07f951a9394748cdc53f5e134dcc6c553058887067330

kernel-doc-4.18.0-305.91.1.el8_4.noarch.rpm

SHA-256: fa16fb6ea448918d11a2e63bbdf8f3d7d23825691d90cb84eda8b09854686ff8

kernel-headers-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: f42530109637f1386c4ad5274d611ef3003d0d0526771bceb70193edfe25995e

kernel-modules-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: eee1bbdc8dca0a85ee3ae827b51a01211c1b08d7111f58a0204fd3fd402251bd

kernel-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: a87159228b0258ae3f08a3af1c2571fa9273aed9bbde51f35f43d9b04f39aa60

kernel-tools-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 8a09e88e97b8dccd62b3c8fa22071bb6c83d9891a719363b395cb76fd338cd07

kernel-tools-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: dfe891bc9cd7ddb3f0946b3de750b56ec90fb52e05e04ab444ec7d11cf8ac463

kernel-tools-libs-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: ce9b95f6e781b1292b7b22335ffc74d28da5eca11e628671be2b57a2c91725d9

perf-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: c405fa2bbf455d0b78bb8f9939dcafce293e8e6bec3fcd4c67d3f76e9726ed4a

perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 881799dc4cc9592b585b6f135454ed9ea60d15f8db445417cb4d7ac3bfd2caa8

python3-perf-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 08cba33a3da2afdea3a9dff0667d707c27a9954f0bba28724ea8520bc0757cf0

python3-perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: de6a847e2fd56972b8501ac8edf619b45e765af1c0981deef7d179e23122d4c4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.91.1.el8_4.src.rpm

SHA-256: b00b6b4254ed3cd0adcc31c88c1d34e1e8e408c346754f0a7c69425cefa2846f

ppc64le

bpftool-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: ae9306c8eabb39e04caceec17de1a455e0329dddf200e7cfa48ea13fb6bd6494

bpftool-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 2d301ab0bf6cde9ff6c3c33f76d5aef33e4432280e0c8dcc363930387fd1a38b

kernel-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 25aebcc823b2450375114395ead4d54aee92a4badf9562416a60fd3f6dd54afd

kernel-abi-stablelists-4.18.0-305.91.1.el8_4.noarch.rpm

SHA-256: eb928b96aa02e5a96ad1ed841f59c7fc16877cd62f08a37f88a2697c634be055

kernel-core-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 6f9329b61879e32001f21fffb3f9e05ee16d15bd9fdbd79860e2227ba8b21dc9

kernel-cross-headers-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 2adbbc2f6c035489a8f80b2778e5bac7888b20a7b940b25b7df4b37b8e10dc8a

kernel-debug-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: f447549e656ad4b7a07cb1f1b78118c3bfab5d6e2708592799e2c9d5f3029ead

kernel-debug-core-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 755063bc323b4b2c55631c0d0cfdce6e91193c682087b7990ff1fe0a555273e4

kernel-debug-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: f8a36eb440ae5092a53bcdf315469901d3214192b1d2dc144255f7eab8281a53

kernel-debug-devel-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 4e0dfbc1a51715a23249a46bb1fa824367a7f5b0be47d23c9ffcfaa3b70a47ed

kernel-debug-modules-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 84e31600f268d5193e5c7b1711900f324647dd96c3132e599e21138f2d7b0c88

kernel-debug-modules-extra-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 6cacec8de57324e5c8ddaa0760e3693c2db9160af449ce8522142ba873461ed6

kernel-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 7e8f16cf2de22a6a97daf7928e7c0c1cb10f5935fee0aedba1d2c6653ea694d3

kernel-debuginfo-common-ppc64le-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 3cf08747ac2ddb58e3a520367bc898a5c00d04711b039270315a630e9715ef22

kernel-devel-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 1e4a97da036ab72ff90053dd8c6dfa14564caf0401edaf45631d3b2a97008236

kernel-doc-4.18.0-305.91.1.el8_4.noarch.rpm

SHA-256: fa16fb6ea448918d11a2e63bbdf8f3d7d23825691d90cb84eda8b09854686ff8

kernel-headers-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: e2350f877281de323181b2d840f1066bbe08a2e57759c8bd259589a7aea503a7

kernel-modules-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: d188882cdfeb3bdd1be18bc62ed52c199774fcd54d15cbb8b91e9894c138d3f3

kernel-modules-extra-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 954928f0928c81d6a281d5ff9b68d5db020d7dabe4ed8bc98351bffc481c78d4

kernel-tools-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 2946d32e73683d2f7e4901d0997f9889d86689122ac8cd182c115937e1a0fb52

kernel-tools-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 3dbde15efa28d3d3496aad4a95171780bc3db58edbb98b1df81d0862e25a9a3a

kernel-tools-libs-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 5b439cc4b954a6207cc6e8b6d15bd376367240b765690ae44b9e2cdac9644bc4

perf-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 9ce77954d949a95996f652864deceb65b6b7d37e5317bf4c6d9cc2c0da0d9cb4

perf-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 9b0a5ccf826172435e42e75b7a48706039e43b8a9c26c2ba06e06d1b7065c055

python3-perf-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 2d2c30b28a4f4b92f2c039a6e6889fa432fb06620a4d46858466585ab1ac1b36

python3-perf-debuginfo-4.18.0-305.91.1.el8_4.ppc64le.rpm

SHA-256: 5e7f83ab43f738116758fb7948c5e6f431d1176a0bab06719f510162a3662987

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.91.1.el8_4.src.rpm

SHA-256: b00b6b4254ed3cd0adcc31c88c1d34e1e8e408c346754f0a7c69425cefa2846f

x86_64

bpftool-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 08022db4f81cd1c07d6fb08fe394197d9c3396f7a1b5d27256f3974000464412

bpftool-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 14f53cfa05943fbf5fa14f8c9947be761e4709a1c31522a2478bacacafaecf59

kernel-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: ebb6eaafea6fd7c79a1904e9e0b4c1ef65989299f5d4fc65234449d23042c188

kernel-abi-stablelists-4.18.0-305.91.1.el8_4.noarch.rpm

SHA-256: eb928b96aa02e5a96ad1ed841f59c7fc16877cd62f08a37f88a2697c634be055

kernel-core-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 8793b7215148d02e532ab473aa66338b27623df9ba1feee2477aacbb0e01322c

kernel-cross-headers-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: eb946749b7d14034368ef5828b10086c5bb279634306381403fa9b17b4ddf7bd

kernel-debug-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 276041441d458af27c5fe1a59a9423a3dc5ab6642dace2bb7ab08907470c9dfe

kernel-debug-core-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 1b35c2790247cd68a57b7dc3a9b938d967ebc5159418550a5c74e85026cfc727

kernel-debug-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 98d91d4caa835c4a6c508347a6dfbd554ed853d5ea2bf2fe1a0f7e6c9543386d

kernel-debug-devel-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 26fa49a4014d298c657e6634ed9d55ed9d633c6c039b5605cebb5534a4f33755

kernel-debug-modules-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 32973a75705d8b759e4ec5410933a45b1f8b753ab1906a036124abc58aff7224

kernel-debug-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: b5c9c7ba94764d47b84315adce6bebbec93e8aa15d7748c655d0b7c4bcb5db3f

kernel-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: f962a51453d884e1380b9408640b8dc2c20bdffab32a5eccd49079d866d21705

kernel-debuginfo-common-x86_64-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: ee0be413c7ed1499c52135c7494001d201cdade4ea1a3f2b2478430a88ebf869

kernel-devel-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 95cc8fcb4cf04eeae9a07f951a9394748cdc53f5e134dcc6c553058887067330

kernel-doc-4.18.0-305.91.1.el8_4.noarch.rpm

SHA-256: fa16fb6ea448918d11a2e63bbdf8f3d7d23825691d90cb84eda8b09854686ff8

kernel-headers-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: f42530109637f1386c4ad5274d611ef3003d0d0526771bceb70193edfe25995e

kernel-modules-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: eee1bbdc8dca0a85ee3ae827b51a01211c1b08d7111f58a0204fd3fd402251bd

kernel-modules-extra-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: a87159228b0258ae3f08a3af1c2571fa9273aed9bbde51f35f43d9b04f39aa60

kernel-tools-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 8a09e88e97b8dccd62b3c8fa22071bb6c83d9891a719363b395cb76fd338cd07

kernel-tools-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: dfe891bc9cd7ddb3f0946b3de750b56ec90fb52e05e04ab444ec7d11cf8ac463

kernel-tools-libs-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: ce9b95f6e781b1292b7b22335ffc74d28da5eca11e628671be2b57a2c91725d9

perf-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: c405fa2bbf455d0b78bb8f9939dcafce293e8e6bec3fcd4c67d3f76e9726ed4a

perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 881799dc4cc9592b585b6f135454ed9ea60d15f8db445417cb4d7ac3bfd2caa8

python3-perf-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: 08cba33a3da2afdea3a9dff0667d707c27a9954f0bba28724ea8520bc0757cf0

python3-perf-debuginfo-4.18.0-305.91.1.el8_4.x86_64.rpm

SHA-256: de6a847e2fd56972b8501ac8edf619b45e765af1c0981deef7d179e23122d4c4

Related news

Red Hat Security Advisory 2024-1323-03

Red Hat Security Advisory 2024-1323-03 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Issues addressed include out of bounds write and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5580-01

Red Hat Security Advisory 2023-5580-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

RHSA-2023:5589: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_co...

Red Hat Security Advisory 2023-4517-01

Red Hat Security Advisory 2023-4517-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.

RHSA-2023:4531: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via B...

RHSA-2023:4230: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code l...

Red Hat Security Advisory 2023-4138-01

Red Hat Security Advisory 2023-4138-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-4137-01

Red Hat Security Advisory 2023-4137-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-3517-01

Red Hat Security Advisory 2023-3517-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Ubuntu Security Notice USN-5914-1

Ubuntu Security Notice 5914-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5863-1

Ubuntu Security Notice 5863-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5832-1

Ubuntu Security Notice 5832-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5831-1

Ubuntu Security Notice 5831-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5829-1

Ubuntu Security Notice 5829-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5814-1

Ubuntu Security Notice 5814-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5813-1

Ubuntu Security Notice 5813-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5803-1

Ubuntu Security Notice 5803-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamas Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5802-1

Ubuntu Security Notice 5802-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5794-1

Ubuntu Security Notice 5794-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.