Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:0334: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation
  • CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device.
  • CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access()
  • CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
  • CVE-2022-30594: kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option
  • CVE-2022-43945: kernel: nfsd buffer overflow by RPC message over TCP with garbage data
Red Hat Security Data
#vulnerability#ios#linux#red_hat#intel#perl#amd#bios#buffer_overflow#ibm#dell

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)
  • kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
  • kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
  • kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
  • kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)
  • kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Intel 9.2: Important iavf bug fixes (BZ#2127884)
  • vfio zero page mappings fail after 2M instances (BZ#2128514)
  • nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359)
  • ice: Driver Update to 5.19 (BZ#2132070)
  • WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588)
  • drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619)
  • updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914)
  • DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213)
  • No signal showed in the VGA monitor when installing RHEL9 in the legacy bios mode (BZ#2140153)
  • Practically limit “Dummy wait” workaround to old Intel systems (BZ#2142168)
  • ppc64le: unexpected oom panic when there’s enough memory left in zswap test (BZ#2143976)
  • fatal error: error in backend: Branch target out of insn range (BZ#2144902)
  • AMdCLIENT: The kernel command line parameter “nomodeset” not working properly (BZ#2145217)
  • Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910)
  • Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605)
  • DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat CodeReady Linux Builder for x86_64 9 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x

Fixes

  • BZ - 2067482 - CVE-2022-2964 kernel: memory corruption in AX88179_178A based USB ethernet device.
  • BZ - 2085300 - CVE-2022-30594 kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option
  • BZ - 2103681 - CVE-2022-2959 kernel: watch queue race condition can lead to privilege escalation
  • BZ - 2123309 - CVE-2022-3077 kernel: i2c: unbounded length leads to buffer overflow in ismt_access()
  • BZ - 2141752 - CVE-2022-43945 kernel: nfsd buffer overflow by RPC message over TCP with garbage data
  • BZ - 2147572 - CVE-2022-4139 kernel: i915: Incorrect GPU TLB flush can lead to random memory access

CVEs

  • CVE-2022-2959
  • CVE-2022-2964
  • CVE-2022-3077
  • CVE-2022-4139
  • CVE-2022-30594
  • CVE-2022-43945

Red Hat Enterprise Linux for x86_64 9

SRPM

kernel-5.14.0-162.12.1.el9_1.src.rpm

SHA-256: 9d5093c326a9c784afeb3f4562d7771aae4d3a8ef0a13514bb3ad7ffcdc010b3

x86_64

bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 6db90bbaf50d7e5744241688fe31f2e88b271590cf5024ab289b5eb8ac105c8e

bpftool-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 0b1acb40c32598324a0c4206919e6c87e47d91fd3f04b97d3de4f1c8714c1556

bpftool-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 0b1acb40c32598324a0c4206919e6c87e47d91fd3f04b97d3de4f1c8714c1556

kernel-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: a12271ef390701cf897b7530363f9ea2916ce29a381817969413e7507b28a7f6

kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm

SHA-256: 52b433430ee2a7797a4d61eb0cb3a209e03784151c0d948475068cbcf008e88f

kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 39b0d4931f341abb9d69ae64f15a94197014789a3b9e677ed16273668ea40bc9

kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: f47c6c5940a05fa7fa643e2eca227c48550038c72a9e3f9c3fbe3de1b43cfe25

kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 452da4873b280617ae3a99b8b5075897ffe4c6384fb4a19cb8fd664ea27cf2bf

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: f6114d9d245c1d062987bca8c8afcd22da4eb1e1cb68530c2cdffc63845b5a6f

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: f6114d9d245c1d062987bca8c8afcd22da4eb1e1cb68530c2cdffc63845b5a6f

kernel-debug-devel-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 1fc41ca72d301e05c30606936ca2b8f99e115f7cf17be5d10461dc494ea150ff

kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 9216da1d72de20d5660047b44f714c4a35df4d657f8d3f48fd0000b4113ccd5a

kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 098ad3694f660ffd3ee900e101c248b4dc246fa8e5845593cfbb63d8f0c1a70a

kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 73d88672c246552e5035aa7a4242318876c0df64ff2d681683c217d6d3a31fd1

kernel-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 0ac163142857a0c5fc652f07303069f59e80c3dc7e88394a2afc34f081e75c5a

kernel-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 0ac163142857a0c5fc652f07303069f59e80c3dc7e88394a2afc34f081e75c5a

kernel-debuginfo-common-x86_64-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: b6860adcd67fcdcf1309e24d3032ae773de2805f48adcc672d267f54977b961f

kernel-debuginfo-common-x86_64-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: b6860adcd67fcdcf1309e24d3032ae773de2805f48adcc672d267f54977b961f

kernel-devel-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 683e00ce588c8429502e052cd84df740410b1866b8dacd6ea4c17d54f586b6e5

kernel-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 4c282f22cb795f1bef01e0594d13072022ffc8373b38415965243899a9013491

kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm

SHA-256: 8ea7ed45f8127aeb74c5d92bd0b553d0004c5141d770c472884d85addf716f28

kernel-headers-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 909e68f5e8ab201ce73dbfa8148e7d1703fca075b1894f20b3be5d0399719c2e

kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 5fe35b8028ae7694d2b255f294ec01cd9a9bd25b2984016752938e2eed5f9072

kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 5711981e0c06557fb50ea4ae833b36351c64d715af7b2847fba19f78065fdcc9

kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 2d030c59f00d7b37707728c5931d67691a0d6e68e1d915e09e04afa3cfbb1eec

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: ee6096bcdfcef3090290b18d33dfe21edb76e6f1f47eb53dc06ddfcd0d3aca73

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: ee6096bcdfcef3090290b18d33dfe21edb76e6f1f47eb53dc06ddfcd0d3aca73

kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: f3289630b338dcf0cd1a9e4dbd9f53a595f5f2fcc57461a0c5535d8ae490aa2f

perf-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: df3d980774f040b9a2888a0ac1b387d9b280c0527779fd10f28a0075b8fdca1d

perf-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 221038a5442412aa4f3bb4373f70e44f5977eec5addd3a5a75999ab82a00217b

perf-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 221038a5442412aa4f3bb4373f70e44f5977eec5addd3a5a75999ab82a00217b

python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 761986b5cecbf2ec201dc3567e70184c02ac79c972422510be314a1cc78a8105

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 0d804b8ae07b6d74295addcdc272cd4961582097f869493f86cccaba2aba51ea

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 0d804b8ae07b6d74295addcdc272cd4961582097f869493f86cccaba2aba51ea

Red Hat Enterprise Linux for IBM z Systems 9

SRPM

kernel-5.14.0-162.12.1.el9_1.src.rpm

SHA-256: 9d5093c326a9c784afeb3f4562d7771aae4d3a8ef0a13514bb3ad7ffcdc010b3

s390x

bpftool-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 6a1a9c9680d19075ba722e3958cb1bfffb7cf70fae57010f97a570f469e4709d

bpftool-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 55d0dcc48f97cf63c112a4f9ba2058d0e967118d78141669043edf3a4ffe075c

bpftool-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 55d0dcc48f97cf63c112a4f9ba2058d0e967118d78141669043edf3a4ffe075c

kernel-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: dc2029c4fb4631450d5b7daa3e1b37bb946364132d7264bf3a6b060af7b4aea6

kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm

SHA-256: 52b433430ee2a7797a4d61eb0cb3a209e03784151c0d948475068cbcf008e88f

kernel-core-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: f3b2437c987ee7da4952b8b49bfd44f14e629863f8abee3b6be75280403af624

kernel-debug-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: c2416bb8abb50db04be3ab3775e946f574a9c0b8950ac66c7c519d5cbe4cb246

kernel-debug-core-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 805ac3566262cfe2c07a2aed7a424599f5c1a14517dd42177285e33629590259

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: eaf66b677a231b59a8ef58c8d4962198400651b32b3db2dfe0245e33dfc2b25b

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: eaf66b677a231b59a8ef58c8d4962198400651b32b3db2dfe0245e33dfc2b25b

kernel-debug-devel-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: fd84f6dcda49f80ee48b29569c69d79a10f952539927fe058e40316130aa93f4

kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 534ecfca14f2c2ddf6bb35cc17cb632a66f7a2b524e3033ee2e2606c79acd5d8

kernel-debug-modules-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 21715a9b034049ad7c8e1ebd9834c7478bb71674474ea7b4b25a73dad992ccf4

kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 57aff2a12c7444746a407c4f7fa3e010b01c03cde3c9d6add7be584029bc1553

kernel-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 6796ef5f51d3b10c00875084e9163363be5c67c47f6b647d296448b0b49086f0

kernel-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 6796ef5f51d3b10c00875084e9163363be5c67c47f6b647d296448b0b49086f0

kernel-debuginfo-common-s390x-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 3f79285696510952c8a5dfeeeb13b82517f9405152c3e7ade101f0c6511a5406

kernel-debuginfo-common-s390x-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 3f79285696510952c8a5dfeeeb13b82517f9405152c3e7ade101f0c6511a5406

kernel-devel-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: d5808a9eab06c94bb5ff82726df768aaa50744bdf27ec95a3400deca64c589ea

kernel-devel-matched-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 98b2fb731bfafd4c27172de5a302be67fdea6e9ba4c9dabdba7f072a00f968ee

kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm

SHA-256: 8ea7ed45f8127aeb74c5d92bd0b553d0004c5141d770c472884d85addf716f28

kernel-headers-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 44df41ffcfc6666bf23b36d3d19b32803c69e684f086b3dbd742a1964a9476fd

kernel-modules-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 3483bd46d88b7165e1b90c7e39c930531435f2f1ec21e553bd23aae35a02cbcf

kernel-modules-extra-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 67239b39cf75198966e1cd23b472adf8bef241031e38614473d9f261b65c8660

kernel-tools-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: eb59c70f31ee79ace4752e7e464d33f251558f95403d417557f87ce1722fd156

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 997e92f8b43fc3cb5591c3ca9ce822d9c8ae3a3bbf3d3a337e8a58fe1485b086

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 997e92f8b43fc3cb5591c3ca9ce822d9c8ae3a3bbf3d3a337e8a58fe1485b086

kernel-zfcpdump-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 149ca2b5543298fb059a376fb0caa876516c46616bbbc9f930c608eeefcd6266

kernel-zfcpdump-core-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 27517a7cc576134a302baa690a0330b250e89ee611f18c974302d6fce3da1bca

kernel-zfcpdump-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 06ea39210aa61b0bf66506cc89766b052e8a4abbb4e347215f315a8d5840173f

kernel-zfcpdump-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 06ea39210aa61b0bf66506cc89766b052e8a4abbb4e347215f315a8d5840173f

kernel-zfcpdump-devel-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 21cb7ef404841045de342fa68255bdf2bd76a2bc83a3ef14a05fedb380e0e4b8

kernel-zfcpdump-devel-matched-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: a2432e783c7408f8b89ad09396b261794c278d6eebdf60dbffd42f052991a5ca

kernel-zfcpdump-modules-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 90b0b5052a9d6be550b02fbe3970cb3f3bb74f76e1556ebaa636c30cb048f610

kernel-zfcpdump-modules-extra-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 422ac19d6606c6b32aae766683740bdfa64ea403efa702f0eaa73d0bdd81096e

perf-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 05bd03f85ce717b30d60c13cfdb47dca1346ad644297881a661fe495e294d777

perf-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: adeb875005d28e96396caf14b35bb8d3167738c222f98ebf9b7c0acf5c5c8041

perf-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: adeb875005d28e96396caf14b35bb8d3167738c222f98ebf9b7c0acf5c5c8041

python3-perf-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: eb5d6f76bf814b24810652d19e5abc53f24b6c8c17e9a7fc62170ee5fbdce6a3

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: be9b5c02d51d304d701083f1d521cd042a9ca1c51e867af9e7ac298c98bee7bb

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: be9b5c02d51d304d701083f1d521cd042a9ca1c51e867af9e7ac298c98bee7bb

Red Hat Enterprise Linux for Power, little endian 9

SRPM

kernel-5.14.0-162.12.1.el9_1.src.rpm

SHA-256: 9d5093c326a9c784afeb3f4562d7771aae4d3a8ef0a13514bb3ad7ffcdc010b3

ppc64le

bpftool-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 06ed0f360241f85a503b5a8ade8687ef9f6a273bcb65d9ff630248c94c6ea3e0

bpftool-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 3e3475ff4431a629c0788f2fa25e933ebaeebabfc5ae5f6feecc7c904a7b0919

bpftool-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 3e3475ff4431a629c0788f2fa25e933ebaeebabfc5ae5f6feecc7c904a7b0919

kernel-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: ee449b3047ecbf07b4e60a17e7f043175de14cc281680e7f4cfaebd9bbd9c831

kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm

SHA-256: 52b433430ee2a7797a4d61eb0cb3a209e03784151c0d948475068cbcf008e88f

kernel-core-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 6a32d5183c7ade6e34c9dc63182113927cf5135d065b10e2783f0527642855dc

kernel-debug-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: ff62b66ea7df38f0e5b13dbc5704d44532cc1b009cbe76c254b8896c632e64c9

kernel-debug-core-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 4482c31c2431ce1b2fe3e86cf0dca676ee5ece460821a7a63d85ad3beaf56bfd

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 509d278163056fc32d2aae8854a5596561bb35d7a6c6c35afe41f028f54e9433

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 509d278163056fc32d2aae8854a5596561bb35d7a6c6c35afe41f028f54e9433

kernel-debug-devel-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 9d29cd596b697a1f9b136a967cf858f728b41d6428cff075bb6e75aac2ba2d6a

kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: cffbb8e002a2bad9f3d03b1d7bd23f1b1b654dce9624e6a1e5c4491a82a8c809

kernel-debug-modules-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 9ad785cb60030f064e68f70878efc7c8dadcb65d127ac2bfb2543e245b3a72f1

kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: f0609b26edc73294748538a7d52842e47c210f49287033b8ff3efaf7c83392ef

kernel-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 2f3f7ba095e91dc00e1dfd274feb8d87357ce37d17897141bd8b57898c218378

kernel-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 2f3f7ba095e91dc00e1dfd274feb8d87357ce37d17897141bd8b57898c218378

kernel-debuginfo-common-ppc64le-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 5c6a4122ee87fa4406bec5ac4ea98d2b53a78556961133f4832e684d7ba58889

kernel-debuginfo-common-ppc64le-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 5c6a4122ee87fa4406bec5ac4ea98d2b53a78556961133f4832e684d7ba58889

kernel-devel-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: becfdc82f68c6a36630540fd6ff726e41586b605f2bed9df505cdb5bee099305

kernel-devel-matched-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 6bf27bd9d564e1fb8384dc3bc7aede4c127752b8b72cce4e3b86dbc48e8f4557

kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm

SHA-256: 8ea7ed45f8127aeb74c5d92bd0b553d0004c5141d770c472884d85addf716f28

kernel-headers-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: d87f9c276c57a24d40a861406f2c03b54c55ecb0d4f872ebab737947c7e9243d

kernel-modules-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 6830208917e43f45aac17fa74abdcf2027eb95cb16f641b6618ebe91e8b57717

kernel-modules-extra-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 60d68855bdd7eecc71ff83825338844a74c1b8860a7477b97880e96400ff0025

kernel-tools-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: f950a76dc0eb1a886cba9b51a4225a720dc18de201f0046873b6790a09a71fcd

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 8cb8e70fa4a4ee6560d9f3686ec30b36155dffdeaac855b26ca0d4a99a96f987

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 8cb8e70fa4a4ee6560d9f3686ec30b36155dffdeaac855b26ca0d4a99a96f987

kernel-tools-libs-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 4bb6b8368ed9b48bb59b39ae604b3716638068ed74473a3f6caf34b5549cda9b

perf-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: d433a56cb17355c4bbc34047e83bbc544c29b37aa4942230bc6966538699d9cc

perf-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 9441f163733b1619ea312d87a4ad6914d0050a2c0908b55cf4ba7319872c6343

perf-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 9441f163733b1619ea312d87a4ad6914d0050a2c0908b55cf4ba7319872c6343

python3-perf-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 57a151303a1c8a914a7e4221da3783629d6632bd7942b4efd08faca6e4708714

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: d026a7eca95a670cc232910adb777e2dae424d2ca34acebc01b5dd3dd0fa6094

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: d026a7eca95a670cc232910adb777e2dae424d2ca34acebc01b5dd3dd0fa6094

Red Hat Enterprise Linux for ARM 64 9

SRPM

kernel-5.14.0-162.12.1.el9_1.src.rpm

SHA-256: 9d5093c326a9c784afeb3f4562d7771aae4d3a8ef0a13514bb3ad7ffcdc010b3

aarch64

bpftool-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 0614342a82d0cca301a26ba10f9784278e3afd78c8c9f53890bbe707f7f7c1a2

bpftool-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 7697790d4ed28252179090be0d92437ac2e5f0d01faffff46772b4d3c2df4474

bpftool-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 7697790d4ed28252179090be0d92437ac2e5f0d01faffff46772b4d3c2df4474

kernel-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 487bf70f75b4f8760a5f9d4fe9ebd767a248db74cec419f3ee6f472a2afbabf5

kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm

SHA-256: 52b433430ee2a7797a4d61eb0cb3a209e03784151c0d948475068cbcf008e88f

kernel-core-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 75be8908be3b75923798830b2961d1b96f1c1339c95263cc88556cc8243ba376

kernel-debug-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: dfc0c450cd95fa268f1252bd3c10767b618ee8ae8e1b3b5ab9d61f9763400036

kernel-debug-core-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 06ac5fcf3e54614ad03e3cff2b9d378f09ad261e3b1eb4fc0ba97a6d28d4705e

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 6b1169c5e7e3db710574f0be31c8702581373b15dec473fea3110fcb0586e699

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 6b1169c5e7e3db710574f0be31c8702581373b15dec473fea3110fcb0586e699

kernel-debug-devel-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 09875fa456882c02bd27fa89e749ab89cd7cade0b239d6c9fb09078959f99dd9

kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: d33003716c13b7836cc41fc08dd7fd005c94789aadffeaa7a6d29fdde752a535

kernel-debug-modules-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: af1aab6f085c118ca30b8935131f571e2cc3c75b7cb3a2f9dacf9fb2ee878fee

kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 3e1e858f3fa8f1d13d2c81265e37a6b580667f8e09510081419b1182906830d9

kernel-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 4417e21a98ed4d832f2aef05c161ffda4f1257a69651dc9957ccebaaa92c7e87

kernel-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 4417e21a98ed4d832f2aef05c161ffda4f1257a69651dc9957ccebaaa92c7e87

kernel-debuginfo-common-aarch64-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: daf61764ce09badb88fca0ac1568a58e38c1a421ef7e8aa4e109e0ae67f19590

kernel-debuginfo-common-aarch64-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: daf61764ce09badb88fca0ac1568a58e38c1a421ef7e8aa4e109e0ae67f19590

kernel-devel-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 677c09ce40efa110243c55fa11076c09442c1f2e0d4cb08223110ed20f42b73f

kernel-devel-matched-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: f90b11368294088019a6d1adedaa8f6e5360c65fbd4c70a377ca31dd587c62f2

kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm

SHA-256: 8ea7ed45f8127aeb74c5d92bd0b553d0004c5141d770c472884d85addf716f28

kernel-headers-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 0ee9a7285816ec91e699a4182398cb862b09b1f3bbe9cf933df097cd3dd5862a

kernel-modules-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: c82223c3739c8dd6f37e14ef3fc82aed27ce95fbecc489e880fee117580383f9

kernel-modules-extra-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 49baf148e590020097bd5fe1f3126e896b8a288daf1a7af424e58fa3109f537f

kernel-tools-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: f54cb28a24c0b6b164d98b1061ea8fb8b127a306e9d89b6a727f26549a474a87

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 526ea661c87c3bfc85971780cb59b3bb0364faef1813eb21225e9c04ff89ea7e

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 526ea661c87c3bfc85971780cb59b3bb0364faef1813eb21225e9c04ff89ea7e

kernel-tools-libs-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: b9d23fe6523b2c25e49dd7fc9c173da6cd158cfbb66c702186050f1ea5d24456

perf-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: c82a7ce041c58dfd3d7432b3d30ea513c77724bd4d2ba3dbb73fb0dd8504a788

perf-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 5773bb8f40df880ef0029e3d731b99dba19f4f211d627eaf2b6b039b37fbafc5

perf-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 5773bb8f40df880ef0029e3d731b99dba19f4f211d627eaf2b6b039b37fbafc5

python3-perf-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: bd088ba5db6eb86f0094f4b161bfe3128c80d7802df92677e7de4105a68a0c52

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 663c36517ead79ed8ec324d535e3b58aaa90063611d9800a6bd5464f6452cd3d

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 663c36517ead79ed8ec324d535e3b58aaa90063611d9800a6bd5464f6452cd3d

Red Hat CodeReady Linux Builder for x86_64 9

SRPM

x86_64

bpftool-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 0b1acb40c32598324a0c4206919e6c87e47d91fd3f04b97d3de4f1c8714c1556

kernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 34e0af480021aa28316614cf6e60ee2b26c4ae69007117deac4fb56d43c1dd59

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: f6114d9d245c1d062987bca8c8afcd22da4eb1e1cb68530c2cdffc63845b5a6f

kernel-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 0ac163142857a0c5fc652f07303069f59e80c3dc7e88394a2afc34f081e75c5a

kernel-debuginfo-common-x86_64-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: b6860adcd67fcdcf1309e24d3032ae773de2805f48adcc672d267f54977b961f

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: ee6096bcdfcef3090290b18d33dfe21edb76e6f1f47eb53dc06ddfcd0d3aca73

kernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: fd73c2d48b7edbfee204f83ae2fd25ce1de6ecdd5a6776cedc72a7471f77fbe0

perf-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 221038a5442412aa4f3bb4373f70e44f5977eec5addd3a5a75999ab82a00217b

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.x86_64.rpm

SHA-256: 0d804b8ae07b6d74295addcdc272cd4961582097f869493f86cccaba2aba51ea

Red Hat CodeReady Linux Builder for Power, little endian 9

SRPM

ppc64le

bpftool-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 3e3475ff4431a629c0788f2fa25e933ebaeebabfc5ae5f6feecc7c904a7b0919

kernel-cross-headers-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: e53137577cc27a13822ab376103692188e8da5ba5a11edf2dc7e5943fe334160

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 509d278163056fc32d2aae8854a5596561bb35d7a6c6c35afe41f028f54e9433

kernel-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 2f3f7ba095e91dc00e1dfd274feb8d87357ce37d17897141bd8b57898c218378

kernel-debuginfo-common-ppc64le-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 5c6a4122ee87fa4406bec5ac4ea98d2b53a78556961133f4832e684d7ba58889

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 8cb8e70fa4a4ee6560d9f3686ec30b36155dffdeaac855b26ca0d4a99a96f987

kernel-tools-libs-devel-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: bfa32aca12c9a147702c3a358688654b91504a6ea72c61df7ae3dd5fbd4f62cc

perf-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: 9441f163733b1619ea312d87a4ad6914d0050a2c0908b55cf4ba7319872c6343

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.ppc64le.rpm

SHA-256: d026a7eca95a670cc232910adb777e2dae424d2ca34acebc01b5dd3dd0fa6094

Red Hat CodeReady Linux Builder for ARM 64 9

SRPM

aarch64

bpftool-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 7697790d4ed28252179090be0d92437ac2e5f0d01faffff46772b4d3c2df4474

kernel-cross-headers-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 0dcc297e102bfb75d8ae4560520426b664d1f5819d878b477949e4923263a7a6

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 6b1169c5e7e3db710574f0be31c8702581373b15dec473fea3110fcb0586e699

kernel-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 4417e21a98ed4d832f2aef05c161ffda4f1257a69651dc9957ccebaaa92c7e87

kernel-debuginfo-common-aarch64-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: daf61764ce09badb88fca0ac1568a58e38c1a421ef7e8aa4e109e0ae67f19590

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 526ea661c87c3bfc85971780cb59b3bb0364faef1813eb21225e9c04ff89ea7e

kernel-tools-libs-devel-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: de3b9d4caab6134995e4b2c4b6f57cff8bfd8bdd9fa1150b4a50a81a505c8ab1

perf-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 5773bb8f40df880ef0029e3d731b99dba19f4f211d627eaf2b6b039b37fbafc5

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.aarch64.rpm

SHA-256: 663c36517ead79ed8ec324d535e3b58aaa90063611d9800a6bd5464f6452cd3d

Red Hat CodeReady Linux Builder for IBM z Systems 9

SRPM

s390x

bpftool-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 55d0dcc48f97cf63c112a4f9ba2058d0e967118d78141669043edf3a4ffe075c

kernel-cross-headers-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: acf8540ba867dbbf0d86c62a058d2247ef4466b163adb2fd148c55d6291ffd2d

kernel-debug-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: eaf66b677a231b59a8ef58c8d4962198400651b32b3db2dfe0245e33dfc2b25b

kernel-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 6796ef5f51d3b10c00875084e9163363be5c67c47f6b647d296448b0b49086f0

kernel-debuginfo-common-s390x-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 3f79285696510952c8a5dfeeeb13b82517f9405152c3e7ade101f0c6511a5406

kernel-tools-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 997e92f8b43fc3cb5591c3ca9ce822d9c8ae3a3bbf3d3a337e8a58fe1485b086

kernel-zfcpdump-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: 06ea39210aa61b0bf66506cc89766b052e8a4abbb4e347215f315a8d5840173f

perf-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: adeb875005d28e96396caf14b35bb8d3167738c222f98ebf9b7c0acf5c5c8041

python3-perf-debuginfo-5.14.0-162.12.1.el9_1.s390x.rpm

SHA-256: be9b5c02d51d304d701083f1d521cd042a9ca1c51e867af9e7ac298c98bee7bb

Related news

Debian Security Advisory 5730-1

Debian Linux Security Advisory 5730-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Red Hat Security Advisory 2023-3495-01

Red Hat Security Advisory 2023-3495-01 - Logging Subsystem 5.7.2 - Red Hat OpenShift. Issues addressed include cross site scripting and denial of service vulnerabilities.

Red Hat Security Advisory 2023-3356-01

Red Hat Security Advisory 2023-3356-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

Red Hat Security Advisory 2023-3326-01

Red Hat Security Advisory 2023-3326-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.6 images. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

RHSA-2023:2736: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user t...

Ubuntu Security Notice USN-5962-1

Ubuntu Security Notice 5962-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5951-1

Ubuntu Security Notice 5951-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Red Hat Security Advisory 2023-0930-01

Red Hat Security Advisory 2023-0930-01 - Update information for Logging Subsystem 5.5.8 in Red Hat OpenShift. Red Hat Product Security has rated this update as having a security impact of Moderate.

Ubuntu Security Notice USN-5934-1

Ubuntu Security Notice 5934-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

RHSA-2023:0930: Red Hat Security Advisory: Logging Subsystem 5.5.8 - Red Hat OpenShift

Logging Subsystem 5.5.8 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24999: qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&...

Ubuntu Security Notice USN-5929-1

Ubuntu Security Notice 5929-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5914-1

Ubuntu Security Notice 5914-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-0839-01

Red Hat Security Advisory 2023-0839-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow and use-after-free vulnerabilities.

RHSA-2023:0839: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41222: A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2022-43945: A buffer overflow flaw was found in the Linux kernel nfsd (...

RHSA-2023:0854: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-41222: A use-after-free flaw was found in the Linux kernel’s mm/mremap...

Red Hat Security Advisory 2023-0794-01

Red Hat Security Advisory 2023-0794-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.4 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

RHSA-2023:0794: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.4 bug fixes and security updates

Red Hat Advanced Cluster Management for Kubernetes 2.6.4 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24999: qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload i...

Ubuntu Security Notice USN-5863-1

Ubuntu Security Notice 5863-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-0536-01

Red Hat Security Advisory 2023-0536-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-0526-01

Red Hat Security Advisory 2023-0526-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Ubuntu Security Notice USN-5830-1

Ubuntu Security Notice 5830-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

RHSA-2023:0536: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0526: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0496: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

Red Hat Security Advisory 2023-0441-01

Red Hat Security Advisory 2023-0441-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-0404-01

Red Hat Security Advisory 2023-0404-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-0396-01

Red Hat Security Advisory 2023-0396-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-0395-01

Red Hat Security Advisory 2023-0395-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.

RHSA-2023:0440: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions

RHSA-2023:0441: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0400: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26401: hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device.

RHSA-2023:0404: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device.

RHSA-2023:0396: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device.

RHSA-2023:0348: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-43945: kernel: nfsd buffer overflow by RPC message over TCP with garbage data

RHSA-2023:0348: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-43945: kernel: nfsd buffer overflow by RPC message over TCP with garbage data

RHSA-2023:0300: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-3059...

RHSA-2023:0300: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-3059...

RHSA-2023:0300: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-3059...

RHSA-2023:0300: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-3059...

RHSA-2023:0300: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-3059...

RHSA-2023:0300: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-3059...

Ubuntu Security Notice USN-5813-1

Ubuntu Security Notice 5813-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5802-1

Ubuntu Security Notice 5802-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-0114-01

Red Hat Security Advisory 2023-0114-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Red Hat Security Advisory 2023-0114-01

Red Hat Security Advisory 2023-0114-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Red Hat Security Advisory 2023-0123-01

Red Hat Security Advisory 2023-0123-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-0123-01

Red Hat Security Advisory 2023-0123-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-0101-01

Red Hat Security Advisory 2023-0101-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.

RHSA-2023:0101: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0101: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0123: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0123: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0114: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0114: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

CVE-2023-0036: en/security-disclosure/2023/2023-01.md · OpenHarmony/security - Gitee.com

platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.

Ubuntu Security Notice USN-5789-1

Ubuntu Security Notice 5789-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

CVE-2022-20544: Pixel Update Bulletin—December2022  |  Android Open Source Project

In onOptionsItemSelected of ManageApplications.java, there is a possible bypass of profile owner restrictions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238745070

Red Hat Security Advisory 2022-9082-01

Red Hat Security Advisory 2022-9082-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, out of bounds write, and privilege escalation vulnerabilities.

Red Hat Security Advisory 2022-9082-01

Red Hat Security Advisory 2022-9082-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, out of bounds write, and privilege escalation vulnerabilities.

RHSA-2022:9082: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-43945: kernel: nfsd buffer overflow by RP...

RHSA-2022:9082: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-43945: kernel: nfsd buffer overflow by RP...

Red Hat Security Advisory 2022-8973-01

Red Hat Security Advisory 2022-8973-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, code execution, memory leak, out of bounds write, and privilege escalation vulnerabilities.

RHSA-2022:8973: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi-co...

RHSA-2022:8973: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi-co...

Ubuntu Security Notice USN-5754-2

Ubuntu Security Notice 5754-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5755-1

Ubuntu Security Notice 5755-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5754-1

Ubuntu Security Notice 5754-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.

Red Hat Security Advisory 2022-7318-01

Red Hat Security Advisory 2022-7318-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-7319-01

Red Hat Security Advisory 2022-7319-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:7319: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2585: kernel: posix cpu timer use-after-free may lead to local privilege escalation * CVE-2022-30594: kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option

CVE-2022-38108: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-36957: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-41686: en/security-disclosure/2022/2022-10.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.

Ubuntu Security Notice USN-5650-1

Ubuntu Security Notice 5650-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5623-1

Ubuntu Security Notice 5623-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5602-1

Ubuntu Security Notice 5602-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

CVE-2022-3077: i2c: ismt: prevent memory corruption in ismt_access() · torvalds/linux@690b254

A buffer overflow vulnerability was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.

CVE-2022-2964: Invalid Bug ID

A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.

Ubuntu Security Notice USN-5594-1

Ubuntu Security Notice 5594-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Kernel Live Patch Security Notice LSN-0086-1

It was discovered that a race condition existed in the network scheduling subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. Various other issues were also addressed.

Ubuntu Security Notice USN-5443-2

Ubuntu Security Notice 5443-2 - Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly enforce seccomp restrictions in some situations. A local attacker could use this to bypass intended seccomp sandbox restrictions.

Ubuntu Security Notice USN-5442-2

Ubuntu Security Notice 5442-2 - Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code. Bing-Jhong Billy Jheng discovered that the io_uring subsystem in the Linux kernel contained in integer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.

CVE-2022-30594

The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.

CVE-2022-30594

The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.