Headline
RHSA-2023:0101: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device.
- CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
- kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- RHEL8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849)
- vfio zero page mappings fail after 2M instances (BZ#2128515)
- ice: Driver Update up to 5.19 (BZ#2130992)
- atlantic: missing hybernate/resume fixes (BZ#2131935)
- Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084)
- Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813)
- ice: Intel E810 PTP clock glitching (BZ#2136036)
- ice: configure link-down-on-close on and change interface mtu to 9000,the interface can’t up (BZ#2136216)
- ice: dump additional CSRs for Tx hang debugging (BZ#2136513)
- ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270)
- After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157)
- i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205)
- WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953)
- DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216)
- Lenovo 8.7: The VGA display shows no signal when install RHEL8.7 (BZ#2140152)
- Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878)
- mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957)
- net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017)
- RHEL:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for RHEL8.6 and need this patch in 8.6+ (BZ#2144583)
- AMdCLIENT 8.8: The kernel command line parameter “nomodeset” not working properly (BZ#2145218)
- Path loss during Volume Ownership Change on RHEL 8.7 SAS (BZ#2147374)
- net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130)
- iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081)
- Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742)
- Azure RHEL-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912)
- RHEL-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
Fixes
- BZ - 2067482 - CVE-2022-2964 kernel: memory corruption in AX88179_178A based USB ethernet device.
- BZ - 2147572 - CVE-2022-4139 kernel: i915: Incorrect GPU TLB flush can lead to random memory access
Red Hat Enterprise Linux for x86_64 8
SRPM
kernel-4.18.0-425.10.1.el8_7.src.rpm
SHA-256: 4f7138eda5542a107e4d6ef8e1a7632d647e42743fa657e645c8f1c8094f30db
x86_64
bpftool-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: e09637fbc813011993dccf9040b3ef6cfe97e558dd1ad6b40880fa9c8cf3071b
bpftool-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: e48908e2252b56cab9b8433855bf13764adb4e08255a9ece62357805678b467c
kernel-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: bb34af21c3ad5f4da858764b7f12145223626cf99c2e3b05bf1af0a9b22ebc1d
kernel-abi-stablelists-4.18.0-425.10.1.el8_7.noarch.rpm
SHA-256: 7741b9aeff314e3c773a0f40218c08df7dadd20b68aabab0b4f99ca4c1cace6e
kernel-core-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 353c48e82ae7b1d4d128dbaa9d2d79c112c7e57700ffc2d2d1b84e66cca45f6c
kernel-cross-headers-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 28eb7ea9b420f659eda6a6064b2af76a25fd2536e40de28b787411105638b205
kernel-debug-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: bd28171158ac41df24a567a4b2c6e1168da8ef6ab0b3ad7a884c0213768f9c51
kernel-debug-core-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 87b1d70828dec5fc7b8bf8954633994561f0b5c2423fcb1f67bbef38c44dd6a5
kernel-debug-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: e435f820f79c41a689e830762c4cee3c3c8fcb922001c40bd5fa1405c02b0644
kernel-debug-devel-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 8fb7b423ab0e089078ea3234b17d68b7cd8c6b0e7ed4f65efa50f4a4ad0cf44b
kernel-debug-modules-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 9423c83976c198e947c59d9d524271c98b6ce129d5abf5eb833a0f2d95a7a6bf
kernel-debug-modules-extra-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 6bddec637339e39b8b8fc3febf7a9b1ba4c3a8d95ca1a170545f97c3d8ee9620
kernel-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: b5e274277bdba5d7d31ecea7d120c18f80ad129d8b9d317a48514d060a0bfaf2
kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 211628106524be7838e94f2928ba55eba369e2e626f870ed8d943bf459d480df
kernel-devel-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 38c30486928b33b8f38fbc13d206e38caf5ef785132427798de7f1a24057b89c
kernel-doc-4.18.0-425.10.1.el8_7.noarch.rpm
SHA-256: ea29094c47024f4745290e22f2abc8588572e4a45a42457d933e875df1b6a9a9
kernel-headers-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 939c9e1cf678d9108e10c095e13fed315b7752c35a7903ab9d29870f1ad7d0f5
kernel-modules-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: fe3c5fe47fcde23b567759bc05dd0e8f294d6cb8997cd7c7c18072bc30fc1896
kernel-modules-extra-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 70cd21a2f302b6cf308f380481433f2d765d06a3709539bed0d0145e18bd2bab
kernel-tools-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 249781009719ba30a20feb99caea529f16505af68dea3941f17aa8cfa78aa503
kernel-tools-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 2c0ff731a03fa36b5c29ff7c2a3e88e55aea2513e7f586c414e1a7a546e2964f
kernel-tools-libs-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: b1341e25667eb62b633af822674c56558b098eb5f032484bd3cd602bd832faf4
perf-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: d9bf3bb90c6ec39a5b18a195683ef3b2d4a925113d24882eeabf3d49c344ece5
perf-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 246ecc1e3c8f198439130096a0e49dc4c1594f1e77927c8fd4b2ff76246cf9af
python3-perf-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 9ada7bb17c0c6be8425501b77302061f34769e173afb56638f5f3ab8809d5c4c
python3-perf-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 1b4b907267c8e932eb77dc0c6cf7a674a1fe498fc301d8c714803dae67545637
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
kernel-4.18.0-425.10.1.el8_7.src.rpm
SHA-256: 4f7138eda5542a107e4d6ef8e1a7632d647e42743fa657e645c8f1c8094f30db
s390x
bpftool-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 62730d85f01d9895a3a8e077f1444e68d1cf7ee6219209d228b6a38dc1260d0e
bpftool-debuginfo-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 7007d34d5dc9bdb97c56f1934dcb97724bbf667562815121059d5246113cdd03
kernel-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 050aaab80bb8d07b905625118570e945a51240c43a93499116c288f70d366f11
kernel-abi-stablelists-4.18.0-425.10.1.el8_7.noarch.rpm
SHA-256: 7741b9aeff314e3c773a0f40218c08df7dadd20b68aabab0b4f99ca4c1cace6e
kernel-core-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 1805cad76451bde7fa108bce0fc69af8652be2acc7f5c174db7f4a47658a5d9c
kernel-cross-headers-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 4372f234e3e75aac5e50a84cb0ea9073940aed87a592357bbfde4ca33816fe34
kernel-debug-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 2eef677de4c4a85f5f1f1a8e709bad60f01a5085d9c4298c2dec16f5d0b0ac59
kernel-debug-core-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: f4041a3f4e2861e36c0d5918dae388186c293026e458003c4b1d65332ce49234
kernel-debug-debuginfo-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 1cd1e3c57f5a4b2f12ed8268fac90d13955f6dacb8acc803da5ad251fd35fbdc
kernel-debug-devel-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: c94f4528bb84493c9e70d042132b7818920faf4bcfd88f0c97d0847f44f832cc
kernel-debug-modules-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: d6577308421db3d45860bda8d7564c1d47ce2546b39bd4adac22d1c12f8fce84
kernel-debug-modules-extra-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 11ae3a8a8ec8d9bba84556bc5c705b2809c4d47337b4b4350c2849a864b86e86
kernel-debuginfo-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 6947dc71295b2eafb56a921b34a87eea08e64bd45adca0d709ec5f9fdee2e43f
kernel-debuginfo-common-s390x-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 32869696c2c0330633679b69d19070426e098c7faa6a5223ae0e7b86b5ed8a52
kernel-devel-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 7a56a7af7b1cdcc29583d465133e5fb7cb86400e51d00f1d170bd20caf262c0b
kernel-doc-4.18.0-425.10.1.el8_7.noarch.rpm
SHA-256: ea29094c47024f4745290e22f2abc8588572e4a45a42457d933e875df1b6a9a9
kernel-headers-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 8cfdce6688b7f06d346a546dc35c6ff7c9812ee822bb7b59539d130923da7c30
kernel-modules-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 4d1aed843679c35c91a415e02fc650b3f8d0081823dee61407e8877e7376344f
kernel-modules-extra-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 281314b225ade34d6e7af597402eb6a6d6abf7bca371198f4541269431eff41d
kernel-tools-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: c39b331afd1db7e21ab2431eeec760154b3b0254f8667c8dcaa740c3920b5680
kernel-tools-debuginfo-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: e92f22d297e77c95835b467370864f8c39e7bfe84390b24ea5c9d8d966295191
kernel-zfcpdump-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 03427d45f7b080b761217f8177b21340a8c8dd6cd557220f6f41f681177c0d4e
kernel-zfcpdump-core-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 9b41ee63cd91ca040d679ce25c5fdbf655ff8a1961db5cf7fc611617f4314513
kernel-zfcpdump-debuginfo-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: bdf963280c3d1e6068396d4489d23a60b24cf4c23d09f1cac1f8a5800df1a8d2
kernel-zfcpdump-devel-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 508e49cc1bc1a414d7da714651a6029804894f54ec4f15710de9217edb59afc6
kernel-zfcpdump-modules-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: d6a9c64cc6c5447c446682ca2b8352742ec91f3754c088430293da1899992d46
kernel-zfcpdump-modules-extra-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: a770e24ddffd9a9cb01d9442ba009bda36b9ad7a4110bb9c47e959a518d3e841
perf-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 6cc340e5b753affee1978faab57d1b4f7769328ea07f9f9342f367278c61ca5d
perf-debuginfo-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: 4af810868c2f73c71d8a618e7759bf14dd7d811ee6a5533342fcac51077d95af
python3-perf-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: b560e47c8608b83d697d54aa4c47028b25ba34d67bbe798c16aaa029b558e423
python3-perf-debuginfo-4.18.0-425.10.1.el8_7.s390x.rpm
SHA-256: f5ba2628002ea37aa6a8199955649de0ece32bfbc362e1309972b433ce722b81
Red Hat Enterprise Linux for Power, little endian 8
SRPM
kernel-4.18.0-425.10.1.el8_7.src.rpm
SHA-256: 4f7138eda5542a107e4d6ef8e1a7632d647e42743fa657e645c8f1c8094f30db
ppc64le
bpftool-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: e0423336cd829faf37051d9e8cbcf06e5a559101880573ef8895291b3e89ae72
bpftool-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: de47d6b8130c39bca86b1cd1e887b428d0a6845a60eb4d53a56f6614f044580a
kernel-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: face13272337629c4e2d8fefe8decd5d74b05c0d6fc722ce1567f804171c2b8b
kernel-abi-stablelists-4.18.0-425.10.1.el8_7.noarch.rpm
SHA-256: 7741b9aeff314e3c773a0f40218c08df7dadd20b68aabab0b4f99ca4c1cace6e
kernel-core-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 1dca676d1ffc3c666b6342b12481b42f9c9ee91131a415c4a55cbf5510123579
kernel-cross-headers-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 8725ab215a895a6cdcb6effbce1fab44e8f12436e7a588f99397828f52c94443
kernel-debug-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 92defc68b1aa3ed01f0b4b25be2b61005afa616d7a7e2acc6023e36befbdac9d
kernel-debug-core-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: b26e298ab990ebc9b6fe9b6428be219e4f336e1eba5f937a24e4ef5051ada63d
kernel-debug-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: fc8fef33415bff3da67d35c1c7d65915850da3d57358cec63d1f35ff7262fc8a
kernel-debug-devel-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: c70111771d2db4bf85c1f1f09ac50804a41bd54a5826fdc84bf2b31a24f900b7
kernel-debug-modules-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 9e06a3926859b8cf61ba954212a5890e008df9756027cf4f5d0450b13102cf09
kernel-debug-modules-extra-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 89cf07abd92570491568994da4f874611c1028694a40b0b29db731822ad78d70
kernel-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 4cbccd70876db5979cbdab9609a24f9190e3065a0c91740c87ba7c6bf840f1dc
kernel-debuginfo-common-ppc64le-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: bea46618e54e75d2adc715dc9ee34f49c307b3800f0295493d000c24f222b053
kernel-devel-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: d1657d06f9ff72daa3bf9eee195d8d754c3501ad18263521249a5343cdf47c1b
kernel-doc-4.18.0-425.10.1.el8_7.noarch.rpm
SHA-256: ea29094c47024f4745290e22f2abc8588572e4a45a42457d933e875df1b6a9a9
kernel-headers-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: d89e9869b594463bbb44039c8a8a49cf5e6abcf0c2f96d1ce3338fc984c5e50e
kernel-modules-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 00d5a4ac50e6554811c3b2f0b4ff62dcf33fb73b6331f92d0498d4aec826e17d
kernel-modules-extra-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: f007e6ac43cad354cdddccd36db8c5666b571e8b543485948d5fe7cdbec22b72
kernel-tools-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: be69af9c75e0b36aa5e0fbb48556199e175de26e880ed3aaf29000c47c3b71e3
kernel-tools-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: b0d9bb425e370bb1e088f2d6818a12446928d0218b5035193eefed3b3740dd7d
kernel-tools-libs-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: c255c9311ad6033ec923837f4fe145f30afdfdba9e47666c6fe4a6f71a9aff0f
perf-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 5c0d928c0886907d074b75d4376f2195284329e5c9a6f53d5f3ea6818892a5ad
perf-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 78acb9ec9fd9440442ee1551af9be00183f7cb8122fcdeaf84a0a3ded5dd74bd
python3-perf-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 16d98f1b8139be4f98cc006f45dddfc2ed3dc40786ba8cc657a257329f69b34e
python3-perf-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: d4d6d9515016aeb13ddfe6d49568ecdd49301887648b6fef6e20a9bdfd4dac03
Red Hat Enterprise Linux for ARM 64 8
SRPM
kernel-4.18.0-425.10.1.el8_7.src.rpm
SHA-256: 4f7138eda5542a107e4d6ef8e1a7632d647e42743fa657e645c8f1c8094f30db
aarch64
bpftool-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: cb9758a36250f9f95598e78a322b91d02d897afc2c1ec34a73345e51f643e94a
bpftool-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 9bdf4ac100d1f2452aada5d99ebfe167f6b4e3b83f706dbb74f0aa935c364f50
kernel-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 97594e48c52917c3a9efc0978c0a4a0a83057f63e474e718250ea48141c0dcf4
kernel-abi-stablelists-4.18.0-425.10.1.el8_7.noarch.rpm
SHA-256: 7741b9aeff314e3c773a0f40218c08df7dadd20b68aabab0b4f99ca4c1cace6e
kernel-core-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 738b1b9b09dcd8b5d1d93a3fc9a5795da026d4a89cba42919e27a3425ab5712a
kernel-cross-headers-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 937853ed798c7910a1cf45dad98e07236cdbb86aef7f2ebf1278afac40fbf310
kernel-debug-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: c8441dd5c09f221dc68d89c0414f37c3a113d4277da06e138da1a79dccc90d3c
kernel-debug-core-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 3a057e4af5238d0de3681be9ab65bcf761fd1c6294bb08b8e9fd0c9bc91c4772
kernel-debug-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: fcd88e9ac6ce1ad5b8b63c1f4ab6afc71c6b3d28a540a8ab59f87c0a6168cd5b
kernel-debug-devel-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 7ca2d687ef094a6dff0ea37e27070c18ddca5d47f8fab8464c80dc8ded5d2415
kernel-debug-modules-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 6cbe5d74902c86b07499901a0f6e4773480a33484b09323e02d9213edae5a3e5
kernel-debug-modules-extra-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: dc561efe93ebb6c66b1fdb0edf6a00857d9190966c085f127298b8623a917a4a
kernel-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 596c263f75e5e4d313f83408725b3c74b46052eca40f9173bdb9997354f04f9b
kernel-debuginfo-common-aarch64-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 46a0ecdeed3b70e3df6c88fa76d0768bbda4da0d6bea4125acd513cfc171de27
kernel-devel-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: d405e0d1e3adcd6979b13b3fcc8118b9fae8a7fd71321064c90c9354fe97d8d3
kernel-doc-4.18.0-425.10.1.el8_7.noarch.rpm
SHA-256: ea29094c47024f4745290e22f2abc8588572e4a45a42457d933e875df1b6a9a9
kernel-headers-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 6d4ebffdb277110074e9664735d20922f56c0441c4d81bd9d2e55bbe5838d4e0
kernel-modules-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 8f224d11d7229d09c9715a7111ede0e7b1e04ce8fc5b58ae0fc7a67e893b6463
kernel-modules-extra-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: e12e379fc4e26af7517cfcc2c249cf6733c2f87f64501b4a9c7a88e16511cb3e
kernel-tools-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 78244d6c601889d524b253c460a7c424ae0c4baede0dd88f8d60b7eb8228f110
kernel-tools-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: ef178edfd58569ecea67c22ad74d4a80c21e6d064f585d8de5ee5abfef475ecb
kernel-tools-libs-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 86ba40b78ed9171e8550733f5ba12045bc00b433aa09c8509d9f2ca169975d56
perf-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 96f672e215aafcef2f665778025496dc1e01b3da9133707bff3da614630925a4
perf-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 5157518ee019ee88f6a92cfff4c197b41a9e266036987379cd7149b3ae6ed28b
python3-perf-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: e4f58ac06ab9babc256207ebc95627c8e45a99bd5d5885a8fd0c38ae444e62aa
python3-perf-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: e6b345ed62bc68b7b1f37e58f1c2a58f3128e2cd6274df72bdbaceebed1dee62
Red Hat CodeReady Linux Builder for x86_64 8
SRPM
x86_64
bpftool-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: e48908e2252b56cab9b8433855bf13764adb4e08255a9ece62357805678b467c
kernel-debug-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: e435f820f79c41a689e830762c4cee3c3c8fcb922001c40bd5fa1405c02b0644
kernel-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: b5e274277bdba5d7d31ecea7d120c18f80ad129d8b9d317a48514d060a0bfaf2
kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 211628106524be7838e94f2928ba55eba369e2e626f870ed8d943bf459d480df
kernel-tools-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 2c0ff731a03fa36b5c29ff7c2a3e88e55aea2513e7f586c414e1a7a546e2964f
kernel-tools-libs-devel-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 87997a53f85b740498179a55babd392fd657df217fd99617b2a8f3940ecc7924
perf-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 246ecc1e3c8f198439130096a0e49dc4c1594f1e77927c8fd4b2ff76246cf9af
python3-perf-debuginfo-4.18.0-425.10.1.el8_7.x86_64.rpm
SHA-256: 1b4b907267c8e932eb77dc0c6cf7a674a1fe498fc301d8c714803dae67545637
Red Hat CodeReady Linux Builder for Power, little endian 8
SRPM
ppc64le
bpftool-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: de47d6b8130c39bca86b1cd1e887b428d0a6845a60eb4d53a56f6614f044580a
kernel-debug-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: fc8fef33415bff3da67d35c1c7d65915850da3d57358cec63d1f35ff7262fc8a
kernel-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 4cbccd70876db5979cbdab9609a24f9190e3065a0c91740c87ba7c6bf840f1dc
kernel-debuginfo-common-ppc64le-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: bea46618e54e75d2adc715dc9ee34f49c307b3800f0295493d000c24f222b053
kernel-tools-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: b0d9bb425e370bb1e088f2d6818a12446928d0218b5035193eefed3b3740dd7d
kernel-tools-libs-devel-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 25b84e7af54248bfaa82f5ac5f99c3463dacba755b4b71833bb1f70959d45e98
perf-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: 78acb9ec9fd9440442ee1551af9be00183f7cb8122fcdeaf84a0a3ded5dd74bd
python3-perf-debuginfo-4.18.0-425.10.1.el8_7.ppc64le.rpm
SHA-256: d4d6d9515016aeb13ddfe6d49568ecdd49301887648b6fef6e20a9bdfd4dac03
Red Hat CodeReady Linux Builder for ARM 64 8
SRPM
aarch64
bpftool-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 9bdf4ac100d1f2452aada5d99ebfe167f6b4e3b83f706dbb74f0aa935c364f50
kernel-debug-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: fcd88e9ac6ce1ad5b8b63c1f4ab6afc71c6b3d28a540a8ab59f87c0a6168cd5b
kernel-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 596c263f75e5e4d313f83408725b3c74b46052eca40f9173bdb9997354f04f9b
kernel-debuginfo-common-aarch64-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 46a0ecdeed3b70e3df6c88fa76d0768bbda4da0d6bea4125acd513cfc171de27
kernel-tools-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: ef178edfd58569ecea67c22ad74d4a80c21e6d064f585d8de5ee5abfef475ecb
kernel-tools-libs-devel-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 486b7f03ad51ec0eee0bc12acc9a6eac7b2a9b289fb7a263592c57421a54f9fd
perf-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: 5157518ee019ee88f6a92cfff4c197b41a9e266036987379cd7149b3ae6ed28b
python3-perf-debuginfo-4.18.0-425.10.1.el8_7.aarch64.rpm
SHA-256: e6b345ed62bc68b7b1f37e58f1c2a58f3128e2cd6274df72bdbaceebed1dee62
Related news
Ubuntu Security Notice 6089-1 - It was discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6000-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5941-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5940-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5938-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5934-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5929-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5911-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2023-0856-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4139: An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system. * CVE-2022-47629: A vulnerability was found in the Libksba library, due to an integer ...
Red Hat Security Advisory 2023-0536-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-0526-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
Red Hat Security Advisory 2023-0441-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-0440-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
Red Hat Security Advisory 2023-0399-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
Red Hat Security Advisory 2023-0400-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Red Hat Security Advisory 2023-0396-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-0395-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
Red Hat Security Advisory 2023-0392-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-43945: kernel: nfsd buffer overflow by RPC message over TCP with garbage data
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-3059...
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-30594: ...
Red Hat Security Advisory 2023-0114-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Red Hat Security Advisory 2023-0123-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-0101-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]
A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
Ubuntu Security Notice 5650-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.