Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:7137: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
Red Hat Security Data
#vulnerability#linux#red_hat#rpm#sap

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation

Red Hat Enterprise Linux for x86_64 8

SRPM

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.src.rpm

SHA-256: fa80995368f4fafdee14fdc36da8a2e6a0daf95f082f1315dab1809f54995adb

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.src.rpm

SHA-256: 76a813be4c91e25e74a4d2795f2e634bc64fdcba2cc3dd227408125df0aaaf8f

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.src.rpm

SHA-256: ff25393590934696bbaa55869c6fb32fad0223965abf75ef89154d3dc153e46a

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.src.rpm

SHA-256: 185b186503be6fe46bcb2fa3e25784969aed2af779ee8832e43b11371431ad9d

kpatch-patch-4_18_0-372_9_1-1-3.el8.src.rpm

SHA-256: 8d3b621af34f39ffa064541c932b4e906edb05bd2e80bc63da11f4636584f83d

x86_64

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.x86_64.rpm

SHA-256: 5604b260831726116c5017e1b36ab5d4deb79a6e15421fdc0fccea1a963a19a3

kpatch-patch-4_18_0-372_13_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: bfb1fe6935f40dec9b78749f60a5e2ec88afe62bf521156fa78b635e8bb78eb6

kpatch-patch-4_18_0-372_13_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 1a2ca3c2a6049f82e74b5089930ab36dd0a1adcb4cc285b3a2efa95031fca6ae

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.x86_64.rpm

SHA-256: c88610e6f4fd61caef916f6902439296f186563a293de15615a9a5cba50958bd

kpatch-patch-4_18_0-372_16_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: 60d1679a7f5fab200e13feaca436a250ae9082154dcc01e3b9f227ce4fba9d8f

kpatch-patch-4_18_0-372_16_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: ec078bc3665b8b7901bdc9b279b37fc4891821282b2aec23b14314f7402ecdb2

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.x86_64.rpm

SHA-256: ae933b22e7ec3e92771980baf29682ef536d055c4a5e2c909b6cab6fd7e19709

kpatch-patch-4_18_0-372_19_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: c8029576fedb37d0b5419dafca32ee4d7e313ab2513e5253ccc27ac4ed4b869e

kpatch-patch-4_18_0-372_19_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: a190193981d7593c008da44638731c0cfa841a29164bab54efd24101eebb1d16

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.x86_64.rpm

SHA-256: 2f9e3c70be2ce5980b00f23e9446d634f9428b91537b5606c5b5744e32064849

kpatch-patch-4_18_0-372_26_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 6957e2166d4e6686ead8aa0dc1fd6755d87fc4961b62c95e243c8699e9f1f823

kpatch-patch-4_18_0-372_26_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 92834b5dac04faa5b0a257fb55259592c85dba4c5562b3ee2cca73bb3e963469

kpatch-patch-4_18_0-372_9_1-1-3.el8.x86_64.rpm

SHA-256: 91c9e2c94121c602e2b806f890ddb5880e5eca43682f55f55302ef519b4eb7dd

kpatch-patch-4_18_0-372_9_1-debuginfo-1-3.el8.x86_64.rpm

SHA-256: f48a4ee89372a9bc9b277cf5e18519dc7fae5f014158ae198b487660e07bd5cc

kpatch-patch-4_18_0-372_9_1-debugsource-1-3.el8.x86_64.rpm

SHA-256: 102f8209f6d70687701d708991e411cda7cd04cc6e61a7101c8b8ed7d09aaa06

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.src.rpm

SHA-256: fa80995368f4fafdee14fdc36da8a2e6a0daf95f082f1315dab1809f54995adb

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.src.rpm

SHA-256: 76a813be4c91e25e74a4d2795f2e634bc64fdcba2cc3dd227408125df0aaaf8f

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.src.rpm

SHA-256: ff25393590934696bbaa55869c6fb32fad0223965abf75ef89154d3dc153e46a

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.src.rpm

SHA-256: 185b186503be6fe46bcb2fa3e25784969aed2af779ee8832e43b11371431ad9d

kpatch-patch-4_18_0-372_9_1-1-3.el8.src.rpm

SHA-256: 8d3b621af34f39ffa064541c932b4e906edb05bd2e80bc63da11f4636584f83d

x86_64

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.x86_64.rpm

SHA-256: 5604b260831726116c5017e1b36ab5d4deb79a6e15421fdc0fccea1a963a19a3

kpatch-patch-4_18_0-372_13_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: bfb1fe6935f40dec9b78749f60a5e2ec88afe62bf521156fa78b635e8bb78eb6

kpatch-patch-4_18_0-372_13_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 1a2ca3c2a6049f82e74b5089930ab36dd0a1adcb4cc285b3a2efa95031fca6ae

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.x86_64.rpm

SHA-256: c88610e6f4fd61caef916f6902439296f186563a293de15615a9a5cba50958bd

kpatch-patch-4_18_0-372_16_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: 60d1679a7f5fab200e13feaca436a250ae9082154dcc01e3b9f227ce4fba9d8f

kpatch-patch-4_18_0-372_16_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: ec078bc3665b8b7901bdc9b279b37fc4891821282b2aec23b14314f7402ecdb2

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.x86_64.rpm

SHA-256: ae933b22e7ec3e92771980baf29682ef536d055c4a5e2c909b6cab6fd7e19709

kpatch-patch-4_18_0-372_19_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: c8029576fedb37d0b5419dafca32ee4d7e313ab2513e5253ccc27ac4ed4b869e

kpatch-patch-4_18_0-372_19_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: a190193981d7593c008da44638731c0cfa841a29164bab54efd24101eebb1d16

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.x86_64.rpm

SHA-256: 2f9e3c70be2ce5980b00f23e9446d634f9428b91537b5606c5b5744e32064849

kpatch-patch-4_18_0-372_26_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 6957e2166d4e6686ead8aa0dc1fd6755d87fc4961b62c95e243c8699e9f1f823

kpatch-patch-4_18_0-372_26_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 92834b5dac04faa5b0a257fb55259592c85dba4c5562b3ee2cca73bb3e963469

kpatch-patch-4_18_0-372_9_1-1-3.el8.x86_64.rpm

SHA-256: 91c9e2c94121c602e2b806f890ddb5880e5eca43682f55f55302ef519b4eb7dd

kpatch-patch-4_18_0-372_9_1-debuginfo-1-3.el8.x86_64.rpm

SHA-256: f48a4ee89372a9bc9b277cf5e18519dc7fae5f014158ae198b487660e07bd5cc

kpatch-patch-4_18_0-372_9_1-debugsource-1-3.el8.x86_64.rpm

SHA-256: 102f8209f6d70687701d708991e411cda7cd04cc6e61a7101c8b8ed7d09aaa06

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.src.rpm

SHA-256: fa80995368f4fafdee14fdc36da8a2e6a0daf95f082f1315dab1809f54995adb

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.src.rpm

SHA-256: 76a813be4c91e25e74a4d2795f2e634bc64fdcba2cc3dd227408125df0aaaf8f

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.src.rpm

SHA-256: ff25393590934696bbaa55869c6fb32fad0223965abf75ef89154d3dc153e46a

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.src.rpm

SHA-256: 185b186503be6fe46bcb2fa3e25784969aed2af779ee8832e43b11371431ad9d

kpatch-patch-4_18_0-372_9_1-1-3.el8.src.rpm

SHA-256: 8d3b621af34f39ffa064541c932b4e906edb05bd2e80bc63da11f4636584f83d

x86_64

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.x86_64.rpm

SHA-256: 5604b260831726116c5017e1b36ab5d4deb79a6e15421fdc0fccea1a963a19a3

kpatch-patch-4_18_0-372_13_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: bfb1fe6935f40dec9b78749f60a5e2ec88afe62bf521156fa78b635e8bb78eb6

kpatch-patch-4_18_0-372_13_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 1a2ca3c2a6049f82e74b5089930ab36dd0a1adcb4cc285b3a2efa95031fca6ae

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.x86_64.rpm

SHA-256: c88610e6f4fd61caef916f6902439296f186563a293de15615a9a5cba50958bd

kpatch-patch-4_18_0-372_16_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: 60d1679a7f5fab200e13feaca436a250ae9082154dcc01e3b9f227ce4fba9d8f

kpatch-patch-4_18_0-372_16_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: ec078bc3665b8b7901bdc9b279b37fc4891821282b2aec23b14314f7402ecdb2

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.x86_64.rpm

SHA-256: ae933b22e7ec3e92771980baf29682ef536d055c4a5e2c909b6cab6fd7e19709

kpatch-patch-4_18_0-372_19_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: c8029576fedb37d0b5419dafca32ee4d7e313ab2513e5253ccc27ac4ed4b869e

kpatch-patch-4_18_0-372_19_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: a190193981d7593c008da44638731c0cfa841a29164bab54efd24101eebb1d16

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.x86_64.rpm

SHA-256: 2f9e3c70be2ce5980b00f23e9446d634f9428b91537b5606c5b5744e32064849

kpatch-patch-4_18_0-372_26_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 6957e2166d4e6686ead8aa0dc1fd6755d87fc4961b62c95e243c8699e9f1f823

kpatch-patch-4_18_0-372_26_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 92834b5dac04faa5b0a257fb55259592c85dba4c5562b3ee2cca73bb3e963469

kpatch-patch-4_18_0-372_9_1-1-3.el8.x86_64.rpm

SHA-256: 91c9e2c94121c602e2b806f890ddb5880e5eca43682f55f55302ef519b4eb7dd

kpatch-patch-4_18_0-372_9_1-debuginfo-1-3.el8.x86_64.rpm

SHA-256: f48a4ee89372a9bc9b277cf5e18519dc7fae5f014158ae198b487660e07bd5cc

kpatch-patch-4_18_0-372_9_1-debugsource-1-3.el8.x86_64.rpm

SHA-256: 102f8209f6d70687701d708991e411cda7cd04cc6e61a7101c8b8ed7d09aaa06

Red Hat Enterprise Linux for Power, little endian 8

SRPM

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.src.rpm

SHA-256: fa80995368f4fafdee14fdc36da8a2e6a0daf95f082f1315dab1809f54995adb

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.src.rpm

SHA-256: 76a813be4c91e25e74a4d2795f2e634bc64fdcba2cc3dd227408125df0aaaf8f

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.src.rpm

SHA-256: ff25393590934696bbaa55869c6fb32fad0223965abf75ef89154d3dc153e46a

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.src.rpm

SHA-256: 185b186503be6fe46bcb2fa3e25784969aed2af779ee8832e43b11371431ad9d

kpatch-patch-4_18_0-372_9_1-1-3.el8.src.rpm

SHA-256: 8d3b621af34f39ffa064541c932b4e906edb05bd2e80bc63da11f4636584f83d

ppc64le

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.ppc64le.rpm

SHA-256: 56631b09bc15d9ec9009d466be0dab637c99ef062870560030ee27cb132ea5eb

kpatch-patch-4_18_0-372_13_1-debuginfo-1-2.el8_6.ppc64le.rpm

SHA-256: 2f3c62b1ce2fcb17151ffd0ef4fe22e4e8989dbe5b022121b5233e19cc48e141

kpatch-patch-4_18_0-372_13_1-debugsource-1-2.el8_6.ppc64le.rpm

SHA-256: ccd075ff24ce044cfc8bd13aaa16c6d15a5a17d9543c3fc717545093e3d1a7bb

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.ppc64le.rpm

SHA-256: f1d8a083f5c8b52954936abe4f8285e3b2142e28d6252991c00abe3aeff9b8c8

kpatch-patch-4_18_0-372_16_1-debuginfo-1-2.el8_6.ppc64le.rpm

SHA-256: f63f39c8ec42fd00a4b6ef2b0f115dee114e78630e65bfe81aec70cae775f9e4

kpatch-patch-4_18_0-372_16_1-debugsource-1-2.el8_6.ppc64le.rpm

SHA-256: 23627ad25671edc6110d3a062d8dd049d52a701d0293c719c1f46cf369ceeeaa

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.ppc64le.rpm

SHA-256: c6db380292a1a2ce22e90d2bd5ef1c7b9ae737dcfc7d9b518d58784534ecafa3

kpatch-patch-4_18_0-372_19_1-debuginfo-1-1.el8_6.ppc64le.rpm

SHA-256: 34f241f363dd08e8556ab8b848bf054b4128ba8513a9cbc07d2cc554ef443612

kpatch-patch-4_18_0-372_19_1-debugsource-1-1.el8_6.ppc64le.rpm

SHA-256: 3405e22acd376f528fd8815d79f491465e1ddfcc783d1ee843d2cdc11af406f3

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.ppc64le.rpm

SHA-256: c73d0486fe31d20e2ebbf3ec4d74d79f034b2197f597334219b47dbb0ea341e8

kpatch-patch-4_18_0-372_26_1-debuginfo-1-1.el8_6.ppc64le.rpm

SHA-256: ac46277a92aeaa68402136ec2b9eba09e13604c663d29e33fdfcbfbd7fdab0dc

kpatch-patch-4_18_0-372_26_1-debugsource-1-1.el8_6.ppc64le.rpm

SHA-256: e5404ad09710be6e880be4cd67d29430653b26b259933a9d691f5e1623708841

kpatch-patch-4_18_0-372_9_1-1-3.el8.ppc64le.rpm

SHA-256: fe691208cbbdd878738d61010db4bf474f1ea5a7c771bbc034bff2d345f66abf

kpatch-patch-4_18_0-372_9_1-debuginfo-1-3.el8.ppc64le.rpm

SHA-256: e55957b1a9528e27781c924b2058220b8b57e39edd56ab0f828415670e8fdcb2

kpatch-patch-4_18_0-372_9_1-debugsource-1-3.el8.ppc64le.rpm

SHA-256: aadb5d6d3af7097cbfb2f92225c828a0adcc61e20d58ec0638d1670de4787ba0

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.src.rpm

SHA-256: fa80995368f4fafdee14fdc36da8a2e6a0daf95f082f1315dab1809f54995adb

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.src.rpm

SHA-256: 76a813be4c91e25e74a4d2795f2e634bc64fdcba2cc3dd227408125df0aaaf8f

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.src.rpm

SHA-256: ff25393590934696bbaa55869c6fb32fad0223965abf75ef89154d3dc153e46a

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.src.rpm

SHA-256: 185b186503be6fe46bcb2fa3e25784969aed2af779ee8832e43b11371431ad9d

kpatch-patch-4_18_0-372_9_1-1-3.el8.src.rpm

SHA-256: 8d3b621af34f39ffa064541c932b4e906edb05bd2e80bc63da11f4636584f83d

ppc64le

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.ppc64le.rpm

SHA-256: 56631b09bc15d9ec9009d466be0dab637c99ef062870560030ee27cb132ea5eb

kpatch-patch-4_18_0-372_13_1-debuginfo-1-2.el8_6.ppc64le.rpm

SHA-256: 2f3c62b1ce2fcb17151ffd0ef4fe22e4e8989dbe5b022121b5233e19cc48e141

kpatch-patch-4_18_0-372_13_1-debugsource-1-2.el8_6.ppc64le.rpm

SHA-256: ccd075ff24ce044cfc8bd13aaa16c6d15a5a17d9543c3fc717545093e3d1a7bb

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.ppc64le.rpm

SHA-256: f1d8a083f5c8b52954936abe4f8285e3b2142e28d6252991c00abe3aeff9b8c8

kpatch-patch-4_18_0-372_16_1-debuginfo-1-2.el8_6.ppc64le.rpm

SHA-256: f63f39c8ec42fd00a4b6ef2b0f115dee114e78630e65bfe81aec70cae775f9e4

kpatch-patch-4_18_0-372_16_1-debugsource-1-2.el8_6.ppc64le.rpm

SHA-256: 23627ad25671edc6110d3a062d8dd049d52a701d0293c719c1f46cf369ceeeaa

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.ppc64le.rpm

SHA-256: c6db380292a1a2ce22e90d2bd5ef1c7b9ae737dcfc7d9b518d58784534ecafa3

kpatch-patch-4_18_0-372_19_1-debuginfo-1-1.el8_6.ppc64le.rpm

SHA-256: 34f241f363dd08e8556ab8b848bf054b4128ba8513a9cbc07d2cc554ef443612

kpatch-patch-4_18_0-372_19_1-debugsource-1-1.el8_6.ppc64le.rpm

SHA-256: 3405e22acd376f528fd8815d79f491465e1ddfcc783d1ee843d2cdc11af406f3

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.ppc64le.rpm

SHA-256: c73d0486fe31d20e2ebbf3ec4d74d79f034b2197f597334219b47dbb0ea341e8

kpatch-patch-4_18_0-372_26_1-debuginfo-1-1.el8_6.ppc64le.rpm

SHA-256: ac46277a92aeaa68402136ec2b9eba09e13604c663d29e33fdfcbfbd7fdab0dc

kpatch-patch-4_18_0-372_26_1-debugsource-1-1.el8_6.ppc64le.rpm

SHA-256: e5404ad09710be6e880be4cd67d29430653b26b259933a9d691f5e1623708841

kpatch-patch-4_18_0-372_9_1-1-3.el8.ppc64le.rpm

SHA-256: fe691208cbbdd878738d61010db4bf474f1ea5a7c771bbc034bff2d345f66abf

kpatch-patch-4_18_0-372_9_1-debuginfo-1-3.el8.ppc64le.rpm

SHA-256: e55957b1a9528e27781c924b2058220b8b57e39edd56ab0f828415670e8fdcb2

kpatch-patch-4_18_0-372_9_1-debugsource-1-3.el8.ppc64le.rpm

SHA-256: aadb5d6d3af7097cbfb2f92225c828a0adcc61e20d58ec0638d1670de4787ba0

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.src.rpm

SHA-256: fa80995368f4fafdee14fdc36da8a2e6a0daf95f082f1315dab1809f54995adb

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.src.rpm

SHA-256: 76a813be4c91e25e74a4d2795f2e634bc64fdcba2cc3dd227408125df0aaaf8f

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.src.rpm

SHA-256: ff25393590934696bbaa55869c6fb32fad0223965abf75ef89154d3dc153e46a

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.src.rpm

SHA-256: 185b186503be6fe46bcb2fa3e25784969aed2af779ee8832e43b11371431ad9d

kpatch-patch-4_18_0-372_9_1-1-3.el8.src.rpm

SHA-256: 8d3b621af34f39ffa064541c932b4e906edb05bd2e80bc63da11f4636584f83d

x86_64

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.x86_64.rpm

SHA-256: 5604b260831726116c5017e1b36ab5d4deb79a6e15421fdc0fccea1a963a19a3

kpatch-patch-4_18_0-372_13_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: bfb1fe6935f40dec9b78749f60a5e2ec88afe62bf521156fa78b635e8bb78eb6

kpatch-patch-4_18_0-372_13_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 1a2ca3c2a6049f82e74b5089930ab36dd0a1adcb4cc285b3a2efa95031fca6ae

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.x86_64.rpm

SHA-256: c88610e6f4fd61caef916f6902439296f186563a293de15615a9a5cba50958bd

kpatch-patch-4_18_0-372_16_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: 60d1679a7f5fab200e13feaca436a250ae9082154dcc01e3b9f227ce4fba9d8f

kpatch-patch-4_18_0-372_16_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: ec078bc3665b8b7901bdc9b279b37fc4891821282b2aec23b14314f7402ecdb2

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.x86_64.rpm

SHA-256: ae933b22e7ec3e92771980baf29682ef536d055c4a5e2c909b6cab6fd7e19709

kpatch-patch-4_18_0-372_19_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: c8029576fedb37d0b5419dafca32ee4d7e313ab2513e5253ccc27ac4ed4b869e

kpatch-patch-4_18_0-372_19_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: a190193981d7593c008da44638731c0cfa841a29164bab54efd24101eebb1d16

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.x86_64.rpm

SHA-256: 2f9e3c70be2ce5980b00f23e9446d634f9428b91537b5606c5b5744e32064849

kpatch-patch-4_18_0-372_26_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 6957e2166d4e6686ead8aa0dc1fd6755d87fc4961b62c95e243c8699e9f1f823

kpatch-patch-4_18_0-372_26_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 92834b5dac04faa5b0a257fb55259592c85dba4c5562b3ee2cca73bb3e963469

kpatch-patch-4_18_0-372_9_1-1-3.el8.x86_64.rpm

SHA-256: 91c9e2c94121c602e2b806f890ddb5880e5eca43682f55f55302ef519b4eb7dd

kpatch-patch-4_18_0-372_9_1-debuginfo-1-3.el8.x86_64.rpm

SHA-256: f48a4ee89372a9bc9b277cf5e18519dc7fae5f014158ae198b487660e07bd5cc

kpatch-patch-4_18_0-372_9_1-debugsource-1-3.el8.x86_64.rpm

SHA-256: 102f8209f6d70687701d708991e411cda7cd04cc6e61a7101c8b8ed7d09aaa06

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.src.rpm

SHA-256: fa80995368f4fafdee14fdc36da8a2e6a0daf95f082f1315dab1809f54995adb

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.src.rpm

SHA-256: 76a813be4c91e25e74a4d2795f2e634bc64fdcba2cc3dd227408125df0aaaf8f

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.src.rpm

SHA-256: ff25393590934696bbaa55869c6fb32fad0223965abf75ef89154d3dc153e46a

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.src.rpm

SHA-256: 185b186503be6fe46bcb2fa3e25784969aed2af779ee8832e43b11371431ad9d

kpatch-patch-4_18_0-372_9_1-1-3.el8.src.rpm

SHA-256: 8d3b621af34f39ffa064541c932b4e906edb05bd2e80bc63da11f4636584f83d

ppc64le

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.ppc64le.rpm

SHA-256: 56631b09bc15d9ec9009d466be0dab637c99ef062870560030ee27cb132ea5eb

kpatch-patch-4_18_0-372_13_1-debuginfo-1-2.el8_6.ppc64le.rpm

SHA-256: 2f3c62b1ce2fcb17151ffd0ef4fe22e4e8989dbe5b022121b5233e19cc48e141

kpatch-patch-4_18_0-372_13_1-debugsource-1-2.el8_6.ppc64le.rpm

SHA-256: ccd075ff24ce044cfc8bd13aaa16c6d15a5a17d9543c3fc717545093e3d1a7bb

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.ppc64le.rpm

SHA-256: f1d8a083f5c8b52954936abe4f8285e3b2142e28d6252991c00abe3aeff9b8c8

kpatch-patch-4_18_0-372_16_1-debuginfo-1-2.el8_6.ppc64le.rpm

SHA-256: f63f39c8ec42fd00a4b6ef2b0f115dee114e78630e65bfe81aec70cae775f9e4

kpatch-patch-4_18_0-372_16_1-debugsource-1-2.el8_6.ppc64le.rpm

SHA-256: 23627ad25671edc6110d3a062d8dd049d52a701d0293c719c1f46cf369ceeeaa

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.ppc64le.rpm

SHA-256: c6db380292a1a2ce22e90d2bd5ef1c7b9ae737dcfc7d9b518d58784534ecafa3

kpatch-patch-4_18_0-372_19_1-debuginfo-1-1.el8_6.ppc64le.rpm

SHA-256: 34f241f363dd08e8556ab8b848bf054b4128ba8513a9cbc07d2cc554ef443612

kpatch-patch-4_18_0-372_19_1-debugsource-1-1.el8_6.ppc64le.rpm

SHA-256: 3405e22acd376f528fd8815d79f491465e1ddfcc783d1ee843d2cdc11af406f3

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.ppc64le.rpm

SHA-256: c73d0486fe31d20e2ebbf3ec4d74d79f034b2197f597334219b47dbb0ea341e8

kpatch-patch-4_18_0-372_26_1-debuginfo-1-1.el8_6.ppc64le.rpm

SHA-256: ac46277a92aeaa68402136ec2b9eba09e13604c663d29e33fdfcbfbd7fdab0dc

kpatch-patch-4_18_0-372_26_1-debugsource-1-1.el8_6.ppc64le.rpm

SHA-256: e5404ad09710be6e880be4cd67d29430653b26b259933a9d691f5e1623708841

kpatch-patch-4_18_0-372_9_1-1-3.el8.ppc64le.rpm

SHA-256: fe691208cbbdd878738d61010db4bf474f1ea5a7c771bbc034bff2d345f66abf

kpatch-patch-4_18_0-372_9_1-debuginfo-1-3.el8.ppc64le.rpm

SHA-256: e55957b1a9528e27781c924b2058220b8b57e39edd56ab0f828415670e8fdcb2

kpatch-patch-4_18_0-372_9_1-debugsource-1-3.el8.ppc64le.rpm

SHA-256: aadb5d6d3af7097cbfb2f92225c828a0adcc61e20d58ec0638d1670de4787ba0

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.src.rpm

SHA-256: fa80995368f4fafdee14fdc36da8a2e6a0daf95f082f1315dab1809f54995adb

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.src.rpm

SHA-256: 76a813be4c91e25e74a4d2795f2e634bc64fdcba2cc3dd227408125df0aaaf8f

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.src.rpm

SHA-256: ff25393590934696bbaa55869c6fb32fad0223965abf75ef89154d3dc153e46a

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.src.rpm

SHA-256: 185b186503be6fe46bcb2fa3e25784969aed2af779ee8832e43b11371431ad9d

kpatch-patch-4_18_0-372_9_1-1-3.el8.src.rpm

SHA-256: 8d3b621af34f39ffa064541c932b4e906edb05bd2e80bc63da11f4636584f83d

x86_64

kpatch-patch-4_18_0-372_13_1-1-2.el8_6.x86_64.rpm

SHA-256: 5604b260831726116c5017e1b36ab5d4deb79a6e15421fdc0fccea1a963a19a3

kpatch-patch-4_18_0-372_13_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: bfb1fe6935f40dec9b78749f60a5e2ec88afe62bf521156fa78b635e8bb78eb6

kpatch-patch-4_18_0-372_13_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 1a2ca3c2a6049f82e74b5089930ab36dd0a1adcb4cc285b3a2efa95031fca6ae

kpatch-patch-4_18_0-372_16_1-1-2.el8_6.x86_64.rpm

SHA-256: c88610e6f4fd61caef916f6902439296f186563a293de15615a9a5cba50958bd

kpatch-patch-4_18_0-372_16_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: 60d1679a7f5fab200e13feaca436a250ae9082154dcc01e3b9f227ce4fba9d8f

kpatch-patch-4_18_0-372_16_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: ec078bc3665b8b7901bdc9b279b37fc4891821282b2aec23b14314f7402ecdb2

kpatch-patch-4_18_0-372_19_1-1-1.el8_6.x86_64.rpm

SHA-256: ae933b22e7ec3e92771980baf29682ef536d055c4a5e2c909b6cab6fd7e19709

kpatch-patch-4_18_0-372_19_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: c8029576fedb37d0b5419dafca32ee4d7e313ab2513e5253ccc27ac4ed4b869e

kpatch-patch-4_18_0-372_19_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: a190193981d7593c008da44638731c0cfa841a29164bab54efd24101eebb1d16

kpatch-patch-4_18_0-372_26_1-1-1.el8_6.x86_64.rpm

SHA-256: 2f9e3c70be2ce5980b00f23e9446d634f9428b91537b5606c5b5744e32064849

kpatch-patch-4_18_0-372_26_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 6957e2166d4e6686ead8aa0dc1fd6755d87fc4961b62c95e243c8699e9f1f823

kpatch-patch-4_18_0-372_26_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 92834b5dac04faa5b0a257fb55259592c85dba4c5562b3ee2cca73bb3e963469

kpatch-patch-4_18_0-372_9_1-1-3.el8.x86_64.rpm

SHA-256: 91c9e2c94121c602e2b806f890ddb5880e5eca43682f55f55302ef519b4eb7dd

kpatch-patch-4_18_0-372_9_1-debuginfo-1-3.el8.x86_64.rpm

SHA-256: f48a4ee89372a9bc9b277cf5e18519dc7fae5f014158ae198b487660e07bd5cc

kpatch-patch-4_18_0-372_9_1-debugsource-1-3.el8.x86_64.rpm

SHA-256: 102f8209f6d70687701d708991e411cda7cd04cc6e61a7101c8b8ed7d09aaa06

Related news

Red Hat Security Advisory 2023-4022-01

Red Hat Security Advisory 2023-4022-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include double free, privilege escalation, and use-after-free vulnerabilities.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

RHSA-2022:7874: Red Hat Security Advisory: OpenShift Container Platform 4.8.53 bug fix and security update

Red Hat OpenShift Container Platform release 4.8.53 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go...

RHSA-2022:6882: Red Hat Security Advisory: Openshift Logging 5.3.13 security and bug fix release

An update is now available for OpenShift Logging 5.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags

Red Hat Security Advisory 2022-7313-01

Red Hat Security Advisory 2022-7313-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Issues addressed include denial of service and remote SQL injection vulnerabilities.

RHSA-2022:7216: Red Hat Security Advisory: OpenShift Container Platform 4.9.51 bug fix and security update

Red Hat OpenShift Container Platform release 4.9.51 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9.51 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: ...

Red Hat Security Advisory 2022-7280-01

Red Hat Security Advisory 2022-7280-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:7313: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.2 security update and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.2 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2238: search-api: SQL injection leads to remote denial of service * CVE-2022-25858: terser: insecure use of regular expressions leads to ReDoS * CVE-2022-25887: sanitize-html: insecure global regular expression replacement logic may lead to ReDoS * CVE-2022-25896: passport: incorrect ses...

RHSA-2022:7201: Red Hat Security Advisory: OpenShift Container Platform 4.11.12 security update

Red Hat OpenShift Container Platform release 4.11.12 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (issue 3 of 3)

RHSA-2022:7279: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka S...

Red Hat Security Advisory 2022-7146-01

Red Hat Security Advisory 2022-7146-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:7171: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation

Red Hat Security Advisory 2022-6991-01

Red Hat Security Advisory 2022-6991-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6978-01

Red Hat Security Advisory 2022-6978-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:6978: Red Hat Security Advisory: kpatch-patch security update

An update is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation

Red Hat Security Advisory 2022-6875-01

Red Hat Security Advisory 2022-6875-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6872-01

Red Hat Security Advisory 2022-6872-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6551-01

Red Hat Security Advisory 2022-6551-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include denial of service, information leakage, privilege escalation, and use-after...

Ubuntu Security Notice USN-5582-1

Ubuntu Security Notice 5582-1 - Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel did not properly perform data validation. A local attacker could use this to escalate privileges in certain situations. Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5567-1

Ubuntu Security Notice 5567-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5564-1

Ubuntu Security Notice 5564-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5562-1

Ubuntu Security Notice 5562-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.