Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:1923: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Red Hat Security Data
#vulnerability#linux#red_hat#rpm#sap#ssl

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2176192 - CVE-2023-0461 kernel: net/ulp: use-after-free in listening ULP sockets

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.src.rpm

SHA-256: 20e1697f90bc5c3f227a398de43fd67da342984b774125f6b401caee2acb2557

Download

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.src.rpm

SHA-256: c040318b5ea10c02b7d58466f66e0de6657508c734bbcf0a46be4c0d89f7f334

Download

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.src.rpm

SHA-256: f019fb15a30b4860e17dfc5abc5b90f050599e28b3870c4da85d4195fb725ff1

Download

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.src.rpm

SHA-256: ab8369cae2c22e021828d2167b83a0d1a57e83a88ce7bc7d7e8286950122b6a6

Download

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.src.rpm

SHA-256: bd5225aad84298aca76ef9c77d57a5d20c1fcbec9a92f7d5dc047f1579a44925

Download

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.src.rpm

SHA-256: df754a5355cb415da363e52888a81435e0c8dce850ed1bb7ec6eea363916a473

Download

x86_64

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.x86_64.rpm

SHA-256: 5beba7d900ee3f40d78cf8abdd318cda496a77554f9f93beda22c4c4d0ba7be4

Download

kpatch-patch-4_18_0-372_32_1-debuginfo-1-6.el8_6.x86_64.rpm

SHA-256: c8123862d883b287126f06359419e09c3d6312a3734828c16687247b7c27853f

Download

kpatch-patch-4_18_0-372_32_1-debugsource-1-6.el8_6.x86_64.rpm

SHA-256: 664723072b81dccfabff7cfc531ca753544aa0ee4f29af909d1a9bc85d417062

Download

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.x86_64.rpm

SHA-256: 2a2378c6b925fd5999b54df14d3a7dc8ebbac3a5784127b35e36bcd8ef9dc47f

Download

kpatch-patch-4_18_0-372_36_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: c4bca3fd1d69044210278affae1db8e4864a04b47ee12b29008146d903697415

Download

kpatch-patch-4_18_0-372_36_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: 14d05edd571c35888cf264fbd15d37d8f5c21086efdee51951e6c123462672f3

Download

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.x86_64.rpm

SHA-256: 8df4afce3d1b8682fa68a5dfc51d8518e518e2c1f34bf8b995bb76bd0188ac21

Download

kpatch-patch-4_18_0-372_40_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: bd3b564e9ff43286e34aacd85e155438d4ac8f5617b162142bebaef8adca4d63

Download

kpatch-patch-4_18_0-372_40_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: d5550392ce07516c3991638dd9fd40768d93847e6d529eaf66a09d750e38c9d9

Download

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.x86_64.rpm

SHA-256: 5e5adde9e15a37852bddc0c13d34ef3452201db21496ddd28af6c81e9bd3faa2

Download

kpatch-patch-4_18_0-372_41_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 33be57ca85f5ba133d0bf498809f42d9d44773302e04fa90fd5a83ca9f103ea8

Download

kpatch-patch-4_18_0-372_41_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 530ed37151a5a3a1605b99eb19943d37ed352222d80236b2246befbd9cc6fac4

Download

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.x86_64.rpm

SHA-256: 9c4e46f9d27d72c4bb968034a4f8328ea55448db1d9cda1643a29ad15b36afc3

Download

kpatch-patch-4_18_0-372_46_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: b1f5362ee71d36e97224851659994162605f359bc534aca8ecf86500063cda34

Download

kpatch-patch-4_18_0-372_46_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 571189aa1d4fdc98989cab46e946c08d44f2379ae84283efef4f6261def4b35a

Download

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.x86_64.rpm

SHA-256: dc88b86f8a67a4766c6f6b99de5a9e5cdedbe5434c244f3bbed529a36ed9c0bd

Download

kpatch-patch-4_18_0-372_51_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: d01571a3b68cd3bb634b27330c47c50fc641cbe493d4e54bb2a579835952f3ff

Download

kpatch-patch-4_18_0-372_51_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 92580b75da6a10d8aa9e47c115a5b70ef66ef2b3908ba8f03b96565d324c85f2

Download

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.src.rpm

SHA-256: 20e1697f90bc5c3f227a398de43fd67da342984b774125f6b401caee2acb2557

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.src.rpm

SHA-256: c040318b5ea10c02b7d58466f66e0de6657508c734bbcf0a46be4c0d89f7f334

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.src.rpm

SHA-256: f019fb15a30b4860e17dfc5abc5b90f050599e28b3870c4da85d4195fb725ff1

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.src.rpm

SHA-256: ab8369cae2c22e021828d2167b83a0d1a57e83a88ce7bc7d7e8286950122b6a6

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.src.rpm

SHA-256: bd5225aad84298aca76ef9c77d57a5d20c1fcbec9a92f7d5dc047f1579a44925

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.src.rpm

SHA-256: df754a5355cb415da363e52888a81435e0c8dce850ed1bb7ec6eea363916a473

x86_64

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.x86_64.rpm

SHA-256: 5beba7d900ee3f40d78cf8abdd318cda496a77554f9f93beda22c4c4d0ba7be4

kpatch-patch-4_18_0-372_32_1-debuginfo-1-6.el8_6.x86_64.rpm

SHA-256: c8123862d883b287126f06359419e09c3d6312a3734828c16687247b7c27853f

kpatch-patch-4_18_0-372_32_1-debugsource-1-6.el8_6.x86_64.rpm

SHA-256: 664723072b81dccfabff7cfc531ca753544aa0ee4f29af909d1a9bc85d417062

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.x86_64.rpm

SHA-256: 2a2378c6b925fd5999b54df14d3a7dc8ebbac3a5784127b35e36bcd8ef9dc47f

kpatch-patch-4_18_0-372_36_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: c4bca3fd1d69044210278affae1db8e4864a04b47ee12b29008146d903697415

kpatch-patch-4_18_0-372_36_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: 14d05edd571c35888cf264fbd15d37d8f5c21086efdee51951e6c123462672f3

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.x86_64.rpm

SHA-256: 8df4afce3d1b8682fa68a5dfc51d8518e518e2c1f34bf8b995bb76bd0188ac21

kpatch-patch-4_18_0-372_40_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: bd3b564e9ff43286e34aacd85e155438d4ac8f5617b162142bebaef8adca4d63

kpatch-patch-4_18_0-372_40_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: d5550392ce07516c3991638dd9fd40768d93847e6d529eaf66a09d750e38c9d9

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.x86_64.rpm

SHA-256: 5e5adde9e15a37852bddc0c13d34ef3452201db21496ddd28af6c81e9bd3faa2

kpatch-patch-4_18_0-372_41_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 33be57ca85f5ba133d0bf498809f42d9d44773302e04fa90fd5a83ca9f103ea8

kpatch-patch-4_18_0-372_41_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 530ed37151a5a3a1605b99eb19943d37ed352222d80236b2246befbd9cc6fac4

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.x86_64.rpm

SHA-256: 9c4e46f9d27d72c4bb968034a4f8328ea55448db1d9cda1643a29ad15b36afc3

kpatch-patch-4_18_0-372_46_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: b1f5362ee71d36e97224851659994162605f359bc534aca8ecf86500063cda34

kpatch-patch-4_18_0-372_46_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 571189aa1d4fdc98989cab46e946c08d44f2379ae84283efef4f6261def4b35a

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.x86_64.rpm

SHA-256: dc88b86f8a67a4766c6f6b99de5a9e5cdedbe5434c244f3bbed529a36ed9c0bd

kpatch-patch-4_18_0-372_51_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: d01571a3b68cd3bb634b27330c47c50fc641cbe493d4e54bb2a579835952f3ff

kpatch-patch-4_18_0-372_51_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 92580b75da6a10d8aa9e47c115a5b70ef66ef2b3908ba8f03b96565d324c85f2

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.src.rpm

SHA-256: 20e1697f90bc5c3f227a398de43fd67da342984b774125f6b401caee2acb2557

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.src.rpm

SHA-256: c040318b5ea10c02b7d58466f66e0de6657508c734bbcf0a46be4c0d89f7f334

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.src.rpm

SHA-256: f019fb15a30b4860e17dfc5abc5b90f050599e28b3870c4da85d4195fb725ff1

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.src.rpm

SHA-256: ab8369cae2c22e021828d2167b83a0d1a57e83a88ce7bc7d7e8286950122b6a6

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.src.rpm

SHA-256: bd5225aad84298aca76ef9c77d57a5d20c1fcbec9a92f7d5dc047f1579a44925

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.src.rpm

SHA-256: df754a5355cb415da363e52888a81435e0c8dce850ed1bb7ec6eea363916a473

ppc64le

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.ppc64le.rpm

SHA-256: f8a6f68221ec4ec4292e44019b8a5cdd7f7d9900abaa1a20ab231d935adcaae1

kpatch-patch-4_18_0-372_32_1-debuginfo-1-6.el8_6.ppc64le.rpm

SHA-256: ff343295f411c5eaf8e45739d8cc8d2bac5fbbe6ad1578e131a6fdd264f2081d

kpatch-patch-4_18_0-372_32_1-debugsource-1-6.el8_6.ppc64le.rpm

SHA-256: df14479d37379f3b0eb6f39c24d5a529277862c88cc1b0d12dec70a099891c7b

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.ppc64le.rpm

SHA-256: 3df485555e574223a69e5291030fb7538fc3375119e56852213b79e721d2e094

kpatch-patch-4_18_0-372_36_1-debuginfo-1-5.el8_6.ppc64le.rpm

SHA-256: 2880ed6cfc3f450b7a5d390e210f95fe6150a3a1464ff34d2b1b1f0dfcfb13d3

kpatch-patch-4_18_0-372_36_1-debugsource-1-5.el8_6.ppc64le.rpm

SHA-256: 65954c9df005d42bfab3f2d4bcf587b89a3883d81f7cecb4655c0a3cc3a9f7d9

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.ppc64le.rpm

SHA-256: 281ca591d96a537067ee5d883f69c78e59f5c9f7ac561a9773dc07f31c85b86c

kpatch-patch-4_18_0-372_40_1-debuginfo-1-5.el8_6.ppc64le.rpm

SHA-256: 2985268d22069a25a70d672c6d24d3446719ee2e8432b80bfa61400348a29517

kpatch-patch-4_18_0-372_40_1-debugsource-1-5.el8_6.ppc64le.rpm

SHA-256: e82b46bbd18e904bec272c067d3a45d545f5836f3e54cf22eff9b0ea0c368621

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.ppc64le.rpm

SHA-256: be9d2880d00b5b13a8ed891ec5015c14dd2ff7ea4da61b9342d41145ae1b5c51

kpatch-patch-4_18_0-372_41_1-debuginfo-1-4.el8_6.ppc64le.rpm

SHA-256: 2f3124eb907b27777b7bad0148f5460d0a33468468cda26ecb0ac7a7d0686fa3

kpatch-patch-4_18_0-372_41_1-debugsource-1-4.el8_6.ppc64le.rpm

SHA-256: 3e2bca8a36c85319e1b737795b3d08d83bee8bc03cac614befebd09236f11235

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.ppc64le.rpm

SHA-256: 0c302d59fc9922e15f580a8825095ed9051876a9accc8b5e0f03c3a772cadd29

kpatch-patch-4_18_0-372_46_1-debuginfo-1-2.el8_6.ppc64le.rpm

SHA-256: c47fd60df6dcea03941e2a45c4463471c8c54ac579601785adf2e1140121ed66

kpatch-patch-4_18_0-372_46_1-debugsource-1-2.el8_6.ppc64le.rpm

SHA-256: 77ca324e4601cf18d57aa13f4365ec20ac97e6f1090926b507efc5ed89183522

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.ppc64le.rpm

SHA-256: ae44d95e08da03b3c7f058809ff7396ad8a94be8249bff1a661429900dfdd18f

kpatch-patch-4_18_0-372_51_1-debuginfo-1-1.el8_6.ppc64le.rpm

SHA-256: 65e1c43ef65c4138028b95233c0a4ca4ed0489029b0d02374b98209ebb34676c

kpatch-patch-4_18_0-372_51_1-debugsource-1-1.el8_6.ppc64le.rpm

SHA-256: 87e4cdc38688841cf80b66f9dba12eaa125a0516ebb1eba5d98a11ca545e2747

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.src.rpm

SHA-256: 20e1697f90bc5c3f227a398de43fd67da342984b774125f6b401caee2acb2557

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.src.rpm

SHA-256: c040318b5ea10c02b7d58466f66e0de6657508c734bbcf0a46be4c0d89f7f334

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.src.rpm

SHA-256: f019fb15a30b4860e17dfc5abc5b90f050599e28b3870c4da85d4195fb725ff1

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.src.rpm

SHA-256: ab8369cae2c22e021828d2167b83a0d1a57e83a88ce7bc7d7e8286950122b6a6

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.src.rpm

SHA-256: bd5225aad84298aca76ef9c77d57a5d20c1fcbec9a92f7d5dc047f1579a44925

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.src.rpm

SHA-256: df754a5355cb415da363e52888a81435e0c8dce850ed1bb7ec6eea363916a473

x86_64

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.x86_64.rpm

SHA-256: 5beba7d900ee3f40d78cf8abdd318cda496a77554f9f93beda22c4c4d0ba7be4

kpatch-patch-4_18_0-372_32_1-debuginfo-1-6.el8_6.x86_64.rpm

SHA-256: c8123862d883b287126f06359419e09c3d6312a3734828c16687247b7c27853f

kpatch-patch-4_18_0-372_32_1-debugsource-1-6.el8_6.x86_64.rpm

SHA-256: 664723072b81dccfabff7cfc531ca753544aa0ee4f29af909d1a9bc85d417062

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.x86_64.rpm

SHA-256: 2a2378c6b925fd5999b54df14d3a7dc8ebbac3a5784127b35e36bcd8ef9dc47f

kpatch-patch-4_18_0-372_36_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: c4bca3fd1d69044210278affae1db8e4864a04b47ee12b29008146d903697415

kpatch-patch-4_18_0-372_36_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: 14d05edd571c35888cf264fbd15d37d8f5c21086efdee51951e6c123462672f3

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.x86_64.rpm

SHA-256: 8df4afce3d1b8682fa68a5dfc51d8518e518e2c1f34bf8b995bb76bd0188ac21

kpatch-patch-4_18_0-372_40_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: bd3b564e9ff43286e34aacd85e155438d4ac8f5617b162142bebaef8adca4d63

kpatch-patch-4_18_0-372_40_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: d5550392ce07516c3991638dd9fd40768d93847e6d529eaf66a09d750e38c9d9

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.x86_64.rpm

SHA-256: 5e5adde9e15a37852bddc0c13d34ef3452201db21496ddd28af6c81e9bd3faa2

kpatch-patch-4_18_0-372_41_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 33be57ca85f5ba133d0bf498809f42d9d44773302e04fa90fd5a83ca9f103ea8

kpatch-patch-4_18_0-372_41_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 530ed37151a5a3a1605b99eb19943d37ed352222d80236b2246befbd9cc6fac4

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.x86_64.rpm

SHA-256: 9c4e46f9d27d72c4bb968034a4f8328ea55448db1d9cda1643a29ad15b36afc3

kpatch-patch-4_18_0-372_46_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: b1f5362ee71d36e97224851659994162605f359bc534aca8ecf86500063cda34

kpatch-patch-4_18_0-372_46_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 571189aa1d4fdc98989cab46e946c08d44f2379ae84283efef4f6261def4b35a

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.x86_64.rpm

SHA-256: dc88b86f8a67a4766c6f6b99de5a9e5cdedbe5434c244f3bbed529a36ed9c0bd

kpatch-patch-4_18_0-372_51_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: d01571a3b68cd3bb634b27330c47c50fc641cbe493d4e54bb2a579835952f3ff

kpatch-patch-4_18_0-372_51_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 92580b75da6a10d8aa9e47c115a5b70ef66ef2b3908ba8f03b96565d324c85f2

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.src.rpm

SHA-256: 20e1697f90bc5c3f227a398de43fd67da342984b774125f6b401caee2acb2557

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.src.rpm

SHA-256: c040318b5ea10c02b7d58466f66e0de6657508c734bbcf0a46be4c0d89f7f334

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.src.rpm

SHA-256: f019fb15a30b4860e17dfc5abc5b90f050599e28b3870c4da85d4195fb725ff1

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.src.rpm

SHA-256: ab8369cae2c22e021828d2167b83a0d1a57e83a88ce7bc7d7e8286950122b6a6

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.src.rpm

SHA-256: bd5225aad84298aca76ef9c77d57a5d20c1fcbec9a92f7d5dc047f1579a44925

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.src.rpm

SHA-256: df754a5355cb415da363e52888a81435e0c8dce850ed1bb7ec6eea363916a473

ppc64le

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.ppc64le.rpm

SHA-256: f8a6f68221ec4ec4292e44019b8a5cdd7f7d9900abaa1a20ab231d935adcaae1

kpatch-patch-4_18_0-372_32_1-debuginfo-1-6.el8_6.ppc64le.rpm

SHA-256: ff343295f411c5eaf8e45739d8cc8d2bac5fbbe6ad1578e131a6fdd264f2081d

kpatch-patch-4_18_0-372_32_1-debugsource-1-6.el8_6.ppc64le.rpm

SHA-256: df14479d37379f3b0eb6f39c24d5a529277862c88cc1b0d12dec70a099891c7b

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.ppc64le.rpm

SHA-256: 3df485555e574223a69e5291030fb7538fc3375119e56852213b79e721d2e094

kpatch-patch-4_18_0-372_36_1-debuginfo-1-5.el8_6.ppc64le.rpm

SHA-256: 2880ed6cfc3f450b7a5d390e210f95fe6150a3a1464ff34d2b1b1f0dfcfb13d3

kpatch-patch-4_18_0-372_36_1-debugsource-1-5.el8_6.ppc64le.rpm

SHA-256: 65954c9df005d42bfab3f2d4bcf587b89a3883d81f7cecb4655c0a3cc3a9f7d9

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.ppc64le.rpm

SHA-256: 281ca591d96a537067ee5d883f69c78e59f5c9f7ac561a9773dc07f31c85b86c

kpatch-patch-4_18_0-372_40_1-debuginfo-1-5.el8_6.ppc64le.rpm

SHA-256: 2985268d22069a25a70d672c6d24d3446719ee2e8432b80bfa61400348a29517

kpatch-patch-4_18_0-372_40_1-debugsource-1-5.el8_6.ppc64le.rpm

SHA-256: e82b46bbd18e904bec272c067d3a45d545f5836f3e54cf22eff9b0ea0c368621

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.ppc64le.rpm

SHA-256: be9d2880d00b5b13a8ed891ec5015c14dd2ff7ea4da61b9342d41145ae1b5c51

kpatch-patch-4_18_0-372_41_1-debuginfo-1-4.el8_6.ppc64le.rpm

SHA-256: 2f3124eb907b27777b7bad0148f5460d0a33468468cda26ecb0ac7a7d0686fa3

kpatch-patch-4_18_0-372_41_1-debugsource-1-4.el8_6.ppc64le.rpm

SHA-256: 3e2bca8a36c85319e1b737795b3d08d83bee8bc03cac614befebd09236f11235

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.ppc64le.rpm

SHA-256: 0c302d59fc9922e15f580a8825095ed9051876a9accc8b5e0f03c3a772cadd29

kpatch-patch-4_18_0-372_46_1-debuginfo-1-2.el8_6.ppc64le.rpm

SHA-256: c47fd60df6dcea03941e2a45c4463471c8c54ac579601785adf2e1140121ed66

kpatch-patch-4_18_0-372_46_1-debugsource-1-2.el8_6.ppc64le.rpm

SHA-256: 77ca324e4601cf18d57aa13f4365ec20ac97e6f1090926b507efc5ed89183522

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.ppc64le.rpm

SHA-256: ae44d95e08da03b3c7f058809ff7396ad8a94be8249bff1a661429900dfdd18f

kpatch-patch-4_18_0-372_51_1-debuginfo-1-1.el8_6.ppc64le.rpm

SHA-256: 65e1c43ef65c4138028b95233c0a4ca4ed0489029b0d02374b98209ebb34676c

kpatch-patch-4_18_0-372_51_1-debugsource-1-1.el8_6.ppc64le.rpm

SHA-256: 87e4cdc38688841cf80b66f9dba12eaa125a0516ebb1eba5d98a11ca545e2747

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.src.rpm

SHA-256: 20e1697f90bc5c3f227a398de43fd67da342984b774125f6b401caee2acb2557

Download

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.src.rpm

SHA-256: c040318b5ea10c02b7d58466f66e0de6657508c734bbcf0a46be4c0d89f7f334

Download

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.src.rpm

SHA-256: f019fb15a30b4860e17dfc5abc5b90f050599e28b3870c4da85d4195fb725ff1

Download

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.src.rpm

SHA-256: ab8369cae2c22e021828d2167b83a0d1a57e83a88ce7bc7d7e8286950122b6a6

Download

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.src.rpm

SHA-256: bd5225aad84298aca76ef9c77d57a5d20c1fcbec9a92f7d5dc047f1579a44925

Download

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.src.rpm

SHA-256: df754a5355cb415da363e52888a81435e0c8dce850ed1bb7ec6eea363916a473

Download

x86_64

kpatch-patch-4_18_0-372_32_1-1-6.el8_6.x86_64.rpm

SHA-256: 5beba7d900ee3f40d78cf8abdd318cda496a77554f9f93beda22c4c4d0ba7be4

Download

kpatch-patch-4_18_0-372_32_1-debuginfo-1-6.el8_6.x86_64.rpm

SHA-256: c8123862d883b287126f06359419e09c3d6312a3734828c16687247b7c27853f

Download

kpatch-patch-4_18_0-372_32_1-debugsource-1-6.el8_6.x86_64.rpm

SHA-256: 664723072b81dccfabff7cfc531ca753544aa0ee4f29af909d1a9bc85d417062

Download

kpatch-patch-4_18_0-372_36_1-1-5.el8_6.x86_64.rpm

SHA-256: 2a2378c6b925fd5999b54df14d3a7dc8ebbac3a5784127b35e36bcd8ef9dc47f

Download

kpatch-patch-4_18_0-372_36_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: c4bca3fd1d69044210278affae1db8e4864a04b47ee12b29008146d903697415

Download

kpatch-patch-4_18_0-372_36_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: 14d05edd571c35888cf264fbd15d37d8f5c21086efdee51951e6c123462672f3

Download

kpatch-patch-4_18_0-372_40_1-1-5.el8_6.x86_64.rpm

SHA-256: 8df4afce3d1b8682fa68a5dfc51d8518e518e2c1f34bf8b995bb76bd0188ac21

Download

kpatch-patch-4_18_0-372_40_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: bd3b564e9ff43286e34aacd85e155438d4ac8f5617b162142bebaef8adca4d63

Download

kpatch-patch-4_18_0-372_40_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: d5550392ce07516c3991638dd9fd40768d93847e6d529eaf66a09d750e38c9d9

Download

kpatch-patch-4_18_0-372_41_1-1-4.el8_6.x86_64.rpm

SHA-256: 5e5adde9e15a37852bddc0c13d34ef3452201db21496ddd28af6c81e9bd3faa2

Download

kpatch-patch-4_18_0-372_41_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: 33be57ca85f5ba133d0bf498809f42d9d44773302e04fa90fd5a83ca9f103ea8

Download

kpatch-patch-4_18_0-372_41_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: 530ed37151a5a3a1605b99eb19943d37ed352222d80236b2246befbd9cc6fac4

Download

kpatch-patch-4_18_0-372_46_1-1-2.el8_6.x86_64.rpm

SHA-256: 9c4e46f9d27d72c4bb968034a4f8328ea55448db1d9cda1643a29ad15b36afc3

Download

kpatch-patch-4_18_0-372_46_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: b1f5362ee71d36e97224851659994162605f359bc534aca8ecf86500063cda34

Download

kpatch-patch-4_18_0-372_46_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: 571189aa1d4fdc98989cab46e946c08d44f2379ae84283efef4f6261def4b35a

Download

kpatch-patch-4_18_0-372_51_1-1-1.el8_6.x86_64.rpm

SHA-256: dc88b86f8a67a4766c6f6b99de5a9e5cdedbe5434c244f3bbed529a36ed9c0bd

Download

kpatch-patch-4_18_0-372_51_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: d01571a3b68cd3bb634b27330c47c50fc641cbe493d4e54bb2a579835952f3ff

Download

kpatch-patch-4_18_0-372_51_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: 92580b75da6a10d8aa9e47c115a5b70ef66ef2b3908ba8f03b96565d324c85f2

Download

Related news

RHSA-2023:4125: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local ...

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

Red Hat Security Advisory 2023-3491-01

Red Hat Security Advisory 2023-3491-01 - An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-3470-01

Red Hat Security Advisory 2023-3470-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-3356-01

Red Hat Security Advisory 2023-3356-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

RHSA-2023:3190: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-1390: A remote denial of service vulnerab...

RHSA-2023:2951: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user to c...

RHSA-2023:2148: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user t...

Red Hat Security Advisory 2023-1841-01

Red Hat Security Advisory 2023-1841-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

RHSA-2023:1841: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.

RHSA-2023:1556: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue. * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context...

Kernel Live Patch Security Notice LNS-0093-1

Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.

Ubuntu Security Notice USN-5941-1

Ubuntu Security Notice 5941-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5938-1

Ubuntu Security Notice 5938-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5935-1

Ubuntu Security Notice 5935-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5929-1

Ubuntu Security Notice 5929-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5925-1

Ubuntu Security Notice 5925-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the Kernel Connection Multiplexor socket implementation in the Linux kernel when releasing sockets in certain situations. A local attacker could use this to cause a denial of service.

CVE-2023-0461

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c