Headline
RHSA-2023:1666: Red Hat Security Advisory: kpatch-patch security update
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
- CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. In this flaw a normal privileged, local attacker may impact the system due to a locking issue in the compat path, leading to a kernel information leak problem.
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- OpenShift Dev Spaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat OpenShift Data Foundation
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2023-04-05
Updated:
2023-04-05
RHSA-2023:1666 - Security Advisory
- Overview
- Updated Packages
Synopsis
Important: kpatch-patch security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
- ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
Fixes
- BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
- BZ - 2163379 - CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2
SRPM
kpatch-patch-4_18_0-193_100_1-1-1.el8_2.src.rpm
SHA-256: a9a873b0a1f3d8a480236f1fe9087225c5c26a89b8db3fa744559b6e313e7b61
kpatch-patch-4_18_0-193_91_1-1-5.el8_2.src.rpm
SHA-256: 6c2fac50283fd173d7f6bb9473a9ff01589fd0c1f74414e82b18cf501fab2eb4
kpatch-patch-4_18_0-193_93_1-1-4.el8_2.src.rpm
SHA-256: 4fc65c50d8df3277fb0008c2c4e8b3222c316667de82eb725a05bbad2e12181c
kpatch-patch-4_18_0-193_95_1-1-3.el8_2.src.rpm
SHA-256: 56973145f36e63d9eba9e0703ed7a34c9156cebc17c954a33d6becd0c6b1d063
kpatch-patch-4_18_0-193_98_1-1-2.el8_2.src.rpm
SHA-256: 10cb802c8623130d87385f9010afc064a9e0ba7ea7613905c0ea628649f7624a
ppc64le
kpatch-patch-4_18_0-193_100_1-1-1.el8_2.ppc64le.rpm
SHA-256: c4337c1207960d64c4ad899c41a2c35e1e6e90a115a27af39dafaa8c59b4c194
kpatch-patch-4_18_0-193_100_1-debuginfo-1-1.el8_2.ppc64le.rpm
SHA-256: c416f3ad89f36299286d010aaa908c40191fa9f325ac51dcff8b58e82d04707f
kpatch-patch-4_18_0-193_100_1-debugsource-1-1.el8_2.ppc64le.rpm
SHA-256: caaa48a57d9635bd34dec9f053561ef0b8927e3ee32e177a8d9607e117ff2c3a
kpatch-patch-4_18_0-193_91_1-1-5.el8_2.ppc64le.rpm
SHA-256: 95afdb31f54c1d48b865394ec8a73de98bb58066d8405443938acd26439bd125
kpatch-patch-4_18_0-193_91_1-debuginfo-1-5.el8_2.ppc64le.rpm
SHA-256: 1e4c4464462a5b388075d8479230a9fcc8bbe099e41e863948051f9d2f600bfe
kpatch-patch-4_18_0-193_91_1-debugsource-1-5.el8_2.ppc64le.rpm
SHA-256: 37f04af4202c0fc74dcc4b76dc8d1e8822c8a79736b9a8ecdb6bcaa69330352c
kpatch-patch-4_18_0-193_93_1-1-4.el8_2.ppc64le.rpm
SHA-256: fc6c08a88d20b0d9b1f8010ae5ecdb40dae06599337a71a07bd3c65a3a1deb72
kpatch-patch-4_18_0-193_93_1-debuginfo-1-4.el8_2.ppc64le.rpm
SHA-256: f4e3d5c9010955a48d6c78c5ebb7806f5a45bde58ab4d6a363947a312fca2e84
kpatch-patch-4_18_0-193_93_1-debugsource-1-4.el8_2.ppc64le.rpm
SHA-256: ebb95d42bc8461bebf375292265e0f8fd0dd1230b1474add0558f4ce208b973b
kpatch-patch-4_18_0-193_95_1-1-3.el8_2.ppc64le.rpm
SHA-256: 4a6fa823c4e7991bbdb0935d59b75b2ca2f5f58ef9e090871795a7f2c0ba1974
kpatch-patch-4_18_0-193_95_1-debuginfo-1-3.el8_2.ppc64le.rpm
SHA-256: 5ef8e206d6f5725bd41d5947330d32d303b77121933744fd39bf0ae1ea531fc8
kpatch-patch-4_18_0-193_95_1-debugsource-1-3.el8_2.ppc64le.rpm
SHA-256: f4ad1b44b24a7b36be186bc469ea0ee0e17828295bc3cd4ed8150d2ec5ef6c7d
kpatch-patch-4_18_0-193_98_1-1-2.el8_2.ppc64le.rpm
SHA-256: 38c5370d7182fff7e01fba05669e7aa60a20288579f450e901b6d196fd9b4732
kpatch-patch-4_18_0-193_98_1-debuginfo-1-2.el8_2.ppc64le.rpm
SHA-256: fedb29ab64eae87583a66d31177812919f2aef07895947a0d8305f070860d25f
kpatch-patch-4_18_0-193_98_1-debugsource-1-2.el8_2.ppc64le.rpm
SHA-256: 006f931bd288a805d94614b4b55ed06ecfa974f7f80c9879f1b1ae3e4079112c
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2
SRPM
kpatch-patch-4_18_0-193_100_1-1-1.el8_2.src.rpm
SHA-256: a9a873b0a1f3d8a480236f1fe9087225c5c26a89b8db3fa744559b6e313e7b61
kpatch-patch-4_18_0-193_91_1-1-5.el8_2.src.rpm
SHA-256: 6c2fac50283fd173d7f6bb9473a9ff01589fd0c1f74414e82b18cf501fab2eb4
kpatch-patch-4_18_0-193_93_1-1-4.el8_2.src.rpm
SHA-256: 4fc65c50d8df3277fb0008c2c4e8b3222c316667de82eb725a05bbad2e12181c
kpatch-patch-4_18_0-193_95_1-1-3.el8_2.src.rpm
SHA-256: 56973145f36e63d9eba9e0703ed7a34c9156cebc17c954a33d6becd0c6b1d063
kpatch-patch-4_18_0-193_98_1-1-2.el8_2.src.rpm
SHA-256: 10cb802c8623130d87385f9010afc064a9e0ba7ea7613905c0ea628649f7624a
x86_64
kpatch-patch-4_18_0-193_100_1-1-1.el8_2.x86_64.rpm
SHA-256: 68b9e909427cfad82e7dd9a635462942db5497ca12ae75f005b3619c99fa9b51
kpatch-patch-4_18_0-193_100_1-debuginfo-1-1.el8_2.x86_64.rpm
SHA-256: cad55ef4f8495521dc5edeba6ed9c887cf550fb26e7a3e529440e48d16d319c5
kpatch-patch-4_18_0-193_100_1-debugsource-1-1.el8_2.x86_64.rpm
SHA-256: 195cef3398fa586f9885ee9e31b5c5924c9f47a13d8fe91579c3d5a91faa05c5
kpatch-patch-4_18_0-193_91_1-1-5.el8_2.x86_64.rpm
SHA-256: 47c2d120abbad834ffe6d159885e9892c7034c8a37d71e1f9f20625e6dd99a0e
kpatch-patch-4_18_0-193_91_1-debuginfo-1-5.el8_2.x86_64.rpm
SHA-256: f2d571f609a430f6d27afc2c4d238ff640b249e6084e62bb45e626310a69e97d
kpatch-patch-4_18_0-193_91_1-debugsource-1-5.el8_2.x86_64.rpm
SHA-256: 28eda6e3ab42f06d9652362282001ffb042ef1681ab55aacd8b4058891b07288
kpatch-patch-4_18_0-193_93_1-1-4.el8_2.x86_64.rpm
SHA-256: 17f8906e6b8831b789eef6d2f0c53cec53c15036040ea8a0b5407bdacdea2708
kpatch-patch-4_18_0-193_93_1-debuginfo-1-4.el8_2.x86_64.rpm
SHA-256: 9c6e3c67a10f965ba152a05d64c17314a3832c56d10fa23b85767d2b70b8a66e
kpatch-patch-4_18_0-193_93_1-debugsource-1-4.el8_2.x86_64.rpm
SHA-256: d4a1f874582ed482135d27b23a6e18e0bd1bf6c4ad5518f663b7a7f5f254ea19
kpatch-patch-4_18_0-193_95_1-1-3.el8_2.x86_64.rpm
SHA-256: e9cf1f95d5853247ff9949588afbd99c78f5928f762613543d5a0693b557a566
kpatch-patch-4_18_0-193_95_1-debuginfo-1-3.el8_2.x86_64.rpm
SHA-256: c69c51c4eb878cf0c922c307fbb694ed90efb8492511e8da99b9e2f1f6cf4118
kpatch-patch-4_18_0-193_95_1-debugsource-1-3.el8_2.x86_64.rpm
SHA-256: 4304e637a5045f4a9ca53d9b56b833793cf02215b40045c1d39aebdbe2b55bde
kpatch-patch-4_18_0-193_98_1-1-2.el8_2.x86_64.rpm
SHA-256: 7cc69ec375deaa89338e930ebc51e6274727ae3e705d22fd1124d8b4af2d203a
kpatch-patch-4_18_0-193_98_1-debuginfo-1-2.el8_2.x86_64.rpm
SHA-256: 7fbe09713cb1e0b893b81fcde46b5bb759ae07dd9e30a3b11652985c386ae198
kpatch-patch-4_18_0-193_98_1-debugsource-1-2.el8_2.x86_64.rpm
SHA-256: 5275b5c6c66f6c994b47a87a7eb5c20b4658fc227d99eac4d058d2514a2fbf80
The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.
Related news
Red Hat Security Advisory 2023-4150-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-4021-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include double free and use-after-free vulnerabilities.
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or poten...
Plus: Microsoft patches two zero-day flaws, Google’s Android and Chrome get some much-needed updates, and more.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user t...
Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Logging Subsystem 5.6.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-27539: A denial of service vulnerability was found in rubygem-rack in how it parses headers. A carefully crafted input can cause header parsing to take an unexpected amount of time, possibly resulting in a denial of service. * CVE-2023-28120: A Cross-Site-Scripting vulnerability was found in rubygem ActiveSupport. If the new bytesplice method is called on a SafeBuffer with untrus...
Red Hat Security Advisory 2023-1677-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow and integer overflow vulnerabilities.
Ubuntu Security Notice 6009-1 - It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2023-1660-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-1556-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
Ubuntu Security Notice 5991-1 - It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5981-1 - It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5979-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that a race condition existed in the Xen network backend driver in the Linux kernel when handling dropped packets in certain circumstances. An attacker could use this to cause a denial of service.
Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4744: A double-free flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-0266: A use-after-free flaw was found in the...
Red Hat Security Advisory 2023-1221-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and use-after-free vulnerabilities.
Ubuntu Security Notice 5940-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5927-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5915-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2023-1008-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP blue...
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e
Ubuntu Security Notice 5789-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5774-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5754-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5756-2 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5756-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.
A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.