Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:4888: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-42896: A use-after-free flaw was found in the Linux kernel’s implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via Bluetooth if within proximity of the victim.
  • CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privilege escalation.
  • CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system.
  • CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets with a total size of 252 bytes, which results in an out-of-bounds write when the third packet enters fl_set_geneve_opt, potentially leading to a denial of service or privilege escalation.
Red Hat Security Data
#vulnerability#linux#red_hat#dos#perl#rpm#sap

概述

Important: kpatch-patch security update

类型/严重性

Security Advisory: Important

Red Hat Insights 补丁分析

标题

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

描述

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
  • kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829)
  • kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (CVE-2023-3390)
  • kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

受影响的产品

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

修复

  • BZ - 2147364 - CVE-2022-42896 kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
  • BZ - 2188470 - CVE-2023-1829 kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter
  • BZ - 2213260 - CVE-2023-3390 kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests
  • BZ - 2215768 - CVE-2023-35788 kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()

CVE

  • CVE-2022-42896
  • CVE-2023-1829
  • CVE-2023-3390
  • CVE-2023-35788

参考

  • https://access.redhat.com/security/updates/classification/#important

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.src.rpm

SHA-256: 712f14e221a04ab60233c56179d137734aa5d9cbf79152695ffad0b847974390

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.src.rpm

SHA-256: 7068263cbb2a557cc4f53a0844ef4e2751d779f53dab2a9bae1ba9aef15f5344

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.src.rpm

SHA-256: 8987edbfbfc05457e5a5b1575e7d675005a92254ff71da3ec665792be7e5df98

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.src.rpm

SHA-256: 79c970ceac15515ecee5c8df921b9b4f605630f77983453512ed2193dd650345

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.src.rpm

SHA-256: 2fc82201ff887bbaff678b9319c76bd3e9b1f4850c35b2cd1c6e2b1ff994120d

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.src.rpm

SHA-256: d194c93322f00ab1597ce6682ad6a9084f3cdf643630b268eb363d30a1425b73

x86_64

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.x86_64.rpm

SHA-256: b44b560b0be6f1c7e9a63f693db986f7b1eb037be549ccdef799cccc64a4193c

kpatch-patch-4_18_0-372_41_1-debuginfo-1-7.el8_6.x86_64.rpm

SHA-256: 8a42f3f0ebd75043f38efe675fe4e2b25fdbe479c608b3808adba1e729d0019e

kpatch-patch-4_18_0-372_41_1-debugsource-1-7.el8_6.x86_64.rpm

SHA-256: 467eecf02b98d4bab6603466faadf50a554f25551214451a16be6b402b035a1b

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.x86_64.rpm

SHA-256: 93629892274dfdf2f98427facf0810a80d9a679d9a235fc6a7851a20d455af38

kpatch-patch-4_18_0-372_46_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: 3c31cb027699fef0e473357557ca058dc47d8883a41016ea22c79abec1b7e07d

kpatch-patch-4_18_0-372_46_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: 8a4be8c91f04b834baf6b0759c5cb6fb66159d5f1400d39650ba0b1ea31aeb34

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.x86_64.rpm

SHA-256: a0603ed45459c907b94534e84f6235484401406a287a9c41eee02db2d51e1039

kpatch-patch-4_18_0-372_51_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: dfb202a363a308a69a844c44296d8865cc7399509b1ee714f9e2b3240bfff6df

kpatch-patch-4_18_0-372_51_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: d608b89af44b08eb6b699047278a02b17ad2c270f980a0c32cdaa0d66407d849

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.x86_64.rpm

SHA-256: eac9a7de50ff4450672df3e90282c9ab2e708bee03126baf5d545bdb935ac775

kpatch-patch-4_18_0-372_52_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: de58e4e65ce70dc0e327ca3c514c9f75dca2cee8f6761e60f7f4258f1387af6c

kpatch-patch-4_18_0-372_52_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: 16e5d5adfb6e5ec69f6ce0dd22d7a3631cb07bb4f1388666a4186282dd286188

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.x86_64.rpm

SHA-256: 9181146f4fa13db8d74c952ece5201e0398ded8222ff20d27e008a03e00ba513

kpatch-patch-4_18_0-372_57_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: bf8e9f1f417c4428144f5d14e2040f3e632905b5ee76daf48f62c88ba84a7cac

kpatch-patch-4_18_0-372_57_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: f8b1bf07f8e9518856ec6133073164a0fe974a15883fa9cb1c6946cbb8a088ab

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.x86_64.rpm

SHA-256: b6f4c9c962e9ebbcd5c1e87c281e590f2beb34ee8aad61a18cfb88edd03d2634

kpatch-patch-4_18_0-372_64_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 0834f9219b38e6d5166605a0653816552092b7ee026f72b266f105146322935f

kpatch-patch-4_18_0-372_64_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: ac5fb53fe6e31c5d9c0d9b528cf800e29bb19d5f1e13df4b0905cf8ef9fa6d42

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.src.rpm

SHA-256: 712f14e221a04ab60233c56179d137734aa5d9cbf79152695ffad0b847974390

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.src.rpm

SHA-256: 7068263cbb2a557cc4f53a0844ef4e2751d779f53dab2a9bae1ba9aef15f5344

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.src.rpm

SHA-256: 8987edbfbfc05457e5a5b1575e7d675005a92254ff71da3ec665792be7e5df98

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.src.rpm

SHA-256: 79c970ceac15515ecee5c8df921b9b4f605630f77983453512ed2193dd650345

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.src.rpm

SHA-256: 2fc82201ff887bbaff678b9319c76bd3e9b1f4850c35b2cd1c6e2b1ff994120d

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.src.rpm

SHA-256: d194c93322f00ab1597ce6682ad6a9084f3cdf643630b268eb363d30a1425b73

x86_64

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.x86_64.rpm

SHA-256: b44b560b0be6f1c7e9a63f693db986f7b1eb037be549ccdef799cccc64a4193c

kpatch-patch-4_18_0-372_41_1-debuginfo-1-7.el8_6.x86_64.rpm

SHA-256: 8a42f3f0ebd75043f38efe675fe4e2b25fdbe479c608b3808adba1e729d0019e

kpatch-patch-4_18_0-372_41_1-debugsource-1-7.el8_6.x86_64.rpm

SHA-256: 467eecf02b98d4bab6603466faadf50a554f25551214451a16be6b402b035a1b

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.x86_64.rpm

SHA-256: 93629892274dfdf2f98427facf0810a80d9a679d9a235fc6a7851a20d455af38

kpatch-patch-4_18_0-372_46_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: 3c31cb027699fef0e473357557ca058dc47d8883a41016ea22c79abec1b7e07d

kpatch-patch-4_18_0-372_46_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: 8a4be8c91f04b834baf6b0759c5cb6fb66159d5f1400d39650ba0b1ea31aeb34

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.x86_64.rpm

SHA-256: a0603ed45459c907b94534e84f6235484401406a287a9c41eee02db2d51e1039

kpatch-patch-4_18_0-372_51_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: dfb202a363a308a69a844c44296d8865cc7399509b1ee714f9e2b3240bfff6df

kpatch-patch-4_18_0-372_51_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: d608b89af44b08eb6b699047278a02b17ad2c270f980a0c32cdaa0d66407d849

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.x86_64.rpm

SHA-256: eac9a7de50ff4450672df3e90282c9ab2e708bee03126baf5d545bdb935ac775

kpatch-patch-4_18_0-372_52_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: de58e4e65ce70dc0e327ca3c514c9f75dca2cee8f6761e60f7f4258f1387af6c

kpatch-patch-4_18_0-372_52_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: 16e5d5adfb6e5ec69f6ce0dd22d7a3631cb07bb4f1388666a4186282dd286188

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.x86_64.rpm

SHA-256: 9181146f4fa13db8d74c952ece5201e0398ded8222ff20d27e008a03e00ba513

kpatch-patch-4_18_0-372_57_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: bf8e9f1f417c4428144f5d14e2040f3e632905b5ee76daf48f62c88ba84a7cac

kpatch-patch-4_18_0-372_57_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: f8b1bf07f8e9518856ec6133073164a0fe974a15883fa9cb1c6946cbb8a088ab

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.x86_64.rpm

SHA-256: b6f4c9c962e9ebbcd5c1e87c281e590f2beb34ee8aad61a18cfb88edd03d2634

kpatch-patch-4_18_0-372_64_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 0834f9219b38e6d5166605a0653816552092b7ee026f72b266f105146322935f

kpatch-patch-4_18_0-372_64_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: ac5fb53fe6e31c5d9c0d9b528cf800e29bb19d5f1e13df4b0905cf8ef9fa6d42

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.src.rpm

SHA-256: 712f14e221a04ab60233c56179d137734aa5d9cbf79152695ffad0b847974390

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.src.rpm

SHA-256: 7068263cbb2a557cc4f53a0844ef4e2751d779f53dab2a9bae1ba9aef15f5344

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.src.rpm

SHA-256: 8987edbfbfc05457e5a5b1575e7d675005a92254ff71da3ec665792be7e5df98

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.src.rpm

SHA-256: 79c970ceac15515ecee5c8df921b9b4f605630f77983453512ed2193dd650345

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.src.rpm

SHA-256: 2fc82201ff887bbaff678b9319c76bd3e9b1f4850c35b2cd1c6e2b1ff994120d

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.src.rpm

SHA-256: d194c93322f00ab1597ce6682ad6a9084f3cdf643630b268eb363d30a1425b73

ppc64le

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.ppc64le.rpm

SHA-256: 6630b90538905bfe4b53b25eb0efe24b7cdd48ed2441d103c5d98ec9388a55bc

kpatch-patch-4_18_0-372_41_1-debuginfo-1-7.el8_6.ppc64le.rpm

SHA-256: eaf4afa799b7a46df59e2938090a6c0f2455e54a5ac1af13cbc2e1fceaeeb2cb

kpatch-patch-4_18_0-372_41_1-debugsource-1-7.el8_6.ppc64le.rpm

SHA-256: 4d48e814bed8f7ca729adffb8996b326ffdb3c4d851d0c0b66aa871846b0b184

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.ppc64le.rpm

SHA-256: 170cf975d761d7db7335e5df85af2df628c4d5a631a4c62c470f2a246a06bc55

kpatch-patch-4_18_0-372_46_1-debuginfo-1-5.el8_6.ppc64le.rpm

SHA-256: 7dc045a6928ffdd59ec1a50e6303bb0aed4df726e549d3ac05186ac59703240c

kpatch-patch-4_18_0-372_46_1-debugsource-1-5.el8_6.ppc64le.rpm

SHA-256: f07e0f958577c4e4ac7f5c92889fa11f305433a05b0bfeefeb645e7df48582bf

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.ppc64le.rpm

SHA-256: 7bee648af2f460d475d353ec7b6511052973bad5bc9d0dd3279a3021d445a7ed

kpatch-patch-4_18_0-372_51_1-debuginfo-1-4.el8_6.ppc64le.rpm

SHA-256: 3acbade3e14d6a665ccb645242e0e8c3e64645d1a983a59ebbce85226af7683d

kpatch-patch-4_18_0-372_51_1-debugsource-1-4.el8_6.ppc64le.rpm

SHA-256: 3e5b92e90096f2bcbcfd53d4d330522818f07587f3e93efcbda0edc6d6501ae8

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.ppc64le.rpm

SHA-256: da904846d264e2b11253337927aa04db6f6c825a931946183628e6f76b6e435c

kpatch-patch-4_18_0-372_52_1-debuginfo-1-3.el8_6.ppc64le.rpm

SHA-256: 742710b03a77a16fb5e06e1bae008b162537174963c04183866411b3f45a0169

kpatch-patch-4_18_0-372_52_1-debugsource-1-3.el8_6.ppc64le.rpm

SHA-256: 675ff6002254caa18fb0655a68a4f9a7ce17f531abecf2699507c2eb28361bfc

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.ppc64le.rpm

SHA-256: ea419314ff048b04c6f442233c3ac4325246c66b3de9a834ac839aca9ec4e718

kpatch-patch-4_18_0-372_57_1-debuginfo-1-2.el8_6.ppc64le.rpm

SHA-256: 0e20eb256bdb88ebfeb16297e0f3175da03ef3f5ace78b7c00d229a3ffcc1c6e

kpatch-patch-4_18_0-372_57_1-debugsource-1-2.el8_6.ppc64le.rpm

SHA-256: 549148108c782d2cbf756f55a832dc01e06d0469a9ccc000443f1f17327fed05

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.ppc64le.rpm

SHA-256: 901d16474e92ab885e013592a01c6085652ba3062d010abd6993bf547cda771a

kpatch-patch-4_18_0-372_64_1-debuginfo-1-1.el8_6.ppc64le.rpm

SHA-256: 7835c8c03cc5d51bc1141e1b80c666ab33bbd572ef877ab391f4bcebbbeffa53

kpatch-patch-4_18_0-372_64_1-debugsource-1-1.el8_6.ppc64le.rpm

SHA-256: ec3910be2d5c3138046178f8bd5f0f724f27dc66148803957549ae4ccbe7bb6e

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.src.rpm

SHA-256: 712f14e221a04ab60233c56179d137734aa5d9cbf79152695ffad0b847974390

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.src.rpm

SHA-256: 7068263cbb2a557cc4f53a0844ef4e2751d779f53dab2a9bae1ba9aef15f5344

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.src.rpm

SHA-256: 8987edbfbfc05457e5a5b1575e7d675005a92254ff71da3ec665792be7e5df98

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.src.rpm

SHA-256: 79c970ceac15515ecee5c8df921b9b4f605630f77983453512ed2193dd650345

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.src.rpm

SHA-256: 2fc82201ff887bbaff678b9319c76bd3e9b1f4850c35b2cd1c6e2b1ff994120d

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.src.rpm

SHA-256: d194c93322f00ab1597ce6682ad6a9084f3cdf643630b268eb363d30a1425b73

x86_64

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.x86_64.rpm

SHA-256: b44b560b0be6f1c7e9a63f693db986f7b1eb037be549ccdef799cccc64a4193c

kpatch-patch-4_18_0-372_41_1-debuginfo-1-7.el8_6.x86_64.rpm

SHA-256: 8a42f3f0ebd75043f38efe675fe4e2b25fdbe479c608b3808adba1e729d0019e

kpatch-patch-4_18_0-372_41_1-debugsource-1-7.el8_6.x86_64.rpm

SHA-256: 467eecf02b98d4bab6603466faadf50a554f25551214451a16be6b402b035a1b

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.x86_64.rpm

SHA-256: 93629892274dfdf2f98427facf0810a80d9a679d9a235fc6a7851a20d455af38

kpatch-patch-4_18_0-372_46_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: 3c31cb027699fef0e473357557ca058dc47d8883a41016ea22c79abec1b7e07d

kpatch-patch-4_18_0-372_46_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: 8a4be8c91f04b834baf6b0759c5cb6fb66159d5f1400d39650ba0b1ea31aeb34

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.x86_64.rpm

SHA-256: a0603ed45459c907b94534e84f6235484401406a287a9c41eee02db2d51e1039

kpatch-patch-4_18_0-372_51_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: dfb202a363a308a69a844c44296d8865cc7399509b1ee714f9e2b3240bfff6df

kpatch-patch-4_18_0-372_51_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: d608b89af44b08eb6b699047278a02b17ad2c270f980a0c32cdaa0d66407d849

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.x86_64.rpm

SHA-256: eac9a7de50ff4450672df3e90282c9ab2e708bee03126baf5d545bdb935ac775

kpatch-patch-4_18_0-372_52_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: de58e4e65ce70dc0e327ca3c514c9f75dca2cee8f6761e60f7f4258f1387af6c

kpatch-patch-4_18_0-372_52_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: 16e5d5adfb6e5ec69f6ce0dd22d7a3631cb07bb4f1388666a4186282dd286188

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.x86_64.rpm

SHA-256: 9181146f4fa13db8d74c952ece5201e0398ded8222ff20d27e008a03e00ba513

kpatch-patch-4_18_0-372_57_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: bf8e9f1f417c4428144f5d14e2040f3e632905b5ee76daf48f62c88ba84a7cac

kpatch-patch-4_18_0-372_57_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: f8b1bf07f8e9518856ec6133073164a0fe974a15883fa9cb1c6946cbb8a088ab

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.x86_64.rpm

SHA-256: b6f4c9c962e9ebbcd5c1e87c281e590f2beb34ee8aad61a18cfb88edd03d2634

kpatch-patch-4_18_0-372_64_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 0834f9219b38e6d5166605a0653816552092b7ee026f72b266f105146322935f

kpatch-patch-4_18_0-372_64_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: ac5fb53fe6e31c5d9c0d9b528cf800e29bb19d5f1e13df4b0905cf8ef9fa6d42

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.src.rpm

SHA-256: 712f14e221a04ab60233c56179d137734aa5d9cbf79152695ffad0b847974390

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.src.rpm

SHA-256: 7068263cbb2a557cc4f53a0844ef4e2751d779f53dab2a9bae1ba9aef15f5344

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.src.rpm

SHA-256: 8987edbfbfc05457e5a5b1575e7d675005a92254ff71da3ec665792be7e5df98

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.src.rpm

SHA-256: 79c970ceac15515ecee5c8df921b9b4f605630f77983453512ed2193dd650345

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.src.rpm

SHA-256: 2fc82201ff887bbaff678b9319c76bd3e9b1f4850c35b2cd1c6e2b1ff994120d

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.src.rpm

SHA-256: d194c93322f00ab1597ce6682ad6a9084f3cdf643630b268eb363d30a1425b73

ppc64le

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.ppc64le.rpm

SHA-256: 6630b90538905bfe4b53b25eb0efe24b7cdd48ed2441d103c5d98ec9388a55bc

kpatch-patch-4_18_0-372_41_1-debuginfo-1-7.el8_6.ppc64le.rpm

SHA-256: eaf4afa799b7a46df59e2938090a6c0f2455e54a5ac1af13cbc2e1fceaeeb2cb

kpatch-patch-4_18_0-372_41_1-debugsource-1-7.el8_6.ppc64le.rpm

SHA-256: 4d48e814bed8f7ca729adffb8996b326ffdb3c4d851d0c0b66aa871846b0b184

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.ppc64le.rpm

SHA-256: 170cf975d761d7db7335e5df85af2df628c4d5a631a4c62c470f2a246a06bc55

kpatch-patch-4_18_0-372_46_1-debuginfo-1-5.el8_6.ppc64le.rpm

SHA-256: 7dc045a6928ffdd59ec1a50e6303bb0aed4df726e549d3ac05186ac59703240c

kpatch-patch-4_18_0-372_46_1-debugsource-1-5.el8_6.ppc64le.rpm

SHA-256: f07e0f958577c4e4ac7f5c92889fa11f305433a05b0bfeefeb645e7df48582bf

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.ppc64le.rpm

SHA-256: 7bee648af2f460d475d353ec7b6511052973bad5bc9d0dd3279a3021d445a7ed

kpatch-patch-4_18_0-372_51_1-debuginfo-1-4.el8_6.ppc64le.rpm

SHA-256: 3acbade3e14d6a665ccb645242e0e8c3e64645d1a983a59ebbce85226af7683d

kpatch-patch-4_18_0-372_51_1-debugsource-1-4.el8_6.ppc64le.rpm

SHA-256: 3e5b92e90096f2bcbcfd53d4d330522818f07587f3e93efcbda0edc6d6501ae8

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.ppc64le.rpm

SHA-256: da904846d264e2b11253337927aa04db6f6c825a931946183628e6f76b6e435c

kpatch-patch-4_18_0-372_52_1-debuginfo-1-3.el8_6.ppc64le.rpm

SHA-256: 742710b03a77a16fb5e06e1bae008b162537174963c04183866411b3f45a0169

kpatch-patch-4_18_0-372_52_1-debugsource-1-3.el8_6.ppc64le.rpm

SHA-256: 675ff6002254caa18fb0655a68a4f9a7ce17f531abecf2699507c2eb28361bfc

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.ppc64le.rpm

SHA-256: ea419314ff048b04c6f442233c3ac4325246c66b3de9a834ac839aca9ec4e718

kpatch-patch-4_18_0-372_57_1-debuginfo-1-2.el8_6.ppc64le.rpm

SHA-256: 0e20eb256bdb88ebfeb16297e0f3175da03ef3f5ace78b7c00d229a3ffcc1c6e

kpatch-patch-4_18_0-372_57_1-debugsource-1-2.el8_6.ppc64le.rpm

SHA-256: 549148108c782d2cbf756f55a832dc01e06d0469a9ccc000443f1f17327fed05

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.ppc64le.rpm

SHA-256: 901d16474e92ab885e013592a01c6085652ba3062d010abd6993bf547cda771a

kpatch-patch-4_18_0-372_64_1-debuginfo-1-1.el8_6.ppc64le.rpm

SHA-256: 7835c8c03cc5d51bc1141e1b80c666ab33bbd572ef877ab391f4bcebbbeffa53

kpatch-patch-4_18_0-372_64_1-debugsource-1-1.el8_6.ppc64le.rpm

SHA-256: ec3910be2d5c3138046178f8bd5f0f724f27dc66148803957549ae4ccbe7bb6e

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.src.rpm

SHA-256: 712f14e221a04ab60233c56179d137734aa5d9cbf79152695ffad0b847974390

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.src.rpm

SHA-256: 7068263cbb2a557cc4f53a0844ef4e2751d779f53dab2a9bae1ba9aef15f5344

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.src.rpm

SHA-256: 8987edbfbfc05457e5a5b1575e7d675005a92254ff71da3ec665792be7e5df98

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.src.rpm

SHA-256: 79c970ceac15515ecee5c8df921b9b4f605630f77983453512ed2193dd650345

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.src.rpm

SHA-256: 2fc82201ff887bbaff678b9319c76bd3e9b1f4850c35b2cd1c6e2b1ff994120d

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.src.rpm

SHA-256: d194c93322f00ab1597ce6682ad6a9084f3cdf643630b268eb363d30a1425b73

x86_64

kpatch-patch-4_18_0-372_41_1-1-7.el8_6.x86_64.rpm

SHA-256: b44b560b0be6f1c7e9a63f693db986f7b1eb037be549ccdef799cccc64a4193c

kpatch-patch-4_18_0-372_41_1-debuginfo-1-7.el8_6.x86_64.rpm

SHA-256: 8a42f3f0ebd75043f38efe675fe4e2b25fdbe479c608b3808adba1e729d0019e

kpatch-patch-4_18_0-372_41_1-debugsource-1-7.el8_6.x86_64.rpm

SHA-256: 467eecf02b98d4bab6603466faadf50a554f25551214451a16be6b402b035a1b

kpatch-patch-4_18_0-372_46_1-1-5.el8_6.x86_64.rpm

SHA-256: 93629892274dfdf2f98427facf0810a80d9a679d9a235fc6a7851a20d455af38

kpatch-patch-4_18_0-372_46_1-debuginfo-1-5.el8_6.x86_64.rpm

SHA-256: 3c31cb027699fef0e473357557ca058dc47d8883a41016ea22c79abec1b7e07d

kpatch-patch-4_18_0-372_46_1-debugsource-1-5.el8_6.x86_64.rpm

SHA-256: 8a4be8c91f04b834baf6b0759c5cb6fb66159d5f1400d39650ba0b1ea31aeb34

kpatch-patch-4_18_0-372_51_1-1-4.el8_6.x86_64.rpm

SHA-256: a0603ed45459c907b94534e84f6235484401406a287a9c41eee02db2d51e1039

kpatch-patch-4_18_0-372_51_1-debuginfo-1-4.el8_6.x86_64.rpm

SHA-256: dfb202a363a308a69a844c44296d8865cc7399509b1ee714f9e2b3240bfff6df

kpatch-patch-4_18_0-372_51_1-debugsource-1-4.el8_6.x86_64.rpm

SHA-256: d608b89af44b08eb6b699047278a02b17ad2c270f980a0c32cdaa0d66407d849

kpatch-patch-4_18_0-372_52_1-1-3.el8_6.x86_64.rpm

SHA-256: eac9a7de50ff4450672df3e90282c9ab2e708bee03126baf5d545bdb935ac775

kpatch-patch-4_18_0-372_52_1-debuginfo-1-3.el8_6.x86_64.rpm

SHA-256: de58e4e65ce70dc0e327ca3c514c9f75dca2cee8f6761e60f7f4258f1387af6c

kpatch-patch-4_18_0-372_52_1-debugsource-1-3.el8_6.x86_64.rpm

SHA-256: 16e5d5adfb6e5ec69f6ce0dd22d7a3631cb07bb4f1388666a4186282dd286188

kpatch-patch-4_18_0-372_57_1-1-2.el8_6.x86_64.rpm

SHA-256: 9181146f4fa13db8d74c952ece5201e0398ded8222ff20d27e008a03e00ba513

kpatch-patch-4_18_0-372_57_1-debuginfo-1-2.el8_6.x86_64.rpm

SHA-256: bf8e9f1f417c4428144f5d14e2040f3e632905b5ee76daf48f62c88ba84a7cac

kpatch-patch-4_18_0-372_57_1-debugsource-1-2.el8_6.x86_64.rpm

SHA-256: f8b1bf07f8e9518856ec6133073164a0fe974a15883fa9cb1c6946cbb8a088ab

kpatch-patch-4_18_0-372_64_1-1-1.el8_6.x86_64.rpm

SHA-256: b6f4c9c962e9ebbcd5c1e87c281e590f2beb34ee8aad61a18cfb88edd03d2634

kpatch-patch-4_18_0-372_64_1-debuginfo-1-1.el8_6.x86_64.rpm

SHA-256: 0834f9219b38e6d5166605a0653816552092b7ee026f72b266f105146322935f

kpatch-patch-4_18_0-372_64_1-debugsource-1-1.el8_6.x86_64.rpm

SHA-256: ac5fb53fe6e31c5d9c0d9b528cf800e29bb19d5f1e13df4b0905cf8ef9fa6d42

Related news

Red Hat Security Advisory 2024-1269-03

Red Hat Security Advisory 2024-1269-03 - An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Issues addressed include null pointer, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2024-1250-03

Red Hat Security Advisory 2024-1250-03 - An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Issues addressed include memory exhaustion, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.

CVE-2023-43057: Security Bulletin: IBM QRadar SIEM contains multiple vulnerabilities

IBM QRadar SIEM 7.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 267484.

CVE-2023-22130: Oracle Critical Patch Update Advisory - October 2023

Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

Red Hat Security Advisory 2023-5604-01

Red Hat Security Advisory 2023-5604-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, out of bounds write, and use-after-free vulnerabilities.

Ubuntu Security Notice USN-6385-1

Ubuntu Security Notice 6385-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.

Red Hat Security Advisory 2023-5235-01

Red Hat Security Advisory 2023-5235-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-5244-01

Red Hat Security Advisory 2023-5244-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5255-01

Red Hat Security Advisory 2023-5255-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine- tuning for systems with extremely high determinism requirements. Issues addressed include information leakage, out of bounds write, and use-after-free vulnerabilities.

RHSA-2023:5255: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. 'Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2002: A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. * CVE-2023-3090: A flaw was found...

Red Hat Security Advisory 2023-5091-01

Red Hat Security Advisory 2023-5091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass, information leakage, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5093-01

Red Hat Security Advisory 2023-5093-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

RHSA-2023:5091: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1637: A flaw was found in the Linux kernel X86 CPU Power management when resuming CPU from suspend-to-RAM. This issue could allow a local user unauthorized access to memory from the CPU. * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can...

Kernel Live Patch Security Notice LSN-0097-1

It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Querijn Voet discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Various other vulnerabilities were also discovered and addressed.

Red Hat Security Advisory 2023-4961-01

Red Hat Security Advisory 2023-4961-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-4962-01

Red Hat Security Advisory 2023-4962-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.

RHSA-2023:4962: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can...

RHSA-2023:4967: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privileg...

RHSA-2023:4961: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which ...

Red Hat Security Advisory 2023-4888-01

Red Hat Security Advisory 2023-4888-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-4834-01

Red Hat Security Advisory 2023-4834-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

RHSA-2023:4817: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2124: An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-3090: A flaw was found in the IPVLAN netwo...

Red Hat Security Advisory 2023-4697-01

Red Hat Security Advisory 2023-4697-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.

RHSA-2023:4697: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets with a total ...

Ubuntu Security Notice USN-6285-1

Ubuntu Security Notice 6285-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

RHSA-2023:4531: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via B...

RHSA-2023:4515: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privilege esca...

RHSA-2023:4516: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch-4_18_0-147_78_1, kpatch-patch-4_18_0-147_80_1, kpatch-patch-4_18_0-147_81_1, kpatch-patch-4_18_0-147_83_1, and kpatch-patch-4_18_0-147_85_1 is now available for Red Hat Enterprise Linux 8.1. Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, w...

RHSA-2023:4380: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3090: A flaw was found in the IPVLAN network driver in the Linux kernel. This issue is caused by missing skb->cb initialization in `__ip_options_echo` and can lead to an out-of-bounds write stack overflow. This may allow a local user to cause a denial of service or potentially achieve local privilege escalation. * CVE-2023-35788: A flaw was found ...

Ubuntu Security Notice USN-6261-1

Ubuntu Security Notice 6261-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

Debian Security Advisory 5461-1

Debian Linux Security Advisory 5461-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Ubuntu Security Notice USN-6260-1

Ubuntu Security Notice 6260-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.

Ubuntu Security Notice USN-6255-1

Ubuntu Security Notice 6255-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6254-1

Ubuntu Security Notice 6254-1 - Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the do_prlimit function in the Linux kernel did not properly handle speculative execution barriers. A local attacker could use this to expose sensitive information. It was discovered that a race condition existed in the btrfs file system implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information.

Ubuntu Security Notice USN-6250-1

Ubuntu Security Notice 6250-1 - Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6246-1

Ubuntu Security Notice 6246-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-4230-01

Red Hat Security Advisory 2023-4230-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

RHSA-2023:4230: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code l...

Ubuntu Security Notice USN-6220-1

Ubuntu Security Notice 6220-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Ubuntu Security Notice USN-6212-1

Ubuntu Security Notice 6212-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Debian Security Advisory 5448-1

Debian Linux Security Advisory 5448-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

CVE-2023-3390

A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.

CVE-2023-35788: security - Linux kernel: off-by-one in fl_set_geneve_opt

An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.

Red Hat Security Advisory 2023-3462-01

Red Hat Security Advisory 2023-3462-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

RHSA-2023:3517: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could exec...

RHSA-2023:3462: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_con...

Ubuntu Security Notice USN-6072-1

Ubuntu Security Notice 6072-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. Lin Ma discovered a race condition in the io_uring subsystem in the Linux kernel, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6071-1

Ubuntu Security Notice 6071-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. Lin Ma discovered a race condition in the io_uring subsystem in the Linux kernel, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6070-1

Ubuntu Security Notice 6070-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. It was discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6069-1

Ubuntu Security Notice 6069-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed.

Ubuntu Security Notice USN-6051-1

Ubuntu Security Notice 6051-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for thisCVE, kernel support for the TCINDEX classifier has been removed. It was discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6047-1

Ubuntu Security Notice 6047-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed.

Ubuntu Security Notice USN-6045-1

Ubuntu Security Notice 6045-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. Gwnaun Jung discovered that the SFB packet scheduling implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6043-1

Ubuntu Security Notice 6043-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for thisCVE, kernel support for the TCINDEX classifier has been removed. It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges.

CVE-2023-1829: 🐧🕺

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.

Ubuntu Security Notice USN-5831-1

Ubuntu Security Notice 5831-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5830-1

Ubuntu Security Notice 5830-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5814-1

Ubuntu Security Notice 5814-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5804-1

Ubuntu Security Notice 5804-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamas Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5783-1

Ubuntu Security Notice 5783-1 - Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.