Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:1251: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
  • CVE-2022-4378: A stack overflow flaw was found in the Linux kernel’s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Red Hat Security Data
#vulnerability#linux#red_hat#rpm#sap

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
  • kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
  • BZ - 2152548 - CVE-2022-4378 kernel: stack overflow in do_proc_dointvec and proc_skip_spaces

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.src.rpm

SHA-256: f0493f60d35a982828a91dce38f80ffcae856e24520c590acfe3a1ad1a333f0a

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.src.rpm

SHA-256: 995b9b492c95c69dd76368493464cf3989e0759ebc42a151c1b901165ab9cb51

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.src.rpm

SHA-256: be5ffda4a15f9acf9afe50a2d2861edffe49735a5ee7117955cc84631b2db831

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.src.rpm

SHA-256: babf6dc7c766a1174828c7c3313391a100de3384b83c634b78c89ad96b0233a1

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.src.rpm

SHA-256: 9c18751e013d2b53e60e66e48d7d3e17b414ba07e597ae4be2b5285270264a6f

x86_64

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.x86_64.rpm

SHA-256: 63c9eb1e8108c5165484f96f644b40ac10603af02e9915d9cc10f0df59e72bd5

kpatch-patch-4_18_0-305_62_1-debuginfo-1-5.el8_4.x86_64.rpm

SHA-256: d8b85e028b5e29dd34669d2beeca425632ec8ce7caf22f2522567840072087fa

kpatch-patch-4_18_0-305_62_1-debugsource-1-5.el8_4.x86_64.rpm

SHA-256: f49c6513012a3e88335f1b025ca9cc3049e16dc60c2644816fed95d385c02a3f

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.x86_64.rpm

SHA-256: f311ca97fc24e7deaf035e2505a9f562cccc61785efefd34618dd678dd880082

kpatch-patch-4_18_0-305_65_1-debuginfo-1-4.el8_4.x86_64.rpm

SHA-256: f0a4b31a7d4dfa7590b8e8375882fda5434ca253722e5003f469fa997236a059

kpatch-patch-4_18_0-305_65_1-debugsource-1-4.el8_4.x86_64.rpm

SHA-256: cfa2d8fa16abec300d6b8ecd614cc5ed5e96326d381139441b8eeb1803291e90

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.x86_64.rpm

SHA-256: 876a81aa88a4686a2566b71a73625e47f0a65e30041194784412555f803fa521

kpatch-patch-4_18_0-305_71_1-debuginfo-1-3.el8_4.x86_64.rpm

SHA-256: 874111d163614d3071e0ee3533fbe8e1e56c624961b96cca27678a4ef6458dea

kpatch-patch-4_18_0-305_71_1-debugsource-1-3.el8_4.x86_64.rpm

SHA-256: 53eda7b41147a1d1d9cb82f25ac0bf52b59ed5a03b836f6941ac79c87bc8d4a0

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.x86_64.rpm

SHA-256: 9b31719b7ccfbe18f1fc881d488c39462a7be4eb9b813406c5740e6e7c29381a

kpatch-patch-4_18_0-305_72_1-debuginfo-1-2.el8_4.x86_64.rpm

SHA-256: d87580aa093f0436489b4bd6078a02cd078ce6473a7bfb2fb5b0f751fbb74db5

kpatch-patch-4_18_0-305_72_1-debugsource-1-2.el8_4.x86_64.rpm

SHA-256: 3f228198a974c3de51b20ccee07a6389e123beb7b1dbc5a84dec0e24e5b72a7f

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.x86_64.rpm

SHA-256: de4df8447426978a9a8b2f225db16742506bb3f96c63737aac06c4e175819df6

kpatch-patch-4_18_0-305_76_1-debuginfo-1-1.el8_4.x86_64.rpm

SHA-256: 195175700cca2fa0fcabf867e04ff705440849c713289597a352bb0dee2129b6

kpatch-patch-4_18_0-305_76_1-debugsource-1-1.el8_4.x86_64.rpm

SHA-256: 96971912a137378bdd4740c9ca617de1642349ba3255cb383224262944a8dc29

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.src.rpm

SHA-256: f0493f60d35a982828a91dce38f80ffcae856e24520c590acfe3a1ad1a333f0a

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.src.rpm

SHA-256: 995b9b492c95c69dd76368493464cf3989e0759ebc42a151c1b901165ab9cb51

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.src.rpm

SHA-256: be5ffda4a15f9acf9afe50a2d2861edffe49735a5ee7117955cc84631b2db831

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.src.rpm

SHA-256: babf6dc7c766a1174828c7c3313391a100de3384b83c634b78c89ad96b0233a1

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.src.rpm

SHA-256: 9c18751e013d2b53e60e66e48d7d3e17b414ba07e597ae4be2b5285270264a6f

x86_64

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.x86_64.rpm

SHA-256: 63c9eb1e8108c5165484f96f644b40ac10603af02e9915d9cc10f0df59e72bd5

kpatch-patch-4_18_0-305_62_1-debuginfo-1-5.el8_4.x86_64.rpm

SHA-256: d8b85e028b5e29dd34669d2beeca425632ec8ce7caf22f2522567840072087fa

kpatch-patch-4_18_0-305_62_1-debugsource-1-5.el8_4.x86_64.rpm

SHA-256: f49c6513012a3e88335f1b025ca9cc3049e16dc60c2644816fed95d385c02a3f

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.x86_64.rpm

SHA-256: f311ca97fc24e7deaf035e2505a9f562cccc61785efefd34618dd678dd880082

kpatch-patch-4_18_0-305_65_1-debuginfo-1-4.el8_4.x86_64.rpm

SHA-256: f0a4b31a7d4dfa7590b8e8375882fda5434ca253722e5003f469fa997236a059

kpatch-patch-4_18_0-305_65_1-debugsource-1-4.el8_4.x86_64.rpm

SHA-256: cfa2d8fa16abec300d6b8ecd614cc5ed5e96326d381139441b8eeb1803291e90

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.x86_64.rpm

SHA-256: 876a81aa88a4686a2566b71a73625e47f0a65e30041194784412555f803fa521

kpatch-patch-4_18_0-305_71_1-debuginfo-1-3.el8_4.x86_64.rpm

SHA-256: 874111d163614d3071e0ee3533fbe8e1e56c624961b96cca27678a4ef6458dea

kpatch-patch-4_18_0-305_71_1-debugsource-1-3.el8_4.x86_64.rpm

SHA-256: 53eda7b41147a1d1d9cb82f25ac0bf52b59ed5a03b836f6941ac79c87bc8d4a0

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.x86_64.rpm

SHA-256: 9b31719b7ccfbe18f1fc881d488c39462a7be4eb9b813406c5740e6e7c29381a

kpatch-patch-4_18_0-305_72_1-debuginfo-1-2.el8_4.x86_64.rpm

SHA-256: d87580aa093f0436489b4bd6078a02cd078ce6473a7bfb2fb5b0f751fbb74db5

kpatch-patch-4_18_0-305_72_1-debugsource-1-2.el8_4.x86_64.rpm

SHA-256: 3f228198a974c3de51b20ccee07a6389e123beb7b1dbc5a84dec0e24e5b72a7f

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.x86_64.rpm

SHA-256: de4df8447426978a9a8b2f225db16742506bb3f96c63737aac06c4e175819df6

kpatch-patch-4_18_0-305_76_1-debuginfo-1-1.el8_4.x86_64.rpm

SHA-256: 195175700cca2fa0fcabf867e04ff705440849c713289597a352bb0dee2129b6

kpatch-patch-4_18_0-305_76_1-debugsource-1-1.el8_4.x86_64.rpm

SHA-256: 96971912a137378bdd4740c9ca617de1642349ba3255cb383224262944a8dc29

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.src.rpm

SHA-256: f0493f60d35a982828a91dce38f80ffcae856e24520c590acfe3a1ad1a333f0a

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.src.rpm

SHA-256: 995b9b492c95c69dd76368493464cf3989e0759ebc42a151c1b901165ab9cb51

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.src.rpm

SHA-256: be5ffda4a15f9acf9afe50a2d2861edffe49735a5ee7117955cc84631b2db831

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.src.rpm

SHA-256: babf6dc7c766a1174828c7c3313391a100de3384b83c634b78c89ad96b0233a1

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.src.rpm

SHA-256: 9c18751e013d2b53e60e66e48d7d3e17b414ba07e597ae4be2b5285270264a6f

ppc64le

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.ppc64le.rpm

SHA-256: d876011d49d09091e36a0d0604290817b644d40fbc0fa8e77c8e1258e3f07810

kpatch-patch-4_18_0-305_62_1-debuginfo-1-5.el8_4.ppc64le.rpm

SHA-256: 73152d1ab1c6439dabf054b1d94e91dd2539da756451286c7fd81eb1b6d0723d

kpatch-patch-4_18_0-305_62_1-debugsource-1-5.el8_4.ppc64le.rpm

SHA-256: 0ffa2695c0f14144db93727a5dd828f04c15824c74e5d238b414a2cdc9d8bbea

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.ppc64le.rpm

SHA-256: cd28583c16e48d95c042e4289dfe0d22047268a94452a05aef748eeda3c1de5c

kpatch-patch-4_18_0-305_65_1-debuginfo-1-4.el8_4.ppc64le.rpm

SHA-256: 7007d3892786d3a123feb9f9798b4572ebb742f788a2def1a5dedb3431079b49

kpatch-patch-4_18_0-305_65_1-debugsource-1-4.el8_4.ppc64le.rpm

SHA-256: 37bafdbfff76ab2755c07b3f192139d60a93df3270aef21a1a768c9fcca5af9d

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.ppc64le.rpm

SHA-256: 04dd26ed9a6aabc3838e3f548f6a4915ed224b3024298e57a904f3aa9ae6729f

kpatch-patch-4_18_0-305_71_1-debuginfo-1-3.el8_4.ppc64le.rpm

SHA-256: 670cb2573c98268a8d58c9932b52709b7fbafcbd0619717927b4410f1c8be895

kpatch-patch-4_18_0-305_71_1-debugsource-1-3.el8_4.ppc64le.rpm

SHA-256: 575ed54f19172bbde5af794a7ab95dc1b1aed73111b4fc73e8a034844bdcc815

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.ppc64le.rpm

SHA-256: 3fdbde41339aef025b2db762f09b613d60de0ff5e8e46952441a825833b7f3d5

kpatch-patch-4_18_0-305_72_1-debuginfo-1-2.el8_4.ppc64le.rpm

SHA-256: 8f383fa73b2173c0a7fe81d39abe64bfc0bece771af3d5f01b0ed30dba1130cb

kpatch-patch-4_18_0-305_72_1-debugsource-1-2.el8_4.ppc64le.rpm

SHA-256: 99ba86fa01f2463ba7177ac90dc198b9b137e85f91e30b0bf365e745c57981bc

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.ppc64le.rpm

SHA-256: 648a4202032c3723dfd744908cc950aa39e372f788b2d25e744d4b6755da1650

kpatch-patch-4_18_0-305_76_1-debuginfo-1-1.el8_4.ppc64le.rpm

SHA-256: 50954c74aa5148f4d72384c25a7782005388932f341135295606077d8d0e166c

kpatch-patch-4_18_0-305_76_1-debugsource-1-1.el8_4.ppc64le.rpm

SHA-256: ac207e16506cd2366ddd333e85f40e72230bad18450f48a0528bc219983b8051

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.src.rpm

SHA-256: f0493f60d35a982828a91dce38f80ffcae856e24520c590acfe3a1ad1a333f0a

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.src.rpm

SHA-256: 995b9b492c95c69dd76368493464cf3989e0759ebc42a151c1b901165ab9cb51

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.src.rpm

SHA-256: be5ffda4a15f9acf9afe50a2d2861edffe49735a5ee7117955cc84631b2db831

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.src.rpm

SHA-256: babf6dc7c766a1174828c7c3313391a100de3384b83c634b78c89ad96b0233a1

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.src.rpm

SHA-256: 9c18751e013d2b53e60e66e48d7d3e17b414ba07e597ae4be2b5285270264a6f

x86_64

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.x86_64.rpm

SHA-256: 63c9eb1e8108c5165484f96f644b40ac10603af02e9915d9cc10f0df59e72bd5

kpatch-patch-4_18_0-305_62_1-debuginfo-1-5.el8_4.x86_64.rpm

SHA-256: d8b85e028b5e29dd34669d2beeca425632ec8ce7caf22f2522567840072087fa

kpatch-patch-4_18_0-305_62_1-debugsource-1-5.el8_4.x86_64.rpm

SHA-256: f49c6513012a3e88335f1b025ca9cc3049e16dc60c2644816fed95d385c02a3f

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.x86_64.rpm

SHA-256: f311ca97fc24e7deaf035e2505a9f562cccc61785efefd34618dd678dd880082

kpatch-patch-4_18_0-305_65_1-debuginfo-1-4.el8_4.x86_64.rpm

SHA-256: f0a4b31a7d4dfa7590b8e8375882fda5434ca253722e5003f469fa997236a059

kpatch-patch-4_18_0-305_65_1-debugsource-1-4.el8_4.x86_64.rpm

SHA-256: cfa2d8fa16abec300d6b8ecd614cc5ed5e96326d381139441b8eeb1803291e90

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.x86_64.rpm

SHA-256: 876a81aa88a4686a2566b71a73625e47f0a65e30041194784412555f803fa521

kpatch-patch-4_18_0-305_71_1-debuginfo-1-3.el8_4.x86_64.rpm

SHA-256: 874111d163614d3071e0ee3533fbe8e1e56c624961b96cca27678a4ef6458dea

kpatch-patch-4_18_0-305_71_1-debugsource-1-3.el8_4.x86_64.rpm

SHA-256: 53eda7b41147a1d1d9cb82f25ac0bf52b59ed5a03b836f6941ac79c87bc8d4a0

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.x86_64.rpm

SHA-256: 9b31719b7ccfbe18f1fc881d488c39462a7be4eb9b813406c5740e6e7c29381a

kpatch-patch-4_18_0-305_72_1-debuginfo-1-2.el8_4.x86_64.rpm

SHA-256: d87580aa093f0436489b4bd6078a02cd078ce6473a7bfb2fb5b0f751fbb74db5

kpatch-patch-4_18_0-305_72_1-debugsource-1-2.el8_4.x86_64.rpm

SHA-256: 3f228198a974c3de51b20ccee07a6389e123beb7b1dbc5a84dec0e24e5b72a7f

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.x86_64.rpm

SHA-256: de4df8447426978a9a8b2f225db16742506bb3f96c63737aac06c4e175819df6

kpatch-patch-4_18_0-305_76_1-debuginfo-1-1.el8_4.x86_64.rpm

SHA-256: 195175700cca2fa0fcabf867e04ff705440849c713289597a352bb0dee2129b6

kpatch-patch-4_18_0-305_76_1-debugsource-1-1.el8_4.x86_64.rpm

SHA-256: 96971912a137378bdd4740c9ca617de1642349ba3255cb383224262944a8dc29

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.src.rpm

SHA-256: f0493f60d35a982828a91dce38f80ffcae856e24520c590acfe3a1ad1a333f0a

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.src.rpm

SHA-256: 995b9b492c95c69dd76368493464cf3989e0759ebc42a151c1b901165ab9cb51

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.src.rpm

SHA-256: be5ffda4a15f9acf9afe50a2d2861edffe49735a5ee7117955cc84631b2db831

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.src.rpm

SHA-256: babf6dc7c766a1174828c7c3313391a100de3384b83c634b78c89ad96b0233a1

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.src.rpm

SHA-256: 9c18751e013d2b53e60e66e48d7d3e17b414ba07e597ae4be2b5285270264a6f

ppc64le

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.ppc64le.rpm

SHA-256: d876011d49d09091e36a0d0604290817b644d40fbc0fa8e77c8e1258e3f07810

kpatch-patch-4_18_0-305_62_1-debuginfo-1-5.el8_4.ppc64le.rpm

SHA-256: 73152d1ab1c6439dabf054b1d94e91dd2539da756451286c7fd81eb1b6d0723d

kpatch-patch-4_18_0-305_62_1-debugsource-1-5.el8_4.ppc64le.rpm

SHA-256: 0ffa2695c0f14144db93727a5dd828f04c15824c74e5d238b414a2cdc9d8bbea

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.ppc64le.rpm

SHA-256: cd28583c16e48d95c042e4289dfe0d22047268a94452a05aef748eeda3c1de5c

kpatch-patch-4_18_0-305_65_1-debuginfo-1-4.el8_4.ppc64le.rpm

SHA-256: 7007d3892786d3a123feb9f9798b4572ebb742f788a2def1a5dedb3431079b49

kpatch-patch-4_18_0-305_65_1-debugsource-1-4.el8_4.ppc64le.rpm

SHA-256: 37bafdbfff76ab2755c07b3f192139d60a93df3270aef21a1a768c9fcca5af9d

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.ppc64le.rpm

SHA-256: 04dd26ed9a6aabc3838e3f548f6a4915ed224b3024298e57a904f3aa9ae6729f

kpatch-patch-4_18_0-305_71_1-debuginfo-1-3.el8_4.ppc64le.rpm

SHA-256: 670cb2573c98268a8d58c9932b52709b7fbafcbd0619717927b4410f1c8be895

kpatch-patch-4_18_0-305_71_1-debugsource-1-3.el8_4.ppc64le.rpm

SHA-256: 575ed54f19172bbde5af794a7ab95dc1b1aed73111b4fc73e8a034844bdcc815

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.ppc64le.rpm

SHA-256: 3fdbde41339aef025b2db762f09b613d60de0ff5e8e46952441a825833b7f3d5

kpatch-patch-4_18_0-305_72_1-debuginfo-1-2.el8_4.ppc64le.rpm

SHA-256: 8f383fa73b2173c0a7fe81d39abe64bfc0bece771af3d5f01b0ed30dba1130cb

kpatch-patch-4_18_0-305_72_1-debugsource-1-2.el8_4.ppc64le.rpm

SHA-256: 99ba86fa01f2463ba7177ac90dc198b9b137e85f91e30b0bf365e745c57981bc

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.ppc64le.rpm

SHA-256: 648a4202032c3723dfd744908cc950aa39e372f788b2d25e744d4b6755da1650

kpatch-patch-4_18_0-305_76_1-debuginfo-1-1.el8_4.ppc64le.rpm

SHA-256: 50954c74aa5148f4d72384c25a7782005388932f341135295606077d8d0e166c

kpatch-patch-4_18_0-305_76_1-debugsource-1-1.el8_4.ppc64le.rpm

SHA-256: ac207e16506cd2366ddd333e85f40e72230bad18450f48a0528bc219983b8051

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.src.rpm

SHA-256: f0493f60d35a982828a91dce38f80ffcae856e24520c590acfe3a1ad1a333f0a

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.src.rpm

SHA-256: 995b9b492c95c69dd76368493464cf3989e0759ebc42a151c1b901165ab9cb51

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.src.rpm

SHA-256: be5ffda4a15f9acf9afe50a2d2861edffe49735a5ee7117955cc84631b2db831

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.src.rpm

SHA-256: babf6dc7c766a1174828c7c3313391a100de3384b83c634b78c89ad96b0233a1

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.src.rpm

SHA-256: 9c18751e013d2b53e60e66e48d7d3e17b414ba07e597ae4be2b5285270264a6f

x86_64

kpatch-patch-4_18_0-305_62_1-1-5.el8_4.x86_64.rpm

SHA-256: 63c9eb1e8108c5165484f96f644b40ac10603af02e9915d9cc10f0df59e72bd5

kpatch-patch-4_18_0-305_62_1-debuginfo-1-5.el8_4.x86_64.rpm

SHA-256: d8b85e028b5e29dd34669d2beeca425632ec8ce7caf22f2522567840072087fa

kpatch-patch-4_18_0-305_62_1-debugsource-1-5.el8_4.x86_64.rpm

SHA-256: f49c6513012a3e88335f1b025ca9cc3049e16dc60c2644816fed95d385c02a3f

kpatch-patch-4_18_0-305_65_1-1-4.el8_4.x86_64.rpm

SHA-256: f311ca97fc24e7deaf035e2505a9f562cccc61785efefd34618dd678dd880082

kpatch-patch-4_18_0-305_65_1-debuginfo-1-4.el8_4.x86_64.rpm

SHA-256: f0a4b31a7d4dfa7590b8e8375882fda5434ca253722e5003f469fa997236a059

kpatch-patch-4_18_0-305_65_1-debugsource-1-4.el8_4.x86_64.rpm

SHA-256: cfa2d8fa16abec300d6b8ecd614cc5ed5e96326d381139441b8eeb1803291e90

kpatch-patch-4_18_0-305_71_1-1-3.el8_4.x86_64.rpm

SHA-256: 876a81aa88a4686a2566b71a73625e47f0a65e30041194784412555f803fa521

kpatch-patch-4_18_0-305_71_1-debuginfo-1-3.el8_4.x86_64.rpm

SHA-256: 874111d163614d3071e0ee3533fbe8e1e56c624961b96cca27678a4ef6458dea

kpatch-patch-4_18_0-305_71_1-debugsource-1-3.el8_4.x86_64.rpm

SHA-256: 53eda7b41147a1d1d9cb82f25ac0bf52b59ed5a03b836f6941ac79c87bc8d4a0

kpatch-patch-4_18_0-305_72_1-1-2.el8_4.x86_64.rpm

SHA-256: 9b31719b7ccfbe18f1fc881d488c39462a7be4eb9b813406c5740e6e7c29381a

kpatch-patch-4_18_0-305_72_1-debuginfo-1-2.el8_4.x86_64.rpm

SHA-256: d87580aa093f0436489b4bd6078a02cd078ce6473a7bfb2fb5b0f751fbb74db5

kpatch-patch-4_18_0-305_72_1-debugsource-1-2.el8_4.x86_64.rpm

SHA-256: 3f228198a974c3de51b20ccee07a6389e123beb7b1dbc5a84dec0e24e5b72a7f

kpatch-patch-4_18_0-305_76_1-1-1.el8_4.x86_64.rpm

SHA-256: de4df8447426978a9a8b2f225db16742506bb3f96c63737aac06c4e175819df6

kpatch-patch-4_18_0-305_76_1-debuginfo-1-1.el8_4.x86_64.rpm

SHA-256: 195175700cca2fa0fcabf867e04ff705440849c713289597a352bb0dee2129b6

kpatch-patch-4_18_0-305_76_1-debugsource-1-1.el8_4.x86_64.rpm

SHA-256: 96971912a137378bdd4740c9ca617de1642349ba3255cb383224262944a8dc29

Related news

CVE-2023-30994: Security Bulletin: IBM QRadar SIEM includes components with known vulnerabilities

IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 254138

Red Hat Security Advisory 2023-4150-01

Red Hat Security Advisory 2023-4150-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-4021-01

Red Hat Security Advisory 2023-4021-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include double free and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-3491-01

Red Hat Security Advisory 2023-3491-01 - An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-3388-01

Red Hat Security Advisory 2023-3388-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass and use-after-free vulnerabilities.

RHSA-2023:2736: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user t...

Red Hat Security Advisory 2023-2083-01

Red Hat Security Advisory 2023-2083-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.5 General Availability release images, which fix bugs and security updates container images. Issues addressed include denial of service and server-side request forgery vulnerabilities.

RHSA-2023:1706: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

RHSA-2023:1705: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Red Hat Security Advisory 2023-1559-01

Red Hat Security Advisory 2023-1559-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

RHSA-2023:1584: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...

RHSA-2023:1392: Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update

Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled docume...

RHSA-2023:1393: Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update

Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...

Red Hat Security Advisory 2023-1220-01

Red Hat Security Advisory 2023-1220-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-1220-01

Red Hat Security Advisory 2023-1220-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-1203-01

Red Hat Security Advisory 2023-1203-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.

RHSA-2023:1203: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was fou...

RHSA-2023:1109: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially esc...

RHSA-2023:1110: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

RHSA-2023:1092: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2022-42703: A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c ...

RHSA-2023:1008: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack overflow flaw was found in th...

RHSA-2023:0951: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetoo...

RHSA-2023:0951: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetoo...

Ubuntu Security Notice USN-5877-1

Ubuntu Security Notice 5877-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5832-1

Ubuntu Security Notice 5832-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5814-1

Ubuntu Security Notice 5814-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5809-1

Ubuntu Security Notice 5809-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5803-1

Ubuntu Security Notice 5803-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamas Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5774-1

Ubuntu Security Notice 5774-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5754-2

Ubuntu Security Notice 5754-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5756-2

Ubuntu Security Notice 5756-2 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5757-2

Ubuntu Security Notice 5757-2 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the video4linux driver for Empia based TV cards in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5754-1

Ubuntu Security Notice 5754-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.