Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:5607: Red Hat Security Advisory: linux-firmware security and enhancement update

An update for linux-firmware is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances.
Red Hat Security Data
#vulnerability#linux#red_hat#intel#amd#ibm#sap

Synopsis

Moderate: linux-firmware security and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for linux-firmware is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The linux-firmware packages contain all of the firmware files that are required by various devices to operate.

Security Fix(es):

  • hw: amd: Cross-Process Information Leak (CVE-2023-20593)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Enhancement(s):

  • [Intel 9.0.z] Intel QAT Update - firmware for QAT (BZ#2168390)

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2217845 - CVE-2023-20593 hw: amd: Cross-Process Information Leak

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0

SRPM

linux-firmware-20220209-128.el9_0.src.rpm

SHA-256: cd983405e7647a78e7df93e0cebf99cc5efbdd88f8acfbbe4d321a36727d7804

x86_64

iwl100-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: 7aa18639fbb93ddf22a8e1c0d5404ba5e5d05f37351b0f71d7ed505f604a5ddf

iwl1000-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: b605c8eb7251481cc995cceb691a566bccd397bbabfa935ff8981d4feba9ce05

iwl105-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: d111b1f0f54929acdd872cdd0d2423899ba92c62225ca70f697d577d18a32ce7

iwl135-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: bc564e0999afb512703db6cbae8839005f56650ec4c1c5e49116c380f3faa22f

iwl2000-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 2befbcde0c3204c81a0a3c366c60fb3c9418d7296b5a994de0eabbfe153b7ad5

iwl2030-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 732c188e4b0d7c26c1d0a2af861db621831852751e5655b75b9daaf28387fcd7

iwl3160-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 35db12ac5c614cf56b761f0a658e97bc5f2f61c7447c23e2515be28299e593e8

iwl5000-firmware-8.83.5.1_1-128.el9_0.noarch.rpm

SHA-256: d5ae69b3890d325310041c58d88ac6d80b2821a98c394dcfae72357aab25fe13

iwl5150-firmware-8.24.2.2-128.el9_0.noarch.rpm

SHA-256: 7eb1db5e8f114b2ef78e03b518a301d5f4a60f735b2368310e281661a45ae5a5

iwl6000g2a-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 7db6159a322d29c8e45fb606e754638b99b23dfa73bb355599362efea94bf5f4

iwl6000g2b-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 78dc26efbbc8aaffa9154963a0a793f1d743ebe4727725ae6e3a7ba68f3ef6b8

iwl6050-firmware-41.28.5.1-128.el9_0.noarch.rpm

SHA-256: 4b78e3fb3666b11b7a75ab4af4d2f14b6fb8f8b0e418ba9c6f13c9af8d9338f2

iwl7260-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 809b25c2ac57c380518434832223524ba427ad35aaf7c916bf4c1cc1683b4b34

libertas-sd8787-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 2d3136cfae686f73c34b294e1aee6e7fd2338f2096127474ac094b3a412a6482

linux-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: cacb14496da34b6c104ef1368b8ecaabe032b9d946b496472cd6a798aff0a3fe

linux-firmware-whence-20220209-128.el9_0.noarch.rpm

SHA-256: 5ba5f9df06fa1f25713a88d401d1c3ec51b8e5a8d3575998c07785c7aa474428

netronome-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 4c837f0772fb007ed7597dd12f3a8df4dc9baa5991d371e3a36ce2275eb0ea09

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0

SRPM

linux-firmware-20220209-128.el9_0.src.rpm

SHA-256: cd983405e7647a78e7df93e0cebf99cc5efbdd88f8acfbbe4d321a36727d7804

s390x

iwl100-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: 7aa18639fbb93ddf22a8e1c0d5404ba5e5d05f37351b0f71d7ed505f604a5ddf

iwl1000-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: b605c8eb7251481cc995cceb691a566bccd397bbabfa935ff8981d4feba9ce05

iwl105-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: d111b1f0f54929acdd872cdd0d2423899ba92c62225ca70f697d577d18a32ce7

iwl135-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: bc564e0999afb512703db6cbae8839005f56650ec4c1c5e49116c380f3faa22f

iwl2000-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 2befbcde0c3204c81a0a3c366c60fb3c9418d7296b5a994de0eabbfe153b7ad5

iwl2030-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 732c188e4b0d7c26c1d0a2af861db621831852751e5655b75b9daaf28387fcd7

iwl3160-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 35db12ac5c614cf56b761f0a658e97bc5f2f61c7447c23e2515be28299e593e8

iwl5000-firmware-8.83.5.1_1-128.el9_0.noarch.rpm

SHA-256: d5ae69b3890d325310041c58d88ac6d80b2821a98c394dcfae72357aab25fe13

iwl5150-firmware-8.24.2.2-128.el9_0.noarch.rpm

SHA-256: 7eb1db5e8f114b2ef78e03b518a301d5f4a60f735b2368310e281661a45ae5a5

iwl6000g2a-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 7db6159a322d29c8e45fb606e754638b99b23dfa73bb355599362efea94bf5f4

iwl6000g2b-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 78dc26efbbc8aaffa9154963a0a793f1d743ebe4727725ae6e3a7ba68f3ef6b8

iwl6050-firmware-41.28.5.1-128.el9_0.noarch.rpm

SHA-256: 4b78e3fb3666b11b7a75ab4af4d2f14b6fb8f8b0e418ba9c6f13c9af8d9338f2

iwl7260-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 809b25c2ac57c380518434832223524ba427ad35aaf7c916bf4c1cc1683b4b34

libertas-sd8787-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 2d3136cfae686f73c34b294e1aee6e7fd2338f2096127474ac094b3a412a6482

linux-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: cacb14496da34b6c104ef1368b8ecaabe032b9d946b496472cd6a798aff0a3fe

linux-firmware-whence-20220209-128.el9_0.noarch.rpm

SHA-256: 5ba5f9df06fa1f25713a88d401d1c3ec51b8e5a8d3575998c07785c7aa474428

netronome-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 4c837f0772fb007ed7597dd12f3a8df4dc9baa5991d371e3a36ce2275eb0ea09

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0

SRPM

linux-firmware-20220209-128.el9_0.src.rpm

SHA-256: cd983405e7647a78e7df93e0cebf99cc5efbdd88f8acfbbe4d321a36727d7804

ppc64le

iwl100-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: 7aa18639fbb93ddf22a8e1c0d5404ba5e5d05f37351b0f71d7ed505f604a5ddf

iwl1000-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: b605c8eb7251481cc995cceb691a566bccd397bbabfa935ff8981d4feba9ce05

iwl105-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: d111b1f0f54929acdd872cdd0d2423899ba92c62225ca70f697d577d18a32ce7

iwl135-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: bc564e0999afb512703db6cbae8839005f56650ec4c1c5e49116c380f3faa22f

iwl2000-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 2befbcde0c3204c81a0a3c366c60fb3c9418d7296b5a994de0eabbfe153b7ad5

iwl2030-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 732c188e4b0d7c26c1d0a2af861db621831852751e5655b75b9daaf28387fcd7

iwl3160-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 35db12ac5c614cf56b761f0a658e97bc5f2f61c7447c23e2515be28299e593e8

iwl5000-firmware-8.83.5.1_1-128.el9_0.noarch.rpm

SHA-256: d5ae69b3890d325310041c58d88ac6d80b2821a98c394dcfae72357aab25fe13

iwl5150-firmware-8.24.2.2-128.el9_0.noarch.rpm

SHA-256: 7eb1db5e8f114b2ef78e03b518a301d5f4a60f735b2368310e281661a45ae5a5

iwl6000g2a-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 7db6159a322d29c8e45fb606e754638b99b23dfa73bb355599362efea94bf5f4

iwl6000g2b-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 78dc26efbbc8aaffa9154963a0a793f1d743ebe4727725ae6e3a7ba68f3ef6b8

iwl6050-firmware-41.28.5.1-128.el9_0.noarch.rpm

SHA-256: 4b78e3fb3666b11b7a75ab4af4d2f14b6fb8f8b0e418ba9c6f13c9af8d9338f2

iwl7260-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 809b25c2ac57c380518434832223524ba427ad35aaf7c916bf4c1cc1683b4b34

libertas-sd8787-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 2d3136cfae686f73c34b294e1aee6e7fd2338f2096127474ac094b3a412a6482

linux-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: cacb14496da34b6c104ef1368b8ecaabe032b9d946b496472cd6a798aff0a3fe

linux-firmware-whence-20220209-128.el9_0.noarch.rpm

SHA-256: 5ba5f9df06fa1f25713a88d401d1c3ec51b8e5a8d3575998c07785c7aa474428

netronome-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 4c837f0772fb007ed7597dd12f3a8df4dc9baa5991d371e3a36ce2275eb0ea09

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0

SRPM

linux-firmware-20220209-128.el9_0.src.rpm

SHA-256: cd983405e7647a78e7df93e0cebf99cc5efbdd88f8acfbbe4d321a36727d7804

aarch64

iwl100-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: 7aa18639fbb93ddf22a8e1c0d5404ba5e5d05f37351b0f71d7ed505f604a5ddf

iwl1000-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: b605c8eb7251481cc995cceb691a566bccd397bbabfa935ff8981d4feba9ce05

iwl105-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: d111b1f0f54929acdd872cdd0d2423899ba92c62225ca70f697d577d18a32ce7

iwl135-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: bc564e0999afb512703db6cbae8839005f56650ec4c1c5e49116c380f3faa22f

iwl2000-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 2befbcde0c3204c81a0a3c366c60fb3c9418d7296b5a994de0eabbfe153b7ad5

iwl2030-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 732c188e4b0d7c26c1d0a2af861db621831852751e5655b75b9daaf28387fcd7

iwl3160-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 35db12ac5c614cf56b761f0a658e97bc5f2f61c7447c23e2515be28299e593e8

iwl5000-firmware-8.83.5.1_1-128.el9_0.noarch.rpm

SHA-256: d5ae69b3890d325310041c58d88ac6d80b2821a98c394dcfae72357aab25fe13

iwl5150-firmware-8.24.2.2-128.el9_0.noarch.rpm

SHA-256: 7eb1db5e8f114b2ef78e03b518a301d5f4a60f735b2368310e281661a45ae5a5

iwl6000g2a-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 7db6159a322d29c8e45fb606e754638b99b23dfa73bb355599362efea94bf5f4

iwl6000g2b-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 78dc26efbbc8aaffa9154963a0a793f1d743ebe4727725ae6e3a7ba68f3ef6b8

iwl6050-firmware-41.28.5.1-128.el9_0.noarch.rpm

SHA-256: 4b78e3fb3666b11b7a75ab4af4d2f14b6fb8f8b0e418ba9c6f13c9af8d9338f2

iwl7260-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 809b25c2ac57c380518434832223524ba427ad35aaf7c916bf4c1cc1683b4b34

libertas-sd8787-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 2d3136cfae686f73c34b294e1aee6e7fd2338f2096127474ac094b3a412a6482

linux-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: cacb14496da34b6c104ef1368b8ecaabe032b9d946b496472cd6a798aff0a3fe

linux-firmware-whence-20220209-128.el9_0.noarch.rpm

SHA-256: 5ba5f9df06fa1f25713a88d401d1c3ec51b8e5a8d3575998c07785c7aa474428

netronome-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 4c837f0772fb007ed7597dd12f3a8df4dc9baa5991d371e3a36ce2275eb0ea09

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM

linux-firmware-20220209-128.el9_0.src.rpm

SHA-256: cd983405e7647a78e7df93e0cebf99cc5efbdd88f8acfbbe4d321a36727d7804

ppc64le

iwl100-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: 7aa18639fbb93ddf22a8e1c0d5404ba5e5d05f37351b0f71d7ed505f604a5ddf

iwl1000-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: b605c8eb7251481cc995cceb691a566bccd397bbabfa935ff8981d4feba9ce05

iwl105-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: d111b1f0f54929acdd872cdd0d2423899ba92c62225ca70f697d577d18a32ce7

iwl135-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: bc564e0999afb512703db6cbae8839005f56650ec4c1c5e49116c380f3faa22f

iwl2000-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 2befbcde0c3204c81a0a3c366c60fb3c9418d7296b5a994de0eabbfe153b7ad5

iwl2030-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 732c188e4b0d7c26c1d0a2af861db621831852751e5655b75b9daaf28387fcd7

iwl3160-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 35db12ac5c614cf56b761f0a658e97bc5f2f61c7447c23e2515be28299e593e8

iwl5000-firmware-8.83.5.1_1-128.el9_0.noarch.rpm

SHA-256: d5ae69b3890d325310041c58d88ac6d80b2821a98c394dcfae72357aab25fe13

iwl5150-firmware-8.24.2.2-128.el9_0.noarch.rpm

SHA-256: 7eb1db5e8f114b2ef78e03b518a301d5f4a60f735b2368310e281661a45ae5a5

iwl6000g2a-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 7db6159a322d29c8e45fb606e754638b99b23dfa73bb355599362efea94bf5f4

iwl6000g2b-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 78dc26efbbc8aaffa9154963a0a793f1d743ebe4727725ae6e3a7ba68f3ef6b8

iwl6050-firmware-41.28.5.1-128.el9_0.noarch.rpm

SHA-256: 4b78e3fb3666b11b7a75ab4af4d2f14b6fb8f8b0e418ba9c6f13c9af8d9338f2

iwl7260-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 809b25c2ac57c380518434832223524ba427ad35aaf7c916bf4c1cc1683b4b34

libertas-sd8787-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 2d3136cfae686f73c34b294e1aee6e7fd2338f2096127474ac094b3a412a6482

linux-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: cacb14496da34b6c104ef1368b8ecaabe032b9d946b496472cd6a798aff0a3fe

linux-firmware-whence-20220209-128.el9_0.noarch.rpm

SHA-256: 5ba5f9df06fa1f25713a88d401d1c3ec51b8e5a8d3575998c07785c7aa474428

netronome-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 4c837f0772fb007ed7597dd12f3a8df4dc9baa5991d371e3a36ce2275eb0ea09

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM

linux-firmware-20220209-128.el9_0.src.rpm

SHA-256: cd983405e7647a78e7df93e0cebf99cc5efbdd88f8acfbbe4d321a36727d7804

x86_64

iwl100-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: 7aa18639fbb93ddf22a8e1c0d5404ba5e5d05f37351b0f71d7ed505f604a5ddf

iwl1000-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: b605c8eb7251481cc995cceb691a566bccd397bbabfa935ff8981d4feba9ce05

iwl105-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: d111b1f0f54929acdd872cdd0d2423899ba92c62225ca70f697d577d18a32ce7

iwl135-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: bc564e0999afb512703db6cbae8839005f56650ec4c1c5e49116c380f3faa22f

iwl2000-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 2befbcde0c3204c81a0a3c366c60fb3c9418d7296b5a994de0eabbfe153b7ad5

iwl2030-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 732c188e4b0d7c26c1d0a2af861db621831852751e5655b75b9daaf28387fcd7

iwl3160-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 35db12ac5c614cf56b761f0a658e97bc5f2f61c7447c23e2515be28299e593e8

iwl5000-firmware-8.83.5.1_1-128.el9_0.noarch.rpm

SHA-256: d5ae69b3890d325310041c58d88ac6d80b2821a98c394dcfae72357aab25fe13

iwl5150-firmware-8.24.2.2-128.el9_0.noarch.rpm

SHA-256: 7eb1db5e8f114b2ef78e03b518a301d5f4a60f735b2368310e281661a45ae5a5

iwl6000g2a-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 7db6159a322d29c8e45fb606e754638b99b23dfa73bb355599362efea94bf5f4

iwl6000g2b-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 78dc26efbbc8aaffa9154963a0a793f1d743ebe4727725ae6e3a7ba68f3ef6b8

iwl6050-firmware-41.28.5.1-128.el9_0.noarch.rpm

SHA-256: 4b78e3fb3666b11b7a75ab4af4d2f14b6fb8f8b0e418ba9c6f13c9af8d9338f2

iwl7260-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 809b25c2ac57c380518434832223524ba427ad35aaf7c916bf4c1cc1683b4b34

libertas-sd8787-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 2d3136cfae686f73c34b294e1aee6e7fd2338f2096127474ac094b3a412a6482

linux-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: cacb14496da34b6c104ef1368b8ecaabe032b9d946b496472cd6a798aff0a3fe

linux-firmware-whence-20220209-128.el9_0.noarch.rpm

SHA-256: 5ba5f9df06fa1f25713a88d401d1c3ec51b8e5a8d3575998c07785c7aa474428

netronome-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 4c837f0772fb007ed7597dd12f3a8df4dc9baa5991d371e3a36ce2275eb0ea09

Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0

SRPM

linux-firmware-20220209-128.el9_0.src.rpm

SHA-256: cd983405e7647a78e7df93e0cebf99cc5efbdd88f8acfbbe4d321a36727d7804

aarch64

iwl100-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: 7aa18639fbb93ddf22a8e1c0d5404ba5e5d05f37351b0f71d7ed505f604a5ddf

iwl1000-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: b605c8eb7251481cc995cceb691a566bccd397bbabfa935ff8981d4feba9ce05

iwl105-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: d111b1f0f54929acdd872cdd0d2423899ba92c62225ca70f697d577d18a32ce7

iwl135-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: bc564e0999afb512703db6cbae8839005f56650ec4c1c5e49116c380f3faa22f

iwl2000-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 2befbcde0c3204c81a0a3c366c60fb3c9418d7296b5a994de0eabbfe153b7ad5

iwl2030-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 732c188e4b0d7c26c1d0a2af861db621831852751e5655b75b9daaf28387fcd7

iwl3160-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 35db12ac5c614cf56b761f0a658e97bc5f2f61c7447c23e2515be28299e593e8

iwl5000-firmware-8.83.5.1_1-128.el9_0.noarch.rpm

SHA-256: d5ae69b3890d325310041c58d88ac6d80b2821a98c394dcfae72357aab25fe13

iwl5150-firmware-8.24.2.2-128.el9_0.noarch.rpm

SHA-256: 7eb1db5e8f114b2ef78e03b518a301d5f4a60f735b2368310e281661a45ae5a5

iwl6000g2a-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 7db6159a322d29c8e45fb606e754638b99b23dfa73bb355599362efea94bf5f4

iwl6000g2b-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 78dc26efbbc8aaffa9154963a0a793f1d743ebe4727725ae6e3a7ba68f3ef6b8

iwl6050-firmware-41.28.5.1-128.el9_0.noarch.rpm

SHA-256: 4b78e3fb3666b11b7a75ab4af4d2f14b6fb8f8b0e418ba9c6f13c9af8d9338f2

iwl7260-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 809b25c2ac57c380518434832223524ba427ad35aaf7c916bf4c1cc1683b4b34

libertas-sd8787-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 2d3136cfae686f73c34b294e1aee6e7fd2338f2096127474ac094b3a412a6482

linux-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: cacb14496da34b6c104ef1368b8ecaabe032b9d946b496472cd6a798aff0a3fe

linux-firmware-whence-20220209-128.el9_0.noarch.rpm

SHA-256: 5ba5f9df06fa1f25713a88d401d1c3ec51b8e5a8d3575998c07785c7aa474428

netronome-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 4c837f0772fb007ed7597dd12f3a8df4dc9baa5991d371e3a36ce2275eb0ea09

Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0

SRPM

linux-firmware-20220209-128.el9_0.src.rpm

SHA-256: cd983405e7647a78e7df93e0cebf99cc5efbdd88f8acfbbe4d321a36727d7804

s390x

iwl100-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: 7aa18639fbb93ddf22a8e1c0d5404ba5e5d05f37351b0f71d7ed505f604a5ddf

iwl1000-firmware-39.31.5.1-128.el9_0.noarch.rpm

SHA-256: b605c8eb7251481cc995cceb691a566bccd397bbabfa935ff8981d4feba9ce05

iwl105-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: d111b1f0f54929acdd872cdd0d2423899ba92c62225ca70f697d577d18a32ce7

iwl135-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: bc564e0999afb512703db6cbae8839005f56650ec4c1c5e49116c380f3faa22f

iwl2000-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 2befbcde0c3204c81a0a3c366c60fb3c9418d7296b5a994de0eabbfe153b7ad5

iwl2030-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 732c188e4b0d7c26c1d0a2af861db621831852751e5655b75b9daaf28387fcd7

iwl3160-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 35db12ac5c614cf56b761f0a658e97bc5f2f61c7447c23e2515be28299e593e8

iwl5000-firmware-8.83.5.1_1-128.el9_0.noarch.rpm

SHA-256: d5ae69b3890d325310041c58d88ac6d80b2821a98c394dcfae72357aab25fe13

iwl5150-firmware-8.24.2.2-128.el9_0.noarch.rpm

SHA-256: 7eb1db5e8f114b2ef78e03b518a301d5f4a60f735b2368310e281661a45ae5a5

iwl6000g2a-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 7db6159a322d29c8e45fb606e754638b99b23dfa73bb355599362efea94bf5f4

iwl6000g2b-firmware-18.168.6.1-128.el9_0.noarch.rpm

SHA-256: 78dc26efbbc8aaffa9154963a0a793f1d743ebe4727725ae6e3a7ba68f3ef6b8

iwl6050-firmware-41.28.5.1-128.el9_0.noarch.rpm

SHA-256: 4b78e3fb3666b11b7a75ab4af4d2f14b6fb8f8b0e418ba9c6f13c9af8d9338f2

iwl7260-firmware-25.30.13.0-128.el9_0.noarch.rpm

SHA-256: 809b25c2ac57c380518434832223524ba427ad35aaf7c916bf4c1cc1683b4b34

libertas-sd8787-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 2d3136cfae686f73c34b294e1aee6e7fd2338f2096127474ac094b3a412a6482

linux-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: cacb14496da34b6c104ef1368b8ecaabe032b9d946b496472cd6a798aff0a3fe

linux-firmware-whence-20220209-128.el9_0.noarch.rpm

SHA-256: 5ba5f9df06fa1f25713a88d401d1c3ec51b8e5a8d3575998c07785c7aa474428

netronome-firmware-20220209-128.el9_0.noarch.rpm

SHA-256: 4c837f0772fb007ed7597dd12f3a8df4dc9baa5991d371e3a36ce2275eb0ea09

Related news

CVE-2023-48660: DSA-2023-443: Dell PowerMaxOS 5978, Dell Unisphere 360, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Solutions Enabler Virtual Appliance, and Dell PowerMax EEM Secu

Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system.

Red Hat Security Advisory 2023-7665-03

Red Hat Security Advisory 2023-7665-03 - An update for linux-firmware is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Issues addressed include an information leakage vulnerability.

Red Hat Security Advisory 2023-7557-01

Red Hat Security Advisory 2023-7557-01 - An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include information leakage and use-after-free vulnerabilities.

CVE-2023-43057: Security Bulletin: IBM QRadar SIEM contains multiple vulnerabilities

IBM QRadar SIEM 7.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 267484.

RHSA-2023:5591: Red Hat Security Advisory: linux-firmware security update

An update for linux-firmware is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances.

RHSA-2023:5419: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances. * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilter subsystem of the Linux kernel when processing batch requests to update nf_tables configurat...

Red Hat Security Advisory 2023-5245-01

Red Hat Security Advisory 2023-5245-01 - The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Issues addressed include an information leakage vulnerability.

RHSA-2023:4819: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances. * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE pa...

RHSA-2023:4821: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances. * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE...

Red Hat Security Advisory 2023-4696-01

Red Hat Security Advisory 2023-4696-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2023:4696: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances. * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilter subsystem of the Linux kernel when processing batch requests to update nf_tables configurat...

Debian Security Advisory 5462-1

Debian Linux Security Advisory 5462-1 - Tavis Ormandy discovered that under specific microarchitectural circumstances, a vector register in AMD "Zen 2" CPUs may not be written to 0 correctly. This flaw allows an attacker to leak sensitive information across concurrent processes, hyper threads and virtualized guests.

Debian Security Advisory 5461-1

Debian Linux Security Advisory 5461-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Debian Security Advisory 5459-1

Debian Linux Security Advisory 5459-1 - Tavis Ormandy discovered that under specific microarchitectural circumstances, a vector register in "Zen 2" CPUs may not be written to 0 correctly. This flaw allows an attacker to leak register contents across concurrent processes, hyper threads and virtualized guests.

Ubuntu Security Notice USN-6244-1

Ubuntu Security Notice 6244-1 - Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.