Headline
RHSA-2023:5622: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-3609: A double-free flaw was found in u32_set_parms in net/sched/cls_u32.c in the Network Scheduler component in the Linux kernel. This flaw allows a local attacker to use a failure event to mishandle the reference counter, leading to a local privilege escalation threat.
- CVE-2023-32233: A use-after-free vulnerability was found in the Netfilter subsystem of the Linux kernel when processing batch requests to update nf_tables configuration. This vulnerability can be abused to perform arbitrary reads and writes in kernel memory. A local user (with CAP_NET_ADMIN capability) could use this flaw to crash the system or potentially escalate their privileges on the system.
- CVE-2023-35001: An out-of-bounds (OOB) memory access flaw was found in the Netfilter module in the Linux kernel’s nft_byteorder_eval in net/netfilter/nft_byteorder.c. A bound check failure allows a local attacker with CAP_NET_ADMIN access to cause a local privilege escalation issue due to incorrect data alignment.
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609)
- kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
- kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Low memory deadlock with md devices and external (imsm) metadata handling (BZ#1703180)
- cifs: memory leak in smb2_query_symlink (BZ#2166706)
- bnxt_en: panic in bnxt_tx_int Redux (BZ#2175062)
- NFS client loop in BIND_CONN_TO_SESSION (BZ#2219604)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Workstation 7 x86_64
- Red Hat Enterprise Linux Desktop 7 x86_64
- Red Hat Enterprise Linux for IBM z Systems 7 s390x
- Red Hat Enterprise Linux for Power, big endian 7 ppc64
- Red Hat Enterprise Linux for Scientific Computing 7 x86_64
- Red Hat Enterprise Linux for Power, little endian 7 ppc64le
Fixes
- BZ - 2196105 - CVE-2023-32233 kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
- BZ - 2220892 - CVE-2023-35001 kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
- BZ - 2225201 - CVE-2023-3609 kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails
Red Hat Enterprise Linux Server 7
SRPM
kernel-3.10.0-1160.102.1.el7.src.rpm
SHA-256: c20d32062b5eb757dcc3041b57ff8b0cd9ca9c12545f40cc3ceac6d203c2ab41
x86_64
bpftool-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 75afba6077271912c1cd0ac2bf573810f2ce2d21ee43a6fad1bc3a0930b364b2
bpftool-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 530e7131b5ebd3c7bd17cccbabd870dfe92d22adc194d3b15a23cde9282b6ffc
bpftool-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 530e7131b5ebd3c7bd17cccbabd870dfe92d22adc194d3b15a23cde9282b6ffc
kernel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 2c0283a4ef5d780ef7bb721a57076a15f8118a5c6781d71e83b0715b39b351ef
kernel-abi-whitelists-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 3d61458561ed9f748c00ea18c5afa6e71ed49b92ba0fbcff3107a89e3809f7f0
kernel-debug-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: f6bfa8f7807679e2249931fc8337a093f8ace1124690c9f22142eb09e0a40d91
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 4ef97649d7127cfa86637a41cf547d18a767c04f7a75c67e3579f34757c60cbf
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 4ef97649d7127cfa86637a41cf547d18a767c04f7a75c67e3579f34757c60cbf
kernel-debug-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: fe0a66f87e1a0c0f0f15e6383932686e3bbc5ece1ac83561a4c1236474db4f37
kernel-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: d119fee7ab7a1bd3dd71fc917f312a56d9941853eff87fea11e480ad9630fb3b
kernel-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: d119fee7ab7a1bd3dd71fc917f312a56d9941853eff87fea11e480ad9630fb3b
kernel-debuginfo-common-x86_64-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: a6db75830b58503928507b3487bef7151db64ee37d3f77fe0e422639d468c592
kernel-debuginfo-common-x86_64-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: a6db75830b58503928507b3487bef7151db64ee37d3f77fe0e422639d468c592
kernel-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 5ee9913675a3ab4af77fbe7f72c2d01e8453860b4e6538a980d1200795403aff
kernel-doc-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 1e8064c1c461ce438a28b053fea8fecbc6133db969d3a2b9f6ceff57e672b8b3
kernel-headers-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 06226acf17276b72703ac1d2c923ac7208406fb876862693216f44cff6a196bb
kernel-tools-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 2fbd33deb9a56c5f9ce9911bfe2eabba4eb40771043ef91ffea56a4ecbca87cd
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: b945778f9555897e21f6f36f3a2812e6af71d700b6a06a669ec97c134d984e44
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: b945778f9555897e21f6f36f3a2812e6af71d700b6a06a669ec97c134d984e44
kernel-tools-libs-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 98a6cd4e4d7940b23ddbe1bbc3b73583bad6817f82e3efabc6bbb4d37efa1d9d
kernel-tools-libs-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 100ff75aae8cdaf548d0762a9388bd6420d6e83c3610b613ebae7b03ce53f487
perf-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 9659a8d5f3a937fbd6d4e2c70f06c65bafcb9b427f2e35f892cd32c0d997b812
perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ebbe09327812ab296f34152d63a115c64ea4461ec328986994466db609160151
perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ebbe09327812ab296f34152d63a115c64ea4461ec328986994466db609160151
python-perf-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ddc15bc564b3265cac8238dc462f6e1c8a16ef45f31821ba4d8d5e2f4a475153
python-perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 502a477373ab659ec9829d08ecc0ed882d997ceed76a42436d0a8476bd15bbe8
python-perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 502a477373ab659ec9829d08ecc0ed882d997ceed76a42436d0a8476bd15bbe8
Red Hat Enterprise Linux Workstation 7
SRPM
kernel-3.10.0-1160.102.1.el7.src.rpm
SHA-256: c20d32062b5eb757dcc3041b57ff8b0cd9ca9c12545f40cc3ceac6d203c2ab41
x86_64
bpftool-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 75afba6077271912c1cd0ac2bf573810f2ce2d21ee43a6fad1bc3a0930b364b2
bpftool-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 530e7131b5ebd3c7bd17cccbabd870dfe92d22adc194d3b15a23cde9282b6ffc
bpftool-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 530e7131b5ebd3c7bd17cccbabd870dfe92d22adc194d3b15a23cde9282b6ffc
kernel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 2c0283a4ef5d780ef7bb721a57076a15f8118a5c6781d71e83b0715b39b351ef
kernel-abi-whitelists-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 3d61458561ed9f748c00ea18c5afa6e71ed49b92ba0fbcff3107a89e3809f7f0
kernel-debug-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: f6bfa8f7807679e2249931fc8337a093f8ace1124690c9f22142eb09e0a40d91
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 4ef97649d7127cfa86637a41cf547d18a767c04f7a75c67e3579f34757c60cbf
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 4ef97649d7127cfa86637a41cf547d18a767c04f7a75c67e3579f34757c60cbf
kernel-debug-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: fe0a66f87e1a0c0f0f15e6383932686e3bbc5ece1ac83561a4c1236474db4f37
kernel-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: d119fee7ab7a1bd3dd71fc917f312a56d9941853eff87fea11e480ad9630fb3b
kernel-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: d119fee7ab7a1bd3dd71fc917f312a56d9941853eff87fea11e480ad9630fb3b
kernel-debuginfo-common-x86_64-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: a6db75830b58503928507b3487bef7151db64ee37d3f77fe0e422639d468c592
kernel-debuginfo-common-x86_64-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: a6db75830b58503928507b3487bef7151db64ee37d3f77fe0e422639d468c592
kernel-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 5ee9913675a3ab4af77fbe7f72c2d01e8453860b4e6538a980d1200795403aff
kernel-doc-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 1e8064c1c461ce438a28b053fea8fecbc6133db969d3a2b9f6ceff57e672b8b3
kernel-headers-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 06226acf17276b72703ac1d2c923ac7208406fb876862693216f44cff6a196bb
kernel-tools-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 2fbd33deb9a56c5f9ce9911bfe2eabba4eb40771043ef91ffea56a4ecbca87cd
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: b945778f9555897e21f6f36f3a2812e6af71d700b6a06a669ec97c134d984e44
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: b945778f9555897e21f6f36f3a2812e6af71d700b6a06a669ec97c134d984e44
kernel-tools-libs-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 98a6cd4e4d7940b23ddbe1bbc3b73583bad6817f82e3efabc6bbb4d37efa1d9d
kernel-tools-libs-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 100ff75aae8cdaf548d0762a9388bd6420d6e83c3610b613ebae7b03ce53f487
perf-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 9659a8d5f3a937fbd6d4e2c70f06c65bafcb9b427f2e35f892cd32c0d997b812
perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ebbe09327812ab296f34152d63a115c64ea4461ec328986994466db609160151
perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ebbe09327812ab296f34152d63a115c64ea4461ec328986994466db609160151
python-perf-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ddc15bc564b3265cac8238dc462f6e1c8a16ef45f31821ba4d8d5e2f4a475153
python-perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 502a477373ab659ec9829d08ecc0ed882d997ceed76a42436d0a8476bd15bbe8
python-perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 502a477373ab659ec9829d08ecc0ed882d997ceed76a42436d0a8476bd15bbe8
Red Hat Enterprise Linux Desktop 7
SRPM
kernel-3.10.0-1160.102.1.el7.src.rpm
SHA-256: c20d32062b5eb757dcc3041b57ff8b0cd9ca9c12545f40cc3ceac6d203c2ab41
x86_64
bpftool-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 75afba6077271912c1cd0ac2bf573810f2ce2d21ee43a6fad1bc3a0930b364b2
bpftool-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 530e7131b5ebd3c7bd17cccbabd870dfe92d22adc194d3b15a23cde9282b6ffc
bpftool-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 530e7131b5ebd3c7bd17cccbabd870dfe92d22adc194d3b15a23cde9282b6ffc
kernel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 2c0283a4ef5d780ef7bb721a57076a15f8118a5c6781d71e83b0715b39b351ef
kernel-abi-whitelists-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 3d61458561ed9f748c00ea18c5afa6e71ed49b92ba0fbcff3107a89e3809f7f0
kernel-debug-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: f6bfa8f7807679e2249931fc8337a093f8ace1124690c9f22142eb09e0a40d91
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 4ef97649d7127cfa86637a41cf547d18a767c04f7a75c67e3579f34757c60cbf
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 4ef97649d7127cfa86637a41cf547d18a767c04f7a75c67e3579f34757c60cbf
kernel-debug-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: fe0a66f87e1a0c0f0f15e6383932686e3bbc5ece1ac83561a4c1236474db4f37
kernel-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: d119fee7ab7a1bd3dd71fc917f312a56d9941853eff87fea11e480ad9630fb3b
kernel-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: d119fee7ab7a1bd3dd71fc917f312a56d9941853eff87fea11e480ad9630fb3b
kernel-debuginfo-common-x86_64-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: a6db75830b58503928507b3487bef7151db64ee37d3f77fe0e422639d468c592
kernel-debuginfo-common-x86_64-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: a6db75830b58503928507b3487bef7151db64ee37d3f77fe0e422639d468c592
kernel-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 5ee9913675a3ab4af77fbe7f72c2d01e8453860b4e6538a980d1200795403aff
kernel-doc-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 1e8064c1c461ce438a28b053fea8fecbc6133db969d3a2b9f6ceff57e672b8b3
kernel-headers-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 06226acf17276b72703ac1d2c923ac7208406fb876862693216f44cff6a196bb
kernel-tools-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 2fbd33deb9a56c5f9ce9911bfe2eabba4eb40771043ef91ffea56a4ecbca87cd
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: b945778f9555897e21f6f36f3a2812e6af71d700b6a06a669ec97c134d984e44
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: b945778f9555897e21f6f36f3a2812e6af71d700b6a06a669ec97c134d984e44
kernel-tools-libs-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 98a6cd4e4d7940b23ddbe1bbc3b73583bad6817f82e3efabc6bbb4d37efa1d9d
kernel-tools-libs-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 100ff75aae8cdaf548d0762a9388bd6420d6e83c3610b613ebae7b03ce53f487
perf-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 9659a8d5f3a937fbd6d4e2c70f06c65bafcb9b427f2e35f892cd32c0d997b812
perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ebbe09327812ab296f34152d63a115c64ea4461ec328986994466db609160151
perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ebbe09327812ab296f34152d63a115c64ea4461ec328986994466db609160151
python-perf-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ddc15bc564b3265cac8238dc462f6e1c8a16ef45f31821ba4d8d5e2f4a475153
python-perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 502a477373ab659ec9829d08ecc0ed882d997ceed76a42436d0a8476bd15bbe8
python-perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 502a477373ab659ec9829d08ecc0ed882d997ceed76a42436d0a8476bd15bbe8
Red Hat Enterprise Linux for IBM z Systems 7
SRPM
kernel-3.10.0-1160.102.1.el7.src.rpm
SHA-256: c20d32062b5eb757dcc3041b57ff8b0cd9ca9c12545f40cc3ceac6d203c2ab41
s390x
bpftool-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: 018d526dbe24db2b83759e2fed8f5514eeb52c8890d448213edad832ff8da2e7
bpftool-debuginfo-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: ed51e6c7c9a79f50040649099161f6cc0f479bf1758682ceb6d89c0ec010b097
kernel-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: bd1c71fc09da19df2437c0b4630d19ad5b4beb19c38943abe5cac3ac37ab5297
kernel-abi-whitelists-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 3d61458561ed9f748c00ea18c5afa6e71ed49b92ba0fbcff3107a89e3809f7f0
kernel-debug-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: 42a2987eeb41c8a51633bf0c653ed51ad7b3a57fd0414b593655ab8e0eca9d26
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: fa1de3eb3ae835fd8a3c9b0ebeb4e48741b03d65dba8cfccd186e1089ace3828
kernel-debug-devel-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: 4fae829468fa6e464f202bcc6c1ffd3c28efb56d292daee3904474627c2d7eee
kernel-debuginfo-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: 551480d961c7ef533cac40ee1b4ef87f601ef5aa3fa63c54d52ebbfd98ad846f
kernel-debuginfo-common-s390x-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: 334cd39991f6793c494861901d6fc407255f6969aa67501f6ac6a7aa9d632346
kernel-devel-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: 99463c75cb61aba88908309c8b2b5e7668ddc34ada963ce27c5239efb1d32917
kernel-doc-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 1e8064c1c461ce438a28b053fea8fecbc6133db969d3a2b9f6ceff57e672b8b3
kernel-headers-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: 31eea54fbe2e4ef75bc72efcc233c3a06a148be4036a74b767e7e333c31e0b24
kernel-kdump-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: f5a22360156ce32f8e2ff5309fb45df43e955f58d3fb2a5ff07314f7e86a4e75
kernel-kdump-debuginfo-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: 939584e99c70df0dcaf08cce3983d2a56a5193bcf6eb6f4ac561d5b6c5a9b77f
kernel-kdump-devel-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: 1199ddab9738dd0729ca8bcedd066cb4a27423048e9eda2e3bff0abbaf259192
perf-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: 659be2f3ea42314b15b975a7081a977a6db4948207b24a4298ada5b06e178804
perf-debuginfo-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: deb6a5b7b492010886b4f768b1e84a55057d2289bcb3c3186e2b145f57eea6fb
python-perf-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: 13d2bf43a4bf908f3de76be9e097ff81b5170081fca66da95c3bdd5b317bfbd7
python-perf-debuginfo-3.10.0-1160.102.1.el7.s390x.rpm
SHA-256: a68e380b8ded442da01d5132b0badd8d5de11ca668597aadaf62f08e34db5031
Red Hat Enterprise Linux for Power, big endian 7
SRPM
kernel-3.10.0-1160.102.1.el7.src.rpm
SHA-256: c20d32062b5eb757dcc3041b57ff8b0cd9ca9c12545f40cc3ceac6d203c2ab41
ppc64
bpftool-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: e3b9bde1a611bdeaf251cf10bfddd6f90e691c5da55636c25e58404c3504dab8
bpftool-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 2165b1873b0c3b9b3c3eee0c5d14abb3d9abb1af2ea0342886d50eaf195b7b97
bpftool-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 2165b1873b0c3b9b3c3eee0c5d14abb3d9abb1af2ea0342886d50eaf195b7b97
kernel-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 9a047aa9de99d620a567344aef6853198be7795c19f62ae344a7fab935eda070
kernel-abi-whitelists-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 3d61458561ed9f748c00ea18c5afa6e71ed49b92ba0fbcff3107a89e3809f7f0
kernel-bootwrapper-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 8e4af4b1652427c5f78e2b366ccd4b5805b78eb6f4f7ffd6711318466cbe2b37
kernel-debug-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: fecd5d097f8c27e8be8d089697a78b8779e48528fe80c5d30befddb27abf3ef6
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: a899dd3b11b98e1c05b846e24e6eaaf9e0b9cd9a7b018fe8ed88c3c6f8a65af2
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: a899dd3b11b98e1c05b846e24e6eaaf9e0b9cd9a7b018fe8ed88c3c6f8a65af2
kernel-debug-devel-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: e0082cb4747e4478874d61e9ac7b310eacad233e3657e0be2336428f4c93f383
kernel-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 8828d5702d8b0a62f377e1abdcdf42d6b42fab5cb74cb816277e401899900d48
kernel-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 8828d5702d8b0a62f377e1abdcdf42d6b42fab5cb74cb816277e401899900d48
kernel-debuginfo-common-ppc64-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: dabfbdf8cb14a5b07055da2d649f44e94b62758b799aeefeb5aa53b23b8e8c07
kernel-debuginfo-common-ppc64-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: dabfbdf8cb14a5b07055da2d649f44e94b62758b799aeefeb5aa53b23b8e8c07
kernel-devel-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: f818cf5ba80593efbc7044ef5cf389dce93088a9a91e24c7b5a1b0664695b51e
kernel-doc-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 1e8064c1c461ce438a28b053fea8fecbc6133db969d3a2b9f6ceff57e672b8b3
kernel-headers-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: b8e2fb84d9637aecc03fba92ab39bff4d39a35b68b39d155b62083aae522130c
kernel-tools-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 96b315d0073cb1cb2b23636f27a3849e02eb5ad927f85c828ef4d9f7cef9fa22
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 691b36a9444656155f9823a9befd1cc3891355ee8b7c98f60be8cd38eb517e70
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 691b36a9444656155f9823a9befd1cc3891355ee8b7c98f60be8cd38eb517e70
kernel-tools-libs-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: d3898dce06f15ce52107e7cb5161c93f66f200d011bf374bf0fcc6d728b08683
kernel-tools-libs-devel-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 1df153d0cc775e06b7b0c2a0a64352c13f7895e690d7689aec540d1c35a2dd5d
perf-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: cbb86d8c8103d18c1edd7604e2c5db381b05e2186c443b5e742fcae3f7b956e1
perf-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 3747812c0697de669c934ee6c0349444318b3d2281ff7f7d9f5a7e4e9aecfc4f
perf-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 3747812c0697de669c934ee6c0349444318b3d2281ff7f7d9f5a7e4e9aecfc4f
python-perf-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: fda9b79d44bffbb7298427acf646d9c37cb6717ae044c9e655aa6ee860f35e71
python-perf-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 70601d4c5e1a995eb69470ed1a7793a32b25ea8ada50610bf1e56c4677cb98df
python-perf-debuginfo-3.10.0-1160.102.1.el7.ppc64.rpm
SHA-256: 70601d4c5e1a995eb69470ed1a7793a32b25ea8ada50610bf1e56c4677cb98df
Red Hat Enterprise Linux for Scientific Computing 7
SRPM
kernel-3.10.0-1160.102.1.el7.src.rpm
SHA-256: c20d32062b5eb757dcc3041b57ff8b0cd9ca9c12545f40cc3ceac6d203c2ab41
x86_64
bpftool-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 75afba6077271912c1cd0ac2bf573810f2ce2d21ee43a6fad1bc3a0930b364b2
bpftool-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 530e7131b5ebd3c7bd17cccbabd870dfe92d22adc194d3b15a23cde9282b6ffc
bpftool-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 530e7131b5ebd3c7bd17cccbabd870dfe92d22adc194d3b15a23cde9282b6ffc
kernel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 2c0283a4ef5d780ef7bb721a57076a15f8118a5c6781d71e83b0715b39b351ef
kernel-abi-whitelists-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 3d61458561ed9f748c00ea18c5afa6e71ed49b92ba0fbcff3107a89e3809f7f0
kernel-debug-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: f6bfa8f7807679e2249931fc8337a093f8ace1124690c9f22142eb09e0a40d91
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 4ef97649d7127cfa86637a41cf547d18a767c04f7a75c67e3579f34757c60cbf
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 4ef97649d7127cfa86637a41cf547d18a767c04f7a75c67e3579f34757c60cbf
kernel-debug-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: fe0a66f87e1a0c0f0f15e6383932686e3bbc5ece1ac83561a4c1236474db4f37
kernel-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: d119fee7ab7a1bd3dd71fc917f312a56d9941853eff87fea11e480ad9630fb3b
kernel-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: d119fee7ab7a1bd3dd71fc917f312a56d9941853eff87fea11e480ad9630fb3b
kernel-debuginfo-common-x86_64-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: a6db75830b58503928507b3487bef7151db64ee37d3f77fe0e422639d468c592
kernel-debuginfo-common-x86_64-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: a6db75830b58503928507b3487bef7151db64ee37d3f77fe0e422639d468c592
kernel-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 5ee9913675a3ab4af77fbe7f72c2d01e8453860b4e6538a980d1200795403aff
kernel-doc-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 1e8064c1c461ce438a28b053fea8fecbc6133db969d3a2b9f6ceff57e672b8b3
kernel-headers-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 06226acf17276b72703ac1d2c923ac7208406fb876862693216f44cff6a196bb
kernel-tools-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 2fbd33deb9a56c5f9ce9911bfe2eabba4eb40771043ef91ffea56a4ecbca87cd
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: b945778f9555897e21f6f36f3a2812e6af71d700b6a06a669ec97c134d984e44
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: b945778f9555897e21f6f36f3a2812e6af71d700b6a06a669ec97c134d984e44
kernel-tools-libs-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 98a6cd4e4d7940b23ddbe1bbc3b73583bad6817f82e3efabc6bbb4d37efa1d9d
kernel-tools-libs-devel-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 100ff75aae8cdaf548d0762a9388bd6420d6e83c3610b613ebae7b03ce53f487
perf-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 9659a8d5f3a937fbd6d4e2c70f06c65bafcb9b427f2e35f892cd32c0d997b812
perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ebbe09327812ab296f34152d63a115c64ea4461ec328986994466db609160151
perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ebbe09327812ab296f34152d63a115c64ea4461ec328986994466db609160151
python-perf-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: ddc15bc564b3265cac8238dc462f6e1c8a16ef45f31821ba4d8d5e2f4a475153
python-perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 502a477373ab659ec9829d08ecc0ed882d997ceed76a42436d0a8476bd15bbe8
python-perf-debuginfo-3.10.0-1160.102.1.el7.x86_64.rpm
SHA-256: 502a477373ab659ec9829d08ecc0ed882d997ceed76a42436d0a8476bd15bbe8
Red Hat Enterprise Linux for Power, little endian 7
SRPM
kernel-3.10.0-1160.102.1.el7.src.rpm
SHA-256: c20d32062b5eb757dcc3041b57ff8b0cd9ca9c12545f40cc3ceac6d203c2ab41
ppc64le
bpftool-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: d627cd6251623b567e14acdeb88ad71ec3f48608771fdb2cf411af8581463f09
bpftool-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 2c8976c28399b653749e5e0e690563b5583f7545307906a5105d8c6f5a2ead64
bpftool-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 2c8976c28399b653749e5e0e690563b5583f7545307906a5105d8c6f5a2ead64
kernel-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: dc2a183aa80471091410d25cf25fd2235eb406962a791df6a0a20998ea2bfd80
kernel-abi-whitelists-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 3d61458561ed9f748c00ea18c5afa6e71ed49b92ba0fbcff3107a89e3809f7f0
kernel-bootwrapper-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 1dd18c66da591141b5e9b092576c72971fc8bb44f11d0f80478fe56884224a2a
kernel-debug-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: e3db8b54c881225772065e3ad9851183fecac16e1557fc535d4a7252a93e5a6c
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 97c4f6d45f6c313b7e0a3e1553f6ac9a6994972e58a14ef5cf5b86135cc57909
kernel-debug-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 97c4f6d45f6c313b7e0a3e1553f6ac9a6994972e58a14ef5cf5b86135cc57909
kernel-debug-devel-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: a4a94329ac992fd5b99bac80fed851e44e9951c3748e7768fe051ac2f51e4982
kernel-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: d8776a6a5016fa55c325d9187c2717426f4dd3066b6d9a8061c8caf53f8fcab2
kernel-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: d8776a6a5016fa55c325d9187c2717426f4dd3066b6d9a8061c8caf53f8fcab2
kernel-debuginfo-common-ppc64le-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: c761e7a9e46e235b47c34134dda9fbfdd8be81b707dd149f203be322f7013a7f
kernel-debuginfo-common-ppc64le-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: c761e7a9e46e235b47c34134dda9fbfdd8be81b707dd149f203be322f7013a7f
kernel-devel-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 331bc6c9284c3712954e2bfedbc4feef769fa5fac077e150a8a3ed0127ad62e8
kernel-doc-3.10.0-1160.102.1.el7.noarch.rpm
SHA-256: 1e8064c1c461ce438a28b053fea8fecbc6133db969d3a2b9f6ceff57e672b8b3
kernel-headers-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 0a8b5b7d9d001e0d5a4b3756937b33ee7b31db8465e01181ed05e1807246b2a7
kernel-tools-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 8880350a393d6608c6e8c52c1a9cca6001d0a066e23a8eebcf90a369bc242233
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 3189369460aa0e161f9c5ffafa288fbc527bebab6993150b3122914b657529d9
kernel-tools-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 3189369460aa0e161f9c5ffafa288fbc527bebab6993150b3122914b657529d9
kernel-tools-libs-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 4feed77e130f27f584f700b177ecf1f248603b8cdb266a2c7a05f6b58e7fffe4
kernel-tools-libs-devel-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: e2b19533250b4b39918b612bc11161ed371cf9e01dd832683295e3c3073ef41e
perf-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 9c21d43430b557206984e5edf7be05194504a8acb6f28ab91a58319b97d69958
perf-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 3880f251417f23d356667bbae7801be9b9c8557ab5df7c9f247f11eb75d107bd
perf-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 3880f251417f23d356667bbae7801be9b9c8557ab5df7c9f247f11eb75d107bd
python-perf-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: b16755d122ca9c36436d2a73e01cec10c38d1bb74ca5d6549f3b1c69e4603d45
python-perf-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 95eb293b7d01831a6429e6a9c0aed21d764e07c1b1f5ed986d3a6745111e1fe4
python-perf-debuginfo-3.10.0-1160.102.1.el7.ppc64le.rpm
SHA-256: 95eb293b7d01831a6429e6a9c0aed21d764e07c1b1f5ed986d3a6745111e1fe4
Related news
Red Hat Security Advisory 2024-1250-03 - An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Issues addressed include memory exhaustion, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2024-0999-03 - An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support. Issues addressed include a use-after-free vulnerability.
Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system.
Red Hat Security Advisory 2023-7558-01 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-7434-01 - An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-7418-01 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-7077-01 - An update for kernel is now available for Red Hat Enterprise Linux 8. Issues addressed include buffer overflow, denial of service, double free, information leakage, memory leak, null pointer, out of bounds access, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5794-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-5775-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-5628-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5621-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5575-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3609: A double-free flaw was found in u32_set_parms in net/sched/cls_u32.c in the Network Scheduler component in the Linux kernel. This flaw allows a local attacker to use a failure event to mishandle the reference counter, leading to a local privilege escalation threat. * CVE-2023-32233: A use-after-free vulnerability was found in the Netfilter s...
An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35001: An out-of-bounds (OOB) memory access flaw was found in the Netfilter module in the Linux kernel's nft_byteorder_eval in net/netfilter/nft_byteorder.c. A bound check failure allows a local attacker with CAP_NET_ADMIN access to cause a local privilege escalation issue due to incorrect data alignment.
Ubuntu Security Notice 6397-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3390: A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system. * CVE...
Red Hat Security Advisory 2023-4967-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which ...
Ubuntu Security Notice 6332-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6331-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6329-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6328-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6325-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6317-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6318-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6315-1 - Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6260-1 - It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges.
Ubuntu Security Notice 6250-1 - Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform data buffer size validation in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly expose sensitive information. Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service (guest crash). Various other issues were also addressed.
Ubuntu Security Notice 6247-1 - David Leadbeater discovered that the netfilter IRC protocol tracking implementation in the Linux Kernel incorrectly handled certain message payloads in some situations. A remote attacker could possibly use this to cause a denial of service or bypass firewall filtering. It was discovered that the IDT 77252 ATM PCI device driver in the Linux kernel did not properly remove any pending timers during device exit, resulting in a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 6246-1 - It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2023-4256-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.
Red Hat Security Advisory 2023-4146-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include denial of service, privilege escalation, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-1281: A use-after-free vulnerability w...
Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace
Red Hat Security Advisory 2023-3853-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-3490-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-3465-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-3470-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-2008: A flaw was found in the Linux kernel's udm...
Ubuntu Security Notice 6122-1 - Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service.
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.