Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:1590: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. In this flaw a normal privileged, local attacker may impact the system due to a locking issue in the compat path, leading to a kernel information leak problem.
Red Hat Security Data
#vulnerability#web#linux#red_hat#nodejs#js#java#kubernetes#aws#rpm#sap

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2023-04-04

Updated:

2023-04-04

RHSA-2023:1590 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 2163379 - CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM

kpatch-patch-4_18_0-147_74_1-1-4.el8_1.src.rpm

SHA-256: 3362626680ac01ffae31c000db399e0d4d12b9aa5fcb90332275bf8327cf34c7

kpatch-patch-4_18_0-147_76_1-1-3.el8_1.src.rpm

SHA-256: 9c72dd308f4906e68866b169ea3b3b6056865ca4b7a5f6e8be7bb9ef318a6742

kpatch-patch-4_18_0-147_77_1-1-3.el8_1.src.rpm

SHA-256: 1d6da516fbcabe48a91bbecfcd40c6ac1792fe2e7031e5c10c178bb0fe5d3659

kpatch-patch-4_18_0-147_78_1-1-2.el8_1.src.rpm

SHA-256: 2bab1ca3f626720bd295fa794dc2701e00650071c4c2c803a020c1a1a7706e5a

kpatch-patch-4_18_0-147_80_1-1-1.el8_1.src.rpm

SHA-256: b5dc90ecc2b0df22d74730103de47a3857c6fcc1e3b37f37af7af854be9bf1fe

ppc64le

kpatch-patch-4_18_0-147_74_1-1-4.el8_1.ppc64le.rpm

SHA-256: 409f53718e8d75e6cb5499a3168a7c6b72502dfa8d8cb5f1f36ccc2981b6ac48

kpatch-patch-4_18_0-147_74_1-debuginfo-1-4.el8_1.ppc64le.rpm

SHA-256: 08a0135d6dc46611920382908ac0ce3ac340e7643ee2f8ee9b6cf73cc73f48ec

kpatch-patch-4_18_0-147_74_1-debugsource-1-4.el8_1.ppc64le.rpm

SHA-256: acfbfba75951b353087feb946f11071fb7e3c662373d24d781f2ff8cdade7fe6

kpatch-patch-4_18_0-147_76_1-1-3.el8_1.ppc64le.rpm

SHA-256: 89cb3860d469333723434cdac09589a1df260f48d106bd57579fd6595869e782

kpatch-patch-4_18_0-147_76_1-debuginfo-1-3.el8_1.ppc64le.rpm

SHA-256: 4d9282583ce5d7ba9d3fcf1c06f2f69c058db577417d2d46db29a920183601a4

kpatch-patch-4_18_0-147_76_1-debugsource-1-3.el8_1.ppc64le.rpm

SHA-256: 787ceca966db04d4f3299e05a4afcc5a00a2f2215974ec93a939c1dc8f9c4e2b

kpatch-patch-4_18_0-147_77_1-1-3.el8_1.ppc64le.rpm

SHA-256: 3c46b39900730b194d1d859716eac63ba75006f2e651f88777400796a38cec21

kpatch-patch-4_18_0-147_77_1-debuginfo-1-3.el8_1.ppc64le.rpm

SHA-256: a3cb0149dabce503b21a68dc1090b93c5ee3bf1bc7676537e03f556717d59dc4

kpatch-patch-4_18_0-147_77_1-debugsource-1-3.el8_1.ppc64le.rpm

SHA-256: aea82da54d2b6a2b471d8e543731eb90360f5ec7879186dae378ebed369a385c

kpatch-patch-4_18_0-147_78_1-1-2.el8_1.ppc64le.rpm

SHA-256: fc662634d92e6558d08956ce3234e99e34e11572d7b6f078a2ba10590af57630

kpatch-patch-4_18_0-147_78_1-debuginfo-1-2.el8_1.ppc64le.rpm

SHA-256: 498b9262606cd6e37ae9b0d1850947e11db106ef70c54f7c5165f508d8e7fc1a

kpatch-patch-4_18_0-147_78_1-debugsource-1-2.el8_1.ppc64le.rpm

SHA-256: 3c814cd86d5d2ce767e566f246aaf556b7d9c06695e54d62c6264c85a2a32a1f

kpatch-patch-4_18_0-147_80_1-1-1.el8_1.ppc64le.rpm

SHA-256: 222fca23968448e5c671205dbfb0c950fae80a3cb900940502efb2fc57ceb619

kpatch-patch-4_18_0-147_80_1-debuginfo-1-1.el8_1.ppc64le.rpm

SHA-256: 3b04407f4d1c38da44e9615308fbeb431857979572f75e29b222c27714ccb2b9

kpatch-patch-4_18_0-147_80_1-debugsource-1-1.el8_1.ppc64le.rpm

SHA-256: 922ce7858dbf4b59e5f9ddc99e3dd1861dddf1e8304eeff9e0646836cf4288ac

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM

kpatch-patch-4_18_0-147_74_1-1-4.el8_1.src.rpm

SHA-256: 3362626680ac01ffae31c000db399e0d4d12b9aa5fcb90332275bf8327cf34c7

kpatch-patch-4_18_0-147_76_1-1-3.el8_1.src.rpm

SHA-256: 9c72dd308f4906e68866b169ea3b3b6056865ca4b7a5f6e8be7bb9ef318a6742

kpatch-patch-4_18_0-147_77_1-1-3.el8_1.src.rpm

SHA-256: 1d6da516fbcabe48a91bbecfcd40c6ac1792fe2e7031e5c10c178bb0fe5d3659

kpatch-patch-4_18_0-147_78_1-1-2.el8_1.src.rpm

SHA-256: 2bab1ca3f626720bd295fa794dc2701e00650071c4c2c803a020c1a1a7706e5a

kpatch-patch-4_18_0-147_80_1-1-1.el8_1.src.rpm

SHA-256: b5dc90ecc2b0df22d74730103de47a3857c6fcc1e3b37f37af7af854be9bf1fe

x86_64

kpatch-patch-4_18_0-147_74_1-1-4.el8_1.x86_64.rpm

SHA-256: 708f897b7292329108e5c6eaf71cb87b4679bd0a513aa26c4f5ae124ec4c0d2b

kpatch-patch-4_18_0-147_74_1-debuginfo-1-4.el8_1.x86_64.rpm

SHA-256: 5fd847da66517f2a38e07d71d224b029596cdb8ea115907e5629d010152afc87

kpatch-patch-4_18_0-147_74_1-debugsource-1-4.el8_1.x86_64.rpm

SHA-256: fd3efce500697bd2e2a2047ce8d00cb69237b26469c0aaf702bdecfc000508b4

kpatch-patch-4_18_0-147_76_1-1-3.el8_1.x86_64.rpm

SHA-256: f913156a5763d1aa513df8dbea305f8e9ccd64d80534e4a0da48733118eba8bc

kpatch-patch-4_18_0-147_76_1-debuginfo-1-3.el8_1.x86_64.rpm

SHA-256: 5a73da6c8f864c031a217cb2d3e3604cca57be12dadaa94641b9d4a54f46d364

kpatch-patch-4_18_0-147_76_1-debugsource-1-3.el8_1.x86_64.rpm

SHA-256: 8ea235b1ffe4f303f2542ae38a6f469cbb7d08bf6581aad05d0d179a0379f76f

kpatch-patch-4_18_0-147_77_1-1-3.el8_1.x86_64.rpm

SHA-256: 40d526e14387313978fbcdc56cde2ed57a9518ffff31adc5b214b957236124aa

kpatch-patch-4_18_0-147_77_1-debuginfo-1-3.el8_1.x86_64.rpm

SHA-256: 2b77700b7ca6c867915d837b7a6f451a83743acf040157ea635b4c41b3c011f2

kpatch-patch-4_18_0-147_77_1-debugsource-1-3.el8_1.x86_64.rpm

SHA-256: 32d1ff556704966a05764341564155566319cebdb147812e08322984431f8e4d

kpatch-patch-4_18_0-147_78_1-1-2.el8_1.x86_64.rpm

SHA-256: c2817fe051282d0c6e9983ab6ea2cb422bb87e23ece0e6a54cbc9b8fc7e2b1ee

kpatch-patch-4_18_0-147_78_1-debuginfo-1-2.el8_1.x86_64.rpm

SHA-256: 4899ec94c03ab2a62ca099c6c0dc21796eea3a923f2b66755536b9ef407187b6

kpatch-patch-4_18_0-147_78_1-debugsource-1-2.el8_1.x86_64.rpm

SHA-256: 8bf647172cde35be8b5b3d8315723846f3f8f7b201e6a03687eb0c1e5bb88e55

kpatch-patch-4_18_0-147_80_1-1-1.el8_1.x86_64.rpm

SHA-256: c15d49d7ee70e9c212960c876e957f17d9fd43a92cddfaedc311bbcb6b50cf41

kpatch-patch-4_18_0-147_80_1-debuginfo-1-1.el8_1.x86_64.rpm

SHA-256: ee79d87ebfad44022aa17b4371ffe47c4ed5324b28011ad0e50ffc3db89a285c

kpatch-patch-4_18_0-147_80_1-debugsource-1-1.el8_1.x86_64.rpm

SHA-256: eee559dc16b84a0cb0ecd80c2713e91c17d66b3c2d4aca26b2c5fc1ca7d6d022

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Related news

Critical libwebp Vulnerability Under Active Exploitation - Gets Maximum CVSS Score

Google has assigned a new CVE identifier for a critical security flaw in the libwebp image library for rendering images in the WebP format that has come under active exploitation in the wild. Tracked as CVE-2023-5129, the issue has been given the maximum severity score of 10.0 on the CVSS rating system. It has been described as an issue rooted in the Huffman coding algorithm - With a specially

CVE-2023-23694: DSA-2023-071: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities – 7.0.450

Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

Red Hat Security Advisory 2023-2104-01

Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2023:1953: Red Hat Security Advisory: Logging Subsystem 5.6.5 - Red Hat OpenShift security update

Logging Subsystem 5.6.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-27539: A denial of service vulnerability was found in rubygem-rack in how it parses headers. A carefully crafted input can cause header parsing to take an unexpected amount of time, possibly resulting in a denial of service. * CVE-2023-28120: A Cross-Site-Scripting vulnerability was found in rubygem ActiveSupport. If the new bytesplice method is called on a SafeBuffer with untrus...

Red Hat Security Advisory 2023-1677-01

Red Hat Security Advisory 2023-1677-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow and integer overflow vulnerabilities.

Red Hat Security Advisory 2023-1656-01

Red Hat Security Advisory 2023-1656-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.56.

Red Hat Security Advisory 2023-1590-01

Red Hat Security Advisory 2023-1590-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-1559-01

Red Hat Security Advisory 2023-1559-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-1556-01

Red Hat Security Advisory 2023-1556-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

RHSA-2023:1559: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw al...

RHSA-2023:1556: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue. * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context...

Google reveals spyware attack on Android, iOS, and Chrome

By Habiba Rashid Google's Threat Analysis Group (TAG) labeled the spyware campaign as limited but highly targeted. This is a post from HackRead.com Read the original post: Google reveals spyware attack on Android, iOS, and Chrome

Ubuntu Security Notice USN-5982-1

Ubuntu Security Notice 5982-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5979-1

Ubuntu Security Notice 5979-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that a race condition existed in the Xen network backend driver in the Linux kernel when handling dropped packets in certain circumstances. An attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5940-1

Ubuntu Security Notice 5940-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5915-1

Ubuntu Security Notice 5915-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

CVE-2023-0266: ALSA: control: code refactoring for ELEM_READ/ELEM_WRITE operations · torvalds/linux@becf9e5

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e