[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2023:2951-01 -- Redhat kernel, bpftool, perf, python3-perf

ID: oval:org.secpod.oval:def:507734Date: (C)2023-06-05   (M)2024-04-25
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. The following packages have been upgraded to a later upstream version: kernel . Security Fix: * use-after-free caused by l2cap_reassemble_sdu in net/bluetooth/l2cap_core.c * net/ulp: use-after-free in listening ULP sockets * hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch * malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory * when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds * possible race condition in drivers/tty/tty_buffers.c * use-after-free in ath9k_htc_probe_device could cause an escalation of privileges * KVM: NULL pointer dereference in kvm_mmu_invpcid_gva * KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks * netfilter: nf_conntrack_irc message handling issue * race condition in xfrm_probe_algs can lead to OOB read/write * media: em28xx: initialize refcount before kref_get * race condition in hugetlb_no_page in mm/hugetlb.c * memory leak in ipv6_renew_options * data races around icsk-icsk_af_ops in do_ipv6_setsockopt * data races around sk-sk_prot * memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c * denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry * use-after-free after failed devlink reload in devlink_param_get * USB-accessible buffer overflow in brcmfmac * Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed * l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference * igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets * Executable Space Protection Bypass * Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option * unmap_mapping_range race with munmap on VM_PFNMAP mappings leads to stale TLB entry * TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning * Report vmalloc UAF in dvb-core/dmxdev * u8 overflow problem in cfg80211_update_notlisted_nontrans * use-after-free related to leaf anon_vma double reuse * use-after-free in bss_ref_get in net/wireless/scan.c * BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c * Denial of service in beacon protection for P2P-device * memory corruption in usbmon driver * NULL pointer dereference in traffic control subsystem * NULL pointer dereference in rawv6_push_pending_frames * use-after-free caused by invalid pointer hostname in fs/cifs/connect.c * Soft lockup occurred during __page_mapcount * slab-out-of-bounds read vulnerabilities in cbq_classify For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.

Platform:
Red Hat Enterprise Linux 8
Product:
kernel
bpftool
perf
python3-perf
Reference:
RHSA-2023:2951-01
CVE-2021-26341
CVE-2021-33655
CVE-2021-33656
CVE-2022-1462
CVE-2022-1679
CVE-2022-1789
CVE-2022-2196
CVE-2022-2663
CVE-2022-3028
CVE-2022-3239
CVE-2022-3522
CVE-2022-3524
CVE-2022-3564
CVE-2022-3566
CVE-2022-3567
CVE-2022-3619
CVE-2022-3623
CVE-2022-3625
CVE-2022-3628
CVE-2022-3707
CVE-2022-4129
CVE-2022-20141
CVE-2022-25265
CVE-2022-30594
CVE-2022-39188
CVE-2022-39189
CVE-2022-41218
CVE-2022-41674
CVE-2022-42703
CVE-2022-42720
CVE-2022-42721
CVE-2022-42722
CVE-2022-43750
CVE-2022-47929
CVE-2023-0394
CVE-2023-0461
CVE-2023-1195
CVE-2023-1582
CVE-2023-23454
CVE-2022-4269
CVE    40
CVE-2023-1195
CVE-2022-20141
CVE-2022-25265
CVE-2022-3707
...
CPE    7
cpe:/o:redhat:enterprise_linux:8
cpe:/a:bpf:bpftool
cpe:/a:python-perf:python3-perf
cpe:/o:linux:linux_kernel
...

© SecPod Technologies