Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:3049 - Security Advisory
Issued:
2025-03-20
Updated:
2025-03-20

RHSA-2025:3049 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch-4_18_0-553, kpatch-patch-4_18_0-553_16_1, kpatch-patch-4_18_0-553_30_1, and kpatch-patch-4_18_0-553_40_1 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch-4_18_0-553, kpatch-patch-4_18_0-553_16_1, kpatch-patch-4_18_0-553_30_1, and kpatch-patch-4_18_0-553_40_1 is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-4.18.0-553.16.1.el8_10.

Security Fix(es):

  • kernel: can: bcm: Fix UAF in bcm_proc_show() (CVE-2023-52922)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le

Fixes

  • BZ - 2329370 - CVE-2023-52922 kernel: can: bcm: Fix UAF in bcm_proc_show()

CVEs

  • CVE-2023-52922

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
kpatch-patch-4_18_0-553-1-5.el8_10.src.rpm SHA-256: e95e01c141504f411f33c3a3c80fed2823de887baadf692ccf1017798e0d3075
kpatch-patch-4_18_0-553_16_1-1-4.el8_10.src.rpm SHA-256: bd35b84db389257f7143d274dcaac82c9c195178eeb076390a27f483dcaca4b7
kpatch-patch-4_18_0-553_30_1-1-3.el8_10.src.rpm SHA-256: 3c0da45dda95cf4245720acd7021459a30ccc30fa9c13cbb26c76c8f137f6148
kpatch-patch-4_18_0-553_40_1-1-1.el8_10.src.rpm SHA-256: 45ed19afc6e39e87b211092c7a814baddc955522c0709ae176754e3f21174eed
x86_64
kpatch-patch-4_18_0-553-1-5.el8_10.x86_64.rpm SHA-256: e207d9ba2d15137a8424a9a9e480b6514ff392d5eb2d8059b54658b0ed16f41c
kpatch-patch-4_18_0-553-debuginfo-1-5.el8_10.x86_64.rpm SHA-256: 8ccdbcc482e1359fca3d792927d985c7f465b5de385d5cf1debf77dd8fdebf9f
kpatch-patch-4_18_0-553-debugsource-1-5.el8_10.x86_64.rpm SHA-256: 3375c2cf7ef4b8ae1f299c1c1d59750b360ccf3dc33ff56a316978201ad7b80a
kpatch-patch-4_18_0-553_16_1-1-4.el8_10.x86_64.rpm SHA-256: d554c446448fac841ac3f982c4dcb3f97369252c64505769effaae193d0025f9
kpatch-patch-4_18_0-553_16_1-debuginfo-1-4.el8_10.x86_64.rpm SHA-256: 8cbef69d86c067b2351cb57617e067cd0da0b124d8a523801d4fa5b9160d94cc
kpatch-patch-4_18_0-553_16_1-debugsource-1-4.el8_10.x86_64.rpm SHA-256: cbc244a4e6f69815f0f1808197e8e26286c6d47df1e831a6c098d603972cada2
kpatch-patch-4_18_0-553_30_1-1-3.el8_10.x86_64.rpm SHA-256: 4d097a7b35518652664556a9de25c52423f7cd70095fc86a91146f09e2f1038d
kpatch-patch-4_18_0-553_30_1-debuginfo-1-3.el8_10.x86_64.rpm SHA-256: a4f7af908bd26908261246d08e37e168b5cefffd2f29fb1ee72b9828c53b73d7
kpatch-patch-4_18_0-553_30_1-debugsource-1-3.el8_10.x86_64.rpm SHA-256: 8e5d4a6f0d3686ab99fe23940faa0b3289a7e34a196a0dab81952abc4f3bd89b
kpatch-patch-4_18_0-553_40_1-1-1.el8_10.x86_64.rpm SHA-256: 7d04b6f51e797dc822bd2eb676ba83bdf6e861afbfa709133a6520198975df16
kpatch-patch-4_18_0-553_40_1-debuginfo-1-1.el8_10.x86_64.rpm SHA-256: b96ff3ff955e49665a3185779a7cd841e7cbfd59a1411204f8055823763085c4
kpatch-patch-4_18_0-553_40_1-debugsource-1-1.el8_10.x86_64.rpm SHA-256: f911d072ca11d7889547171f026f48231e78b1038b3eed63dfa15567cc9547b8

Red Hat Enterprise Linux for Power, little endian 8

SRPM
kpatch-patch-4_18_0-553-1-5.el8_10.src.rpm SHA-256: e95e01c141504f411f33c3a3c80fed2823de887baadf692ccf1017798e0d3075
kpatch-patch-4_18_0-553_16_1-1-4.el8_10.src.rpm SHA-256: bd35b84db389257f7143d274dcaac82c9c195178eeb076390a27f483dcaca4b7
kpatch-patch-4_18_0-553_30_1-1-3.el8_10.src.rpm SHA-256: 3c0da45dda95cf4245720acd7021459a30ccc30fa9c13cbb26c76c8f137f6148
kpatch-patch-4_18_0-553_40_1-1-1.el8_10.src.rpm SHA-256: 45ed19afc6e39e87b211092c7a814baddc955522c0709ae176754e3f21174eed
ppc64le
kpatch-patch-4_18_0-553-1-5.el8_10.ppc64le.rpm SHA-256: a36692a72cbc6783c9f2f4ce7ab3d870e1d52ead1806b4721f579f9c262e5a80
kpatch-patch-4_18_0-553-debuginfo-1-5.el8_10.ppc64le.rpm SHA-256: 4fac6ceb8523a95b4dbe310d108f87083ae5f7e038c725e314a0064455bc5d51
kpatch-patch-4_18_0-553-debugsource-1-5.el8_10.ppc64le.rpm SHA-256: 4ee5c68ff5e5f2c6e8350ddd4a93a833fcbaea5a8fccdb69412d159a307052c0
kpatch-patch-4_18_0-553_16_1-1-4.el8_10.ppc64le.rpm SHA-256: 48bee95af6b6b6419da4aae94b97f0b15cc330585f2a476eac966b61a7f8cc11
kpatch-patch-4_18_0-553_16_1-debuginfo-1-4.el8_10.ppc64le.rpm SHA-256: f0aeb6ff712dfd95e004dc77f13f6863b18a10be68f243effc74753dac6563c4
kpatch-patch-4_18_0-553_16_1-debugsource-1-4.el8_10.ppc64le.rpm SHA-256: 9bf72a482704ac739541d1762a39bc8658c948d2fbb86601194035b76bbfd8cd
kpatch-patch-4_18_0-553_30_1-1-3.el8_10.ppc64le.rpm SHA-256: c7171b5700753cb9f7e4051caac9d9f165353ac0ab5f413fe08f6da81f131f86
kpatch-patch-4_18_0-553_30_1-debuginfo-1-3.el8_10.ppc64le.rpm SHA-256: 02b56474c48e74d839d9a660d73dfc70235d71948aefefc8a403cfb478018451
kpatch-patch-4_18_0-553_30_1-debugsource-1-3.el8_10.ppc64le.rpm SHA-256: db3c7d7c0377c1285c144db63acc240df0cc4a386e52415644a4fb101d6b229b
kpatch-patch-4_18_0-553_40_1-1-1.el8_10.ppc64le.rpm SHA-256: 030ff943be389b791ecc916a4eb0f215689ea602ff63fbc6ad5d77907841f140
kpatch-patch-4_18_0-553_40_1-debuginfo-1-1.el8_10.ppc64le.rpm SHA-256: 43cb5ff20e369c37cbf2d1398d18f8e1fbfa77a08eae304a8680f2774225f570
kpatch-patch-4_18_0-553_40_1-debugsource-1-1.el8_10.ppc64le.rpm SHA-256: e7ef37e3009e37fe1ecff400fa4e1116a528d55754382a58c8f4a2a06664e7e4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility