Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:3095 - Security Advisory
Issued:
2025-03-20
Updated:
2025-03-20

RHSA-2025:3095 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch-4_18_0-372_118_1, kpatch-patch-4_18_0-372_131_1, kpatch-patch-4_18_0-372_137_1, and kpatch-patch-4_18_0-372_91_1 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch-4_18_0-372_118_1, kpatch-patch-4_18_0-372_131_1, kpatch-patch-4_18_0-372_137_1, and kpatch-patch-4_18_0-372_91_1 is now available for Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-4.18.0-372.91.1.el8_6.

Security Fix(es):

  • kernel: can: bcm: Fix UAF in bcm_proc_show() (CVE-2023-52922)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2329370 - CVE-2023-52922 kernel: can: bcm: Fix UAF in bcm_proc_show()

CVEs

  • CVE-2023-52922

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_118_1-1-5.el8_6.src.rpm SHA-256: 67eadbc08e41a3b2197dc6561b4f8fe4e729f30167d4c2c03f5b01184ad5da11
kpatch-patch-4_18_0-372_131_1-1-4.el8_6.src.rpm SHA-256: 893f06b4369f4966e0267cc3e27acdcf3ff2d0ff175fffcb281e619555d1333f
kpatch-patch-4_18_0-372_137_1-1-1.el8_6.src.rpm SHA-256: 9b6eeb8c363cc33d973d737c596047487f330814eec5814ec4662389379eba5b
kpatch-patch-4_18_0-372_91_1-1-9.el8_6.src.rpm SHA-256: 7f8553c68abaf0d30668a6f6547441c6836b7ca3be714c37a4d83f6ef2e7e9a9
ppc64le
kpatch-patch-4_18_0-372_118_1-1-5.el8_6.ppc64le.rpm SHA-256: 8479fda92f6c8698c5f9a120d9c98da85297069cca16690389651d7edebc845e
kpatch-patch-4_18_0-372_118_1-debuginfo-1-5.el8_6.ppc64le.rpm SHA-256: a698ed5b5eeef191a24390e60d18c4f11f0dbe839c26f60d9a1c13ab72805007
kpatch-patch-4_18_0-372_118_1-debugsource-1-5.el8_6.ppc64le.rpm SHA-256: ba882f9b72f33a32205edaf4c02cc77262725aa103db0bcc974e2aee66f6771d
kpatch-patch-4_18_0-372_131_1-1-4.el8_6.ppc64le.rpm SHA-256: b7e6ff9be453209802936de89701ba80f55c24026017b316573649d69df7407b
kpatch-patch-4_18_0-372_131_1-debuginfo-1-4.el8_6.ppc64le.rpm SHA-256: 3a081fe9b84b98fd44e9eb9ff2b22b0056a8a3441ecbaef7f3c80c00fb56a325
kpatch-patch-4_18_0-372_131_1-debugsource-1-4.el8_6.ppc64le.rpm SHA-256: 1f66dac88de5f082c227b451b63f6cdcf28bdbbeb6072fef15a05f21f9448de5
kpatch-patch-4_18_0-372_137_1-1-1.el8_6.ppc64le.rpm SHA-256: 086c164d326c1b42ce3924fbb8baaf4f97691a56881a2f0773c26b3fd80ecc54
kpatch-patch-4_18_0-372_137_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 7b1fe205998a749fd9cb381f7ae249d848916a44e50e15f5e4f50984ef2c7d3c
kpatch-patch-4_18_0-372_137_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: c65668749f07365f3b21d2b106220ad7a7c2754561528d1a23611eef69cf5016
kpatch-patch-4_18_0-372_91_1-1-9.el8_6.ppc64le.rpm SHA-256: c130b145e5268bcbdea3bfbd126d5395e253d8ddef7d75464a3d217fd5e4d2d0
kpatch-patch-4_18_0-372_91_1-debuginfo-1-9.el8_6.ppc64le.rpm SHA-256: 746580da551f32c4c52512900b48b902afab30154b0e319241719611ba4227a1
kpatch-patch-4_18_0-372_91_1-debugsource-1-9.el8_6.ppc64le.rpm SHA-256: 0938304bf79fa5a1a3f490091cc91840c458805b1723e5958aa83ef5c54cf913

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_118_1-1-5.el8_6.src.rpm SHA-256: 67eadbc08e41a3b2197dc6561b4f8fe4e729f30167d4c2c03f5b01184ad5da11
kpatch-patch-4_18_0-372_131_1-1-4.el8_6.src.rpm SHA-256: 893f06b4369f4966e0267cc3e27acdcf3ff2d0ff175fffcb281e619555d1333f
kpatch-patch-4_18_0-372_137_1-1-1.el8_6.src.rpm SHA-256: 9b6eeb8c363cc33d973d737c596047487f330814eec5814ec4662389379eba5b
kpatch-patch-4_18_0-372_91_1-1-9.el8_6.src.rpm SHA-256: 7f8553c68abaf0d30668a6f6547441c6836b7ca3be714c37a4d83f6ef2e7e9a9
x86_64
kpatch-patch-4_18_0-372_118_1-1-5.el8_6.x86_64.rpm SHA-256: 078e13dd0dbe506a4a0b26d64f64272092405ccad0e16c2230a0e86ec2aae8f3
kpatch-patch-4_18_0-372_118_1-debuginfo-1-5.el8_6.x86_64.rpm SHA-256: 7d171c221a0e36ea933422fe53aa55457b8e4eace5c57d6470b370ad2a79b13b
kpatch-patch-4_18_0-372_118_1-debugsource-1-5.el8_6.x86_64.rpm SHA-256: 3a22edf332f01cea722c4ac85ac76453d37ee905c495f560bf01ee07f87f0b9e
kpatch-patch-4_18_0-372_131_1-1-4.el8_6.x86_64.rpm SHA-256: 864feda81f3c80cdb60447ddb88089703b51768276cbc41ed2b0cbfb52b50b9a
kpatch-patch-4_18_0-372_131_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: fd095b7c6589c4d3029c3fd257890469d9bc180a417d85358f79f5306e3d0fee
kpatch-patch-4_18_0-372_131_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: 44735e30e16331666b653bb915bcc444d5c5f8a9bcb20d9803f299f82ff05b04
kpatch-patch-4_18_0-372_137_1-1-1.el8_6.x86_64.rpm SHA-256: 2417ffae5737ff82484b183da2b57b354c8e9170cdf5b979df325e25f12fcb51
kpatch-patch-4_18_0-372_137_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 0c0eb8a60c12ab342b79afc50e5960a2b63a741696a14f3053d34583fc80ed6c
kpatch-patch-4_18_0-372_137_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: fd6730db361be7d9a9715e38c205b4ea6ca949173509fd06eeab984ca13f8278
kpatch-patch-4_18_0-372_91_1-1-9.el8_6.x86_64.rpm SHA-256: 8c9652a818e1b28753a1a7d4d904eb872f4ba266d85d02d329471d53e5139318
kpatch-patch-4_18_0-372_91_1-debuginfo-1-9.el8_6.x86_64.rpm SHA-256: 44ef8749448024e2abc0dc1fc8304db2a4d84ea49f4ec4a77d432f70dce59748
kpatch-patch-4_18_0-372_91_1-debugsource-1-9.el8_6.x86_64.rpm SHA-256: c5ed52eaf8c053e4cf52773ef263dddaed5679b0f3ec31759019741319854078

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility