Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:1590 - Security Advisory
Issued:
2023-04-04
Updated:
2023-04-04

RHSA-2023:1590 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 2163379 - CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF

CVEs

  • CVE-2023-0266

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM
kpatch-patch-4_18_0-147_74_1-1-4.el8_1.src.rpm SHA-256: 3362626680ac01ffae31c000db399e0d4d12b9aa5fcb90332275bf8327cf34c7
kpatch-patch-4_18_0-147_76_1-1-3.el8_1.src.rpm SHA-256: 9c72dd308f4906e68866b169ea3b3b6056865ca4b7a5f6e8be7bb9ef318a6742
kpatch-patch-4_18_0-147_77_1-1-3.el8_1.src.rpm SHA-256: 1d6da516fbcabe48a91bbecfcd40c6ac1792fe2e7031e5c10c178bb0fe5d3659
kpatch-patch-4_18_0-147_78_1-1-2.el8_1.src.rpm SHA-256: 2bab1ca3f626720bd295fa794dc2701e00650071c4c2c803a020c1a1a7706e5a
kpatch-patch-4_18_0-147_80_1-1-1.el8_1.src.rpm SHA-256: b5dc90ecc2b0df22d74730103de47a3857c6fcc1e3b37f37af7af854be9bf1fe
ppc64le
kpatch-patch-4_18_0-147_74_1-1-4.el8_1.ppc64le.rpm SHA-256: 409f53718e8d75e6cb5499a3168a7c6b72502dfa8d8cb5f1f36ccc2981b6ac48
kpatch-patch-4_18_0-147_74_1-debuginfo-1-4.el8_1.ppc64le.rpm SHA-256: 08a0135d6dc46611920382908ac0ce3ac340e7643ee2f8ee9b6cf73cc73f48ec
kpatch-patch-4_18_0-147_74_1-debugsource-1-4.el8_1.ppc64le.rpm SHA-256: acfbfba75951b353087feb946f11071fb7e3c662373d24d781f2ff8cdade7fe6
kpatch-patch-4_18_0-147_76_1-1-3.el8_1.ppc64le.rpm SHA-256: 89cb3860d469333723434cdac09589a1df260f48d106bd57579fd6595869e782
kpatch-patch-4_18_0-147_76_1-debuginfo-1-3.el8_1.ppc64le.rpm SHA-256: 4d9282583ce5d7ba9d3fcf1c06f2f69c058db577417d2d46db29a920183601a4
kpatch-patch-4_18_0-147_76_1-debugsource-1-3.el8_1.ppc64le.rpm SHA-256: 787ceca966db04d4f3299e05a4afcc5a00a2f2215974ec93a939c1dc8f9c4e2b
kpatch-patch-4_18_0-147_77_1-1-3.el8_1.ppc64le.rpm SHA-256: 3c46b39900730b194d1d859716eac63ba75006f2e651f88777400796a38cec21
kpatch-patch-4_18_0-147_77_1-debuginfo-1-3.el8_1.ppc64le.rpm SHA-256: a3cb0149dabce503b21a68dc1090b93c5ee3bf1bc7676537e03f556717d59dc4
kpatch-patch-4_18_0-147_77_1-debugsource-1-3.el8_1.ppc64le.rpm SHA-256: aea82da54d2b6a2b471d8e543731eb90360f5ec7879186dae378ebed369a385c
kpatch-patch-4_18_0-147_78_1-1-2.el8_1.ppc64le.rpm SHA-256: fc662634d92e6558d08956ce3234e99e34e11572d7b6f078a2ba10590af57630
kpatch-patch-4_18_0-147_78_1-debuginfo-1-2.el8_1.ppc64le.rpm SHA-256: 498b9262606cd6e37ae9b0d1850947e11db106ef70c54f7c5165f508d8e7fc1a
kpatch-patch-4_18_0-147_78_1-debugsource-1-2.el8_1.ppc64le.rpm SHA-256: 3c814cd86d5d2ce767e566f246aaf556b7d9c06695e54d62c6264c85a2a32a1f
kpatch-patch-4_18_0-147_80_1-1-1.el8_1.ppc64le.rpm SHA-256: 222fca23968448e5c671205dbfb0c950fae80a3cb900940502efb2fc57ceb619
kpatch-patch-4_18_0-147_80_1-debuginfo-1-1.el8_1.ppc64le.rpm SHA-256: 3b04407f4d1c38da44e9615308fbeb431857979572f75e29b222c27714ccb2b9
kpatch-patch-4_18_0-147_80_1-debugsource-1-1.el8_1.ppc64le.rpm SHA-256: 922ce7858dbf4b59e5f9ddc99e3dd1861dddf1e8304eeff9e0646836cf4288ac

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM
kpatch-patch-4_18_0-147_74_1-1-4.el8_1.src.rpm SHA-256: 3362626680ac01ffae31c000db399e0d4d12b9aa5fcb90332275bf8327cf34c7
kpatch-patch-4_18_0-147_76_1-1-3.el8_1.src.rpm SHA-256: 9c72dd308f4906e68866b169ea3b3b6056865ca4b7a5f6e8be7bb9ef318a6742
kpatch-patch-4_18_0-147_77_1-1-3.el8_1.src.rpm SHA-256: 1d6da516fbcabe48a91bbecfcd40c6ac1792fe2e7031e5c10c178bb0fe5d3659
kpatch-patch-4_18_0-147_78_1-1-2.el8_1.src.rpm SHA-256: 2bab1ca3f626720bd295fa794dc2701e00650071c4c2c803a020c1a1a7706e5a
kpatch-patch-4_18_0-147_80_1-1-1.el8_1.src.rpm SHA-256: b5dc90ecc2b0df22d74730103de47a3857c6fcc1e3b37f37af7af854be9bf1fe
x86_64
kpatch-patch-4_18_0-147_74_1-1-4.el8_1.x86_64.rpm SHA-256: 708f897b7292329108e5c6eaf71cb87b4679bd0a513aa26c4f5ae124ec4c0d2b
kpatch-patch-4_18_0-147_74_1-debuginfo-1-4.el8_1.x86_64.rpm SHA-256: 5fd847da66517f2a38e07d71d224b029596cdb8ea115907e5629d010152afc87
kpatch-patch-4_18_0-147_74_1-debugsource-1-4.el8_1.x86_64.rpm SHA-256: fd3efce500697bd2e2a2047ce8d00cb69237b26469c0aaf702bdecfc000508b4
kpatch-patch-4_18_0-147_76_1-1-3.el8_1.x86_64.rpm SHA-256: f913156a5763d1aa513df8dbea305f8e9ccd64d80534e4a0da48733118eba8bc
kpatch-patch-4_18_0-147_76_1-debuginfo-1-3.el8_1.x86_64.rpm SHA-256: 5a73da6c8f864c031a217cb2d3e3604cca57be12dadaa94641b9d4a54f46d364
kpatch-patch-4_18_0-147_76_1-debugsource-1-3.el8_1.x86_64.rpm SHA-256: 8ea235b1ffe4f303f2542ae38a6f469cbb7d08bf6581aad05d0d179a0379f76f
kpatch-patch-4_18_0-147_77_1-1-3.el8_1.x86_64.rpm SHA-256: 40d526e14387313978fbcdc56cde2ed57a9518ffff31adc5b214b957236124aa
kpatch-patch-4_18_0-147_77_1-debuginfo-1-3.el8_1.x86_64.rpm SHA-256: 2b77700b7ca6c867915d837b7a6f451a83743acf040157ea635b4c41b3c011f2
kpatch-patch-4_18_0-147_77_1-debugsource-1-3.el8_1.x86_64.rpm SHA-256: 32d1ff556704966a05764341564155566319cebdb147812e08322984431f8e4d
kpatch-patch-4_18_0-147_78_1-1-2.el8_1.x86_64.rpm SHA-256: c2817fe051282d0c6e9983ab6ea2cb422bb87e23ece0e6a54cbc9b8fc7e2b1ee
kpatch-patch-4_18_0-147_78_1-debuginfo-1-2.el8_1.x86_64.rpm SHA-256: 4899ec94c03ab2a62ca099c6c0dc21796eea3a923f2b66755536b9ef407187b6
kpatch-patch-4_18_0-147_78_1-debugsource-1-2.el8_1.x86_64.rpm SHA-256: 8bf647172cde35be8b5b3d8315723846f3f8f7b201e6a03687eb0c1e5bb88e55
kpatch-patch-4_18_0-147_80_1-1-1.el8_1.x86_64.rpm SHA-256: c15d49d7ee70e9c212960c876e957f17d9fd43a92cddfaedc311bbcb6b50cf41
kpatch-patch-4_18_0-147_80_1-debuginfo-1-1.el8_1.x86_64.rpm SHA-256: ee79d87ebfad44022aa17b4371ffe47c4ed5324b28011ad0e50ffc3db89a285c
kpatch-patch-4_18_0-147_80_1-debugsource-1-1.el8_1.x86_64.rpm SHA-256: eee559dc16b84a0cb0ecd80c2713e91c17d66b3c2d4aca26b2c5fc1ca7d6d022

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility