Headline
RHSA-2023:4151: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- perf record -ag does not capture user space stack frames on s390x (BZ#2207745)
- RHEL7.9 - kernel: handle new reply code FILTERED_BY_HYPERVISOR (BZ#2212672)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Workstation 7 x86_64
- Red Hat Enterprise Linux Desktop 7 x86_64
- Red Hat Enterprise Linux for IBM z Systems 7 s390x
- Red Hat Enterprise Linux for Power, big endian 7 ppc64
- Red Hat Enterprise Linux for Scientific Computing 7 x86_64
- Red Hat Enterprise Linux for Power, little endian 7 ppc64le
Fixes
- BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
Red Hat Enterprise Linux Server 7
SRPM
kernel-3.10.0-1160.95.1.el7.src.rpm
SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff
x86_64
bpftool-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 772c3b7e0b544c2c1b9ec011504e0331c9cb03d851c35aa55578e178b64f9b6b
bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406
bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406
kernel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 0b2f4eb3ddabec8f6cd6e138a9e1c3029bfde626d25e6728a612236563790418
kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453
kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 88a30963db1ea27825da94f32d76f58716c19974fe7fef6d24a514fc8f73a207
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e
kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 7b9a255bec6ff3c687572a8fcc83957c9d7a6ba5451a18a794a14da709fd12ff
kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0
kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0
kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf
kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf
kernel-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: c9419a1ce34a8ff53be2b10bc648426c68e768a012295f4f57b9814a9d43ae98
kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4
kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: d059f01a25f4419dd303f2e36ab03b7a9af161941f42d6388cb32d6c4412d35b
kernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 6f719532a8adfe625cfb65506a6dcc341ac972c025fabd8b9710a724cec18ea5
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780
kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: e05269006ce7004a55c10acdc2ef5eb446e5240f4f22b9bc90c737369e36850d
kernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63403f4b5373c101e536584e162c3e6fec5123594374772e863e1842f8a0f7aa
perf-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: e1a5cbc3861e1db20b8f90e480f1209958443edc802aa12f898a5314291320d2
perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7
perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7
python-perf-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 36a0b9af6372b4ccc863c2fd6d593bb808d1d0a95d4c74800e66b8c87a7d07e0
python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09
python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09
Red Hat Enterprise Linux Workstation 7
SRPM
kernel-3.10.0-1160.95.1.el7.src.rpm
SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff
x86_64
bpftool-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 772c3b7e0b544c2c1b9ec011504e0331c9cb03d851c35aa55578e178b64f9b6b
bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406
bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406
kernel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 0b2f4eb3ddabec8f6cd6e138a9e1c3029bfde626d25e6728a612236563790418
kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453
kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 88a30963db1ea27825da94f32d76f58716c19974fe7fef6d24a514fc8f73a207
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e
kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 7b9a255bec6ff3c687572a8fcc83957c9d7a6ba5451a18a794a14da709fd12ff
kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0
kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0
kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf
kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf
kernel-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: c9419a1ce34a8ff53be2b10bc648426c68e768a012295f4f57b9814a9d43ae98
kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4
kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: d059f01a25f4419dd303f2e36ab03b7a9af161941f42d6388cb32d6c4412d35b
kernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 6f719532a8adfe625cfb65506a6dcc341ac972c025fabd8b9710a724cec18ea5
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780
kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: e05269006ce7004a55c10acdc2ef5eb446e5240f4f22b9bc90c737369e36850d
kernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63403f4b5373c101e536584e162c3e6fec5123594374772e863e1842f8a0f7aa
perf-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: e1a5cbc3861e1db20b8f90e480f1209958443edc802aa12f898a5314291320d2
perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7
perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7
python-perf-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 36a0b9af6372b4ccc863c2fd6d593bb808d1d0a95d4c74800e66b8c87a7d07e0
python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09
python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09
Red Hat Enterprise Linux Desktop 7
SRPM
kernel-3.10.0-1160.95.1.el7.src.rpm
SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff
x86_64
bpftool-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 772c3b7e0b544c2c1b9ec011504e0331c9cb03d851c35aa55578e178b64f9b6b
bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406
bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406
kernel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 0b2f4eb3ddabec8f6cd6e138a9e1c3029bfde626d25e6728a612236563790418
kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453
kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 88a30963db1ea27825da94f32d76f58716c19974fe7fef6d24a514fc8f73a207
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e
kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 7b9a255bec6ff3c687572a8fcc83957c9d7a6ba5451a18a794a14da709fd12ff
kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0
kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0
kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf
kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf
kernel-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: c9419a1ce34a8ff53be2b10bc648426c68e768a012295f4f57b9814a9d43ae98
kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4
kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: d059f01a25f4419dd303f2e36ab03b7a9af161941f42d6388cb32d6c4412d35b
kernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 6f719532a8adfe625cfb65506a6dcc341ac972c025fabd8b9710a724cec18ea5
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780
kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: e05269006ce7004a55c10acdc2ef5eb446e5240f4f22b9bc90c737369e36850d
kernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63403f4b5373c101e536584e162c3e6fec5123594374772e863e1842f8a0f7aa
perf-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: e1a5cbc3861e1db20b8f90e480f1209958443edc802aa12f898a5314291320d2
perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7
perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7
python-perf-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 36a0b9af6372b4ccc863c2fd6d593bb808d1d0a95d4c74800e66b8c87a7d07e0
python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09
python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09
Red Hat Enterprise Linux for IBM z Systems 7
SRPM
kernel-3.10.0-1160.95.1.el7.src.rpm
SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff
s390x
bpftool-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 992dfe037c86961bb7c14f07b7283b34dce43e539aa14f5488f84e94d71cd0b7
bpftool-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: f89118ae750fa84d596d32542338af46c3f96dcbdaf80b9e9202c313ba66ccbc
kernel-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: d35f786ca359019f0e927d096754d22a3ef2a39b93766dae51f991658215f1b4
kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453
kernel-debug-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 2fba49fe90b74030f29bac00efba7f9d1818b73015d16fa04714925c9d5252c5
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 246cee80f785d9f815f6972b638746b8ce12413af1796d642c4b1bbf23da10cf
kernel-debug-devel-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: b5c96c944723560de664346cb515cd36fc7a36de351a49844f1982ba94b8e918
kernel-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 53a86b2411b2e464adf3c4b898aa68fe9109ade1f6e5431af7b64309f324c6a0
kernel-debuginfo-common-s390x-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 323406d97a9585046d087d0a3529bd75e5d7629e9756ef5cf3d7f018e948a147
kernel-devel-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 6ead779f1c4b49b955911dd8c9720a84f11a4b38ec488f6c054152b9eb42289b
kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4
kernel-headers-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 44cb274311a5a7da3898bada3de1b90123e880965f2aba29cd4bd3d166396a9a
kernel-kdump-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 382c759fe7a1a7bba4062a6de9ade107b0ebd2c04020ee9f78dc0c3824a4fb47
kernel-kdump-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 69b0d4fcc51656a6cb67b956982aa4c5a892f8e5383dd148bba73d58e87f468e
kernel-kdump-devel-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: d86b70dcf2f8f740649b75b75c719e06d97be093807b29cd590196e8640f672b
perf-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: bd10b4fbc820158f0e0c7b1ffc5ea3af868eae8a42482d257252861a3f3140ab
perf-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 9cefb8084982b4b1952ddb603a08330b4e3a83e88d890771df232af38c5f2f86
python-perf-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 515ba5720b7d57ca7345b60bab0b808246f2741f0dd6058a6cf5f25ee3f2261d
python-perf-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm
SHA-256: 7d239214f52455d2a2a55f0f03eac35f3bdcb711a79c7adc5ebf00abf677ae2e
Red Hat Enterprise Linux for Power, big endian 7
SRPM
kernel-3.10.0-1160.95.1.el7.src.rpm
SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff
ppc64
bpftool-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: a51657ffbf476b2d7932aef3eef85761c8c648db2d16257b5f81bfc6ef9f34d6
bpftool-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: ddd12d39cb440e1befb6b761c4caedb41fdfd53250c11ede046b551cd00fcbfa
bpftool-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: ddd12d39cb440e1befb6b761c4caedb41fdfd53250c11ede046b551cd00fcbfa
kernel-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: e2a7109b3c7b94f589b3bc92f68d471bae0407ae8e0f65c9f831036f83439f6b
kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453
kernel-bootwrapper-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 24bd46cf43310b5eee7f8a32844db9116f5f42de6137fc403646bf892658db88
kernel-debug-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 30b0514d435a2e08255e91311a7318d8cc7f7283bdb6bfbd395ea5444dec56ae
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 5354358a64e13fef783e3978a3482368c28e3664173233618ac550161e6d373f
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 5354358a64e13fef783e3978a3482368c28e3664173233618ac550161e6d373f
kernel-debug-devel-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 22a68fb75d66a527a0a799ec47454b2d7cb89ae51376be2970aabd7a3e6a92b6
kernel-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: e6c8d2e7687ac78eb3673d8298936d3d390f306afd7f2ba63df02ced8c32914d
kernel-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: e6c8d2e7687ac78eb3673d8298936d3d390f306afd7f2ba63df02ced8c32914d
kernel-debuginfo-common-ppc64-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 6ef5ffd8ab2654652f452d10510872ef53624e42140aa338f1c132aa5a2ba228
kernel-debuginfo-common-ppc64-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 6ef5ffd8ab2654652f452d10510872ef53624e42140aa338f1c132aa5a2ba228
kernel-devel-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 67d1056170a571c6a1cd870d40a6a43e5bcd3dd5fa82a734846a7e1d6bc85751
kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4
kernel-headers-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 2b5ac6de81c8ec35c7a66e1c59993cdf63826a6b5733f9f1e3431fb5e654922c
kernel-tools-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 83e23494c26e1bc9a33f78f5d512c262d7b0041ebfba2b60b15cced877177be3
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: e5c242c6102a653211050bda1815102cfdf2027c347534373d487069cd76e392
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: e5c242c6102a653211050bda1815102cfdf2027c347534373d487069cd76e392
kernel-tools-libs-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: d596c6c63f63720c0308ae3ad131d59fdb47ea020b38d2113b40e46ce9f47b93
kernel-tools-libs-devel-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 82e480d53c5abb5f7361b9a8de7f5646dee561dd94179842265875dd9f477c8c
perf-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: f4961da3604ade4e5fea7b12d65f8ca48f034e516b3d69cc33b0d7decde644ac
perf-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 7be87e9876e5fbd887661f708db91a9750bf184a61351ffdde861d45d2dbcf62
perf-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 7be87e9876e5fbd887661f708db91a9750bf184a61351ffdde861d45d2dbcf62
python-perf-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: 6012b9e0ba6dc5609690b7025764396040b43272e2d6fb1f55ef4fb521a62fd1
python-perf-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: ad1ae77d2f3a2cddeb5e047a1ee283eeff5fae49b9646bc20ed232ba06e0ed54
python-perf-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm
SHA-256: ad1ae77d2f3a2cddeb5e047a1ee283eeff5fae49b9646bc20ed232ba06e0ed54
Red Hat Enterprise Linux for Scientific Computing 7
SRPM
kernel-3.10.0-1160.95.1.el7.src.rpm
SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff
x86_64
bpftool-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 772c3b7e0b544c2c1b9ec011504e0331c9cb03d851c35aa55578e178b64f9b6b
bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406
bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406
kernel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 0b2f4eb3ddabec8f6cd6e138a9e1c3029bfde626d25e6728a612236563790418
kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453
kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 88a30963db1ea27825da94f32d76f58716c19974fe7fef6d24a514fc8f73a207
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e
kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 7b9a255bec6ff3c687572a8fcc83957c9d7a6ba5451a18a794a14da709fd12ff
kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0
kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0
kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf
kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf
kernel-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: c9419a1ce34a8ff53be2b10bc648426c68e768a012295f4f57b9814a9d43ae98
kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4
kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: d059f01a25f4419dd303f2e36ab03b7a9af161941f42d6388cb32d6c4412d35b
kernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 6f719532a8adfe625cfb65506a6dcc341ac972c025fabd8b9710a724cec18ea5
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780
kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: e05269006ce7004a55c10acdc2ef5eb446e5240f4f22b9bc90c737369e36850d
kernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 63403f4b5373c101e536584e162c3e6fec5123594374772e863e1842f8a0f7aa
perf-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: e1a5cbc3861e1db20b8f90e480f1209958443edc802aa12f898a5314291320d2
perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7
perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7
python-perf-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: 36a0b9af6372b4ccc863c2fd6d593bb808d1d0a95d4c74800e66b8c87a7d07e0
python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09
python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm
SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09
Red Hat Enterprise Linux for Power, little endian 7
SRPM
kernel-3.10.0-1160.95.1.el7.src.rpm
SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff
ppc64le
bpftool-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: d16d93704c512bd8d1a8e26edefb51afdd8e12c650c64211e4a54b144df76646
bpftool-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 7d0754b46afec680cc8c8642a6d2284274f2b760ef697bb6ef8889ea18a9c13d
bpftool-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 7d0754b46afec680cc8c8642a6d2284274f2b760ef697bb6ef8889ea18a9c13d
kernel-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: a8f1f32ad7b10bade5078485f5915ecfb6d54542415daaecf2148b4805823670
kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453
kernel-bootwrapper-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 2cafeed5f3f74612bf6e58580b58b782805642e9439060a6a2493aaebf540a57
kernel-debug-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: e1f0ae83ddf08a07889c1d8c943955b4b56cbf8086d9a382021cba6abce3893a
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 76a7c0724d96e963e65e9b10d631cc8290e3d9810b054056ef0c69a81bf14205
kernel-debug-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 76a7c0724d96e963e65e9b10d631cc8290e3d9810b054056ef0c69a81bf14205
kernel-debug-devel-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 0c2bcd839fe007c7d7ee8498426fbcd59450c9cd8720ba9a636170851a7da5d0
kernel-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 85e106f9bb983b1db007c262749db4bebc21a2ef41b2c7ce8093be576631193e
kernel-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 85e106f9bb983b1db007c262749db4bebc21a2ef41b2c7ce8093be576631193e
kernel-debuginfo-common-ppc64le-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 8ab297413d5893ec21a973ac19f629a75a1ba19acf845b459e12a845d53f8f5d
kernel-debuginfo-common-ppc64le-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 8ab297413d5893ec21a973ac19f629a75a1ba19acf845b459e12a845d53f8f5d
kernel-devel-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 2d5e72baaa25d883bc934135655f9ae05297e0878a2f420fa65300e230d392bc
kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm
SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4
kernel-headers-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 9b65acb83c3d2ae531303958808f3d610f18071f2b8a57976fe63f7f0b134932
kernel-tools-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: aabde833a40f7e5cb503621a657e3a9a5ec0fca963cebcc634414b1a514d79e6
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: f89a0e5a06c88cd09e86225b7af8bf1b4000fa0078fc95e0b141f23e914b7847
kernel-tools-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: f89a0e5a06c88cd09e86225b7af8bf1b4000fa0078fc95e0b141f23e914b7847
kernel-tools-libs-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 11e3f07a91e00e65e3cbf0279783f83dc4039c47fe4868d9b7684b01c2fc07b5
kernel-tools-libs-devel-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 2a71a9b17b971b2297520c2ed4f826137f9eed81d4eda65d03d82352fcc82ec9
perf-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: f8670a1a5859c2dbf3bae4dccecc2a7efe894ed2f7d6b4c4fc907662b6bc1e7a
perf-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 499a4ca33c526948a905920efe500bec371a5d027c0a5522ef3713a4ce1ee281
perf-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 499a4ca33c526948a905920efe500bec371a5d027c0a5522ef3713a4ce1ee281
python-perf-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 387c7656f0581cabf726407f606e1909bb966ac84db6d40130c14190911c994a
python-perf-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 2ec63a92d1987ecffd989b3ef2ce25e76d17322cea8b62ae2925351b04ef9780
python-perf-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm
SHA-256: 2ec63a92d1987ecffd989b3ef2ce25e76d17322cea8b62ae2925351b04ef9780
Related news
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
Red Hat Security Advisory 2023-3388-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-1666-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack overflow flaw was found in th...
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetoo...
Ubuntu Security Notice 5756-2 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5755-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5757-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the video4linux driver for Empia based TV cards in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5755-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.