Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:4151: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
Red Hat Security Data
#vulnerability#linux#red_hat#ibm

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • perf record -ag does not capture user space stack frames on s390x (BZ#2207745)
  • RHEL7.9 - kernel: handle new reply code FILTERED_BY_HYPERVISOR (BZ#2212672)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le

Fixes

  • BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c

Red Hat Enterprise Linux Server 7

SRPM

kernel-3.10.0-1160.95.1.el7.src.rpm

SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff

x86_64

bpftool-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 772c3b7e0b544c2c1b9ec011504e0331c9cb03d851c35aa55578e178b64f9b6b

bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406

bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406

kernel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 0b2f4eb3ddabec8f6cd6e138a9e1c3029bfde626d25e6728a612236563790418

kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453

kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 88a30963db1ea27825da94f32d76f58716c19974fe7fef6d24a514fc8f73a207

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e

kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 7b9a255bec6ff3c687572a8fcc83957c9d7a6ba5451a18a794a14da709fd12ff

kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0

kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0

kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf

kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf

kernel-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: c9419a1ce34a8ff53be2b10bc648426c68e768a012295f4f57b9814a9d43ae98

kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4

kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: d059f01a25f4419dd303f2e36ab03b7a9af161941f42d6388cb32d6c4412d35b

kernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 6f719532a8adfe625cfb65506a6dcc341ac972c025fabd8b9710a724cec18ea5

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780

kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: e05269006ce7004a55c10acdc2ef5eb446e5240f4f22b9bc90c737369e36850d

kernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63403f4b5373c101e536584e162c3e6fec5123594374772e863e1842f8a0f7aa

perf-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: e1a5cbc3861e1db20b8f90e480f1209958443edc802aa12f898a5314291320d2

perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7

perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7

python-perf-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 36a0b9af6372b4ccc863c2fd6d593bb808d1d0a95d4c74800e66b8c87a7d07e0

python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09

python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09

Red Hat Enterprise Linux Workstation 7

SRPM

kernel-3.10.0-1160.95.1.el7.src.rpm

SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff

x86_64

bpftool-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 772c3b7e0b544c2c1b9ec011504e0331c9cb03d851c35aa55578e178b64f9b6b

bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406

bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406

kernel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 0b2f4eb3ddabec8f6cd6e138a9e1c3029bfde626d25e6728a612236563790418

kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453

kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 88a30963db1ea27825da94f32d76f58716c19974fe7fef6d24a514fc8f73a207

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e

kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 7b9a255bec6ff3c687572a8fcc83957c9d7a6ba5451a18a794a14da709fd12ff

kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0

kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0

kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf

kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf

kernel-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: c9419a1ce34a8ff53be2b10bc648426c68e768a012295f4f57b9814a9d43ae98

kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4

kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: d059f01a25f4419dd303f2e36ab03b7a9af161941f42d6388cb32d6c4412d35b

kernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 6f719532a8adfe625cfb65506a6dcc341ac972c025fabd8b9710a724cec18ea5

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780

kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: e05269006ce7004a55c10acdc2ef5eb446e5240f4f22b9bc90c737369e36850d

kernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63403f4b5373c101e536584e162c3e6fec5123594374772e863e1842f8a0f7aa

perf-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: e1a5cbc3861e1db20b8f90e480f1209958443edc802aa12f898a5314291320d2

perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7

perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7

python-perf-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 36a0b9af6372b4ccc863c2fd6d593bb808d1d0a95d4c74800e66b8c87a7d07e0

python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09

python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09

Red Hat Enterprise Linux Desktop 7

SRPM

kernel-3.10.0-1160.95.1.el7.src.rpm

SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff

x86_64

bpftool-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 772c3b7e0b544c2c1b9ec011504e0331c9cb03d851c35aa55578e178b64f9b6b

bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406

bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406

kernel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 0b2f4eb3ddabec8f6cd6e138a9e1c3029bfde626d25e6728a612236563790418

kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453

kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 88a30963db1ea27825da94f32d76f58716c19974fe7fef6d24a514fc8f73a207

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e

kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 7b9a255bec6ff3c687572a8fcc83957c9d7a6ba5451a18a794a14da709fd12ff

kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0

kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0

kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf

kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf

kernel-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: c9419a1ce34a8ff53be2b10bc648426c68e768a012295f4f57b9814a9d43ae98

kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4

kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: d059f01a25f4419dd303f2e36ab03b7a9af161941f42d6388cb32d6c4412d35b

kernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 6f719532a8adfe625cfb65506a6dcc341ac972c025fabd8b9710a724cec18ea5

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780

kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: e05269006ce7004a55c10acdc2ef5eb446e5240f4f22b9bc90c737369e36850d

kernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63403f4b5373c101e536584e162c3e6fec5123594374772e863e1842f8a0f7aa

perf-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: e1a5cbc3861e1db20b8f90e480f1209958443edc802aa12f898a5314291320d2

perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7

perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7

python-perf-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 36a0b9af6372b4ccc863c2fd6d593bb808d1d0a95d4c74800e66b8c87a7d07e0

python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09

python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09

Red Hat Enterprise Linux for IBM z Systems 7

SRPM

kernel-3.10.0-1160.95.1.el7.src.rpm

SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff

s390x

bpftool-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 992dfe037c86961bb7c14f07b7283b34dce43e539aa14f5488f84e94d71cd0b7

bpftool-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: f89118ae750fa84d596d32542338af46c3f96dcbdaf80b9e9202c313ba66ccbc

kernel-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: d35f786ca359019f0e927d096754d22a3ef2a39b93766dae51f991658215f1b4

kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453

kernel-debug-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 2fba49fe90b74030f29bac00efba7f9d1818b73015d16fa04714925c9d5252c5

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 246cee80f785d9f815f6972b638746b8ce12413af1796d642c4b1bbf23da10cf

kernel-debug-devel-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: b5c96c944723560de664346cb515cd36fc7a36de351a49844f1982ba94b8e918

kernel-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 53a86b2411b2e464adf3c4b898aa68fe9109ade1f6e5431af7b64309f324c6a0

kernel-debuginfo-common-s390x-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 323406d97a9585046d087d0a3529bd75e5d7629e9756ef5cf3d7f018e948a147

kernel-devel-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 6ead779f1c4b49b955911dd8c9720a84f11a4b38ec488f6c054152b9eb42289b

kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4

kernel-headers-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 44cb274311a5a7da3898bada3de1b90123e880965f2aba29cd4bd3d166396a9a

kernel-kdump-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 382c759fe7a1a7bba4062a6de9ade107b0ebd2c04020ee9f78dc0c3824a4fb47

kernel-kdump-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 69b0d4fcc51656a6cb67b956982aa4c5a892f8e5383dd148bba73d58e87f468e

kernel-kdump-devel-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: d86b70dcf2f8f740649b75b75c719e06d97be093807b29cd590196e8640f672b

perf-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: bd10b4fbc820158f0e0c7b1ffc5ea3af868eae8a42482d257252861a3f3140ab

perf-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 9cefb8084982b4b1952ddb603a08330b4e3a83e88d890771df232af38c5f2f86

python-perf-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 515ba5720b7d57ca7345b60bab0b808246f2741f0dd6058a6cf5f25ee3f2261d

python-perf-debuginfo-3.10.0-1160.95.1.el7.s390x.rpm

SHA-256: 7d239214f52455d2a2a55f0f03eac35f3bdcb711a79c7adc5ebf00abf677ae2e

Red Hat Enterprise Linux for Power, big endian 7

SRPM

kernel-3.10.0-1160.95.1.el7.src.rpm

SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff

ppc64

bpftool-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: a51657ffbf476b2d7932aef3eef85761c8c648db2d16257b5f81bfc6ef9f34d6

bpftool-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: ddd12d39cb440e1befb6b761c4caedb41fdfd53250c11ede046b551cd00fcbfa

bpftool-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: ddd12d39cb440e1befb6b761c4caedb41fdfd53250c11ede046b551cd00fcbfa

kernel-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: e2a7109b3c7b94f589b3bc92f68d471bae0407ae8e0f65c9f831036f83439f6b

kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453

kernel-bootwrapper-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 24bd46cf43310b5eee7f8a32844db9116f5f42de6137fc403646bf892658db88

kernel-debug-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 30b0514d435a2e08255e91311a7318d8cc7f7283bdb6bfbd395ea5444dec56ae

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 5354358a64e13fef783e3978a3482368c28e3664173233618ac550161e6d373f

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 5354358a64e13fef783e3978a3482368c28e3664173233618ac550161e6d373f

kernel-debug-devel-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 22a68fb75d66a527a0a799ec47454b2d7cb89ae51376be2970aabd7a3e6a92b6

kernel-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: e6c8d2e7687ac78eb3673d8298936d3d390f306afd7f2ba63df02ced8c32914d

kernel-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: e6c8d2e7687ac78eb3673d8298936d3d390f306afd7f2ba63df02ced8c32914d

kernel-debuginfo-common-ppc64-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 6ef5ffd8ab2654652f452d10510872ef53624e42140aa338f1c132aa5a2ba228

kernel-debuginfo-common-ppc64-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 6ef5ffd8ab2654652f452d10510872ef53624e42140aa338f1c132aa5a2ba228

kernel-devel-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 67d1056170a571c6a1cd870d40a6a43e5bcd3dd5fa82a734846a7e1d6bc85751

kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4

kernel-headers-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 2b5ac6de81c8ec35c7a66e1c59993cdf63826a6b5733f9f1e3431fb5e654922c

kernel-tools-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 83e23494c26e1bc9a33f78f5d512c262d7b0041ebfba2b60b15cced877177be3

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: e5c242c6102a653211050bda1815102cfdf2027c347534373d487069cd76e392

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: e5c242c6102a653211050bda1815102cfdf2027c347534373d487069cd76e392

kernel-tools-libs-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: d596c6c63f63720c0308ae3ad131d59fdb47ea020b38d2113b40e46ce9f47b93

kernel-tools-libs-devel-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 82e480d53c5abb5f7361b9a8de7f5646dee561dd94179842265875dd9f477c8c

perf-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: f4961da3604ade4e5fea7b12d65f8ca48f034e516b3d69cc33b0d7decde644ac

perf-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 7be87e9876e5fbd887661f708db91a9750bf184a61351ffdde861d45d2dbcf62

perf-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 7be87e9876e5fbd887661f708db91a9750bf184a61351ffdde861d45d2dbcf62

python-perf-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: 6012b9e0ba6dc5609690b7025764396040b43272e2d6fb1f55ef4fb521a62fd1

python-perf-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: ad1ae77d2f3a2cddeb5e047a1ee283eeff5fae49b9646bc20ed232ba06e0ed54

python-perf-debuginfo-3.10.0-1160.95.1.el7.ppc64.rpm

SHA-256: ad1ae77d2f3a2cddeb5e047a1ee283eeff5fae49b9646bc20ed232ba06e0ed54

Red Hat Enterprise Linux for Scientific Computing 7

SRPM

kernel-3.10.0-1160.95.1.el7.src.rpm

SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff

x86_64

bpftool-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 772c3b7e0b544c2c1b9ec011504e0331c9cb03d851c35aa55578e178b64f9b6b

bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406

bpftool-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: ce8aea8003ac0aca939e1801053c6c73a49ed686a7ae474d97ab7e59b9e80406

kernel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 0b2f4eb3ddabec8f6cd6e138a9e1c3029bfde626d25e6728a612236563790418

kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453

kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 88a30963db1ea27825da94f32d76f58716c19974fe7fef6d24a514fc8f73a207

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 997f77b1d1cd3ea0e4604461285a6c943f8aef63c3881032c9f9db553267ee8e

kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 7b9a255bec6ff3c687572a8fcc83957c9d7a6ba5451a18a794a14da709fd12ff

kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0

kernel-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63fc7ec4fbc779632d67a5ff8c4d08c2c96e6db6092891a87c1dc325494da8a0

kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf

kernel-debuginfo-common-x86_64-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: cfe73f5809474a8c321338c4b69556d58e268c34e0ff5c93ed4611e7f47511bf

kernel-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: c9419a1ce34a8ff53be2b10bc648426c68e768a012295f4f57b9814a9d43ae98

kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4

kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: d059f01a25f4419dd303f2e36ab03b7a9af161941f42d6388cb32d6c4412d35b

kernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 6f719532a8adfe625cfb65506a6dcc341ac972c025fabd8b9710a724cec18ea5

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 43597a3acd8a1fe9b63aa1faad50edfcd254ab36d2136097b01ef6f6d803d780

kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: e05269006ce7004a55c10acdc2ef5eb446e5240f4f22b9bc90c737369e36850d

kernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 63403f4b5373c101e536584e162c3e6fec5123594374772e863e1842f8a0f7aa

perf-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: e1a5cbc3861e1db20b8f90e480f1209958443edc802aa12f898a5314291320d2

perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7

perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 8ab5a1385ac201fa4590346efff73a148ddec2b5a482d7c0012269477b2cf0f7

python-perf-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: 36a0b9af6372b4ccc863c2fd6d593bb808d1d0a95d4c74800e66b8c87a7d07e0

python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09

python-perf-debuginfo-3.10.0-1160.95.1.el7.x86_64.rpm

SHA-256: a0b7322a9291f6f6bd87b5dc1b65b14b1d7a2f532fa7ef0bb7b4d55ef0665d09

Red Hat Enterprise Linux for Power, little endian 7

SRPM

kernel-3.10.0-1160.95.1.el7.src.rpm

SHA-256: d7ac7c15bb006e97fc0639cb60a3238ebde8fcca87c2e1f6ea60df4312033dff

ppc64le

bpftool-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: d16d93704c512bd8d1a8e26edefb51afdd8e12c650c64211e4a54b144df76646

bpftool-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 7d0754b46afec680cc8c8642a6d2284274f2b760ef697bb6ef8889ea18a9c13d

bpftool-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 7d0754b46afec680cc8c8642a6d2284274f2b760ef697bb6ef8889ea18a9c13d

kernel-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: a8f1f32ad7b10bade5078485f5915ecfb6d54542415daaecf2148b4805823670

kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: 0230cb9ccff9b2f99c73344dfb644e2357dab0b0326961629380384d1da06453

kernel-bootwrapper-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 2cafeed5f3f74612bf6e58580b58b782805642e9439060a6a2493aaebf540a57

kernel-debug-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: e1f0ae83ddf08a07889c1d8c943955b4b56cbf8086d9a382021cba6abce3893a

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 76a7c0724d96e963e65e9b10d631cc8290e3d9810b054056ef0c69a81bf14205

kernel-debug-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 76a7c0724d96e963e65e9b10d631cc8290e3d9810b054056ef0c69a81bf14205

kernel-debug-devel-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 0c2bcd839fe007c7d7ee8498426fbcd59450c9cd8720ba9a636170851a7da5d0

kernel-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 85e106f9bb983b1db007c262749db4bebc21a2ef41b2c7ce8093be576631193e

kernel-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 85e106f9bb983b1db007c262749db4bebc21a2ef41b2c7ce8093be576631193e

kernel-debuginfo-common-ppc64le-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 8ab297413d5893ec21a973ac19f629a75a1ba19acf845b459e12a845d53f8f5d

kernel-debuginfo-common-ppc64le-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 8ab297413d5893ec21a973ac19f629a75a1ba19acf845b459e12a845d53f8f5d

kernel-devel-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 2d5e72baaa25d883bc934135655f9ae05297e0878a2f420fa65300e230d392bc

kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm

SHA-256: dd1e979685f3e0784078e206d09ee5158ba1f87c4be9be9cddc56100c3062cb4

kernel-headers-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 9b65acb83c3d2ae531303958808f3d610f18071f2b8a57976fe63f7f0b134932

kernel-tools-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: aabde833a40f7e5cb503621a657e3a9a5ec0fca963cebcc634414b1a514d79e6

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: f89a0e5a06c88cd09e86225b7af8bf1b4000fa0078fc95e0b141f23e914b7847

kernel-tools-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: f89a0e5a06c88cd09e86225b7af8bf1b4000fa0078fc95e0b141f23e914b7847

kernel-tools-libs-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 11e3f07a91e00e65e3cbf0279783f83dc4039c47fe4868d9b7684b01c2fc07b5

kernel-tools-libs-devel-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 2a71a9b17b971b2297520c2ed4f826137f9eed81d4eda65d03d82352fcc82ec9

perf-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: f8670a1a5859c2dbf3bae4dccecc2a7efe894ed2f7d6b4c4fc907662b6bc1e7a

perf-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 499a4ca33c526948a905920efe500bec371a5d027c0a5522ef3713a4ce1ee281

perf-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 499a4ca33c526948a905920efe500bec371a5d027c0a5522ef3713a4ce1ee281

python-perf-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 387c7656f0581cabf726407f606e1909bb966ac84db6d40130c14190911c994a

python-perf-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 2ec63a92d1987ecffd989b3ef2ce25e76d17322cea8b62ae2925351b04ef9780

python-perf-debuginfo-3.10.0-1160.95.1.el7.ppc64le.rpm

SHA-256: 2ec63a92d1987ecffd989b3ef2ce25e76d17322cea8b62ae2925351b04ef9780

Related news

RHSA-2023:4020: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.

Red Hat Security Advisory 2023-3388-01

Red Hat Security Advisory 2023-3388-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-1666-01

Red Hat Security Advisory 2023-1666-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

RHSA-2023:1008: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack overflow flaw was found in th...

RHSA-2023:0951: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetoo...

Ubuntu Security Notice USN-5756-2

Ubuntu Security Notice 5756-2 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5755-2

Ubuntu Security Notice 5755-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5757-1

Ubuntu Security Notice 5757-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the video4linux driver for Empia based TV cards in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5755-1

Ubuntu Security Notice 5755-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

CVE-2022-3564

A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.