Headline
RHSA-2023:3277: Red Hat Security Advisory: kernel security update
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
Synopsis
Important: kernel security update
Type / Sévérité
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Sujet
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Produits concernés
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
- Red Hat Enterprise Linux Server - TUS 7.7 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64
Correctifs
- BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
Red Hat Enterprise Linux Server - AUS 7.7
SRPM
kernel-3.10.0-1062.72.1.el7.src.rpm
SHA-256: 91673e9dac7a04f1379c73cdf7c16fffa546c9c2bce8e31af5ddfd10b59c8c68
x86_64
bpftool-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: a0f0bead89a6572d1d4370b75f8681373405dd395ace33d316589386ec4fcdd9
bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5
bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5
kernel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: af2c369658fd340012f769cb768b9525ee9a6ebbe27508e76dfe00bc8d391dc3
kernel-abi-whitelists-3.10.0-1062.72.1.el7.noarch.rpm
SHA-256: ce16049e7927a5c45f68b798a59d46210be1d85d82772430042a3ded4360cc98
kernel-debug-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 19c7e0fe79111aed4d65d39c0005a256c714d256e6020e4b85542208e4c9ccc1
kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb
kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb
kernel-debug-devel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: f8bbe15dc9b8179eb9d3e536dd2dae2cf9ef7d4719813dc25a3eedb36dbef839
kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957
kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957
kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356
kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356
kernel-devel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: ef8c1f066098f92eb884bb46e3e39bcc4dc648dca6ccc1a11ab7fb90658f0604
kernel-doc-3.10.0-1062.72.1.el7.noarch.rpm
SHA-256: 17ed67ac35ffd28dcf4ab5953755bd75e154fec17c0e7d78b0d9f39a4981c490
kernel-headers-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 8bc3d8f4ebfb5004376d4155f186f09810a57f5119feebbefc2d5bc1a4efe67f
kernel-tools-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: d9b725eb7281f3a133184236e2894dde6ae64e578c6dabefaa4bf809449ba486
kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e
kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e
kernel-tools-libs-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 33daa5472722c70bd12a101a7cc960872303a9ace53cae0f49f8895613b7a201
kernel-tools-libs-devel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: e58447fbae6896d10e17d75d6252bb800326fe0375906923c224054dc63c4da7
perf-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: be07c9fa7b0d7c7796a0d5df3e115446b24173ae22b947ae5006246cdf670e14
perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7
perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7
python-perf-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: c529d1df942ffb3f50f4577e1e8c8e33c1df8893798606ec7a57e86baad3f1e5
python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448
python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448
Red Hat Enterprise Linux Server - TUS 7.7
SRPM
kernel-3.10.0-1062.72.1.el7.src.rpm
SHA-256: 91673e9dac7a04f1379c73cdf7c16fffa546c9c2bce8e31af5ddfd10b59c8c68
x86_64
bpftool-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: a0f0bead89a6572d1d4370b75f8681373405dd395ace33d316589386ec4fcdd9
bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5
bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5
kernel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: af2c369658fd340012f769cb768b9525ee9a6ebbe27508e76dfe00bc8d391dc3
kernel-abi-whitelists-3.10.0-1062.72.1.el7.noarch.rpm
SHA-256: ce16049e7927a5c45f68b798a59d46210be1d85d82772430042a3ded4360cc98
kernel-debug-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 19c7e0fe79111aed4d65d39c0005a256c714d256e6020e4b85542208e4c9ccc1
kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb
kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb
kernel-debug-devel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: f8bbe15dc9b8179eb9d3e536dd2dae2cf9ef7d4719813dc25a3eedb36dbef839
kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957
kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957
kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356
kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356
kernel-devel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: ef8c1f066098f92eb884bb46e3e39bcc4dc648dca6ccc1a11ab7fb90658f0604
kernel-doc-3.10.0-1062.72.1.el7.noarch.rpm
SHA-256: 17ed67ac35ffd28dcf4ab5953755bd75e154fec17c0e7d78b0d9f39a4981c490
kernel-headers-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 8bc3d8f4ebfb5004376d4155f186f09810a57f5119feebbefc2d5bc1a4efe67f
kernel-tools-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: d9b725eb7281f3a133184236e2894dde6ae64e578c6dabefaa4bf809449ba486
kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e
kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e
kernel-tools-libs-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 33daa5472722c70bd12a101a7cc960872303a9ace53cae0f49f8895613b7a201
kernel-tools-libs-devel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: e58447fbae6896d10e17d75d6252bb800326fe0375906923c224054dc63c4da7
perf-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: be07c9fa7b0d7c7796a0d5df3e115446b24173ae22b947ae5006246cdf670e14
perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7
perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7
python-perf-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: c529d1df942ffb3f50f4577e1e8c8e33c1df8893798606ec7a57e86baad3f1e5
python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448
python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7
SRPM
kernel-3.10.0-1062.72.1.el7.src.rpm
SHA-256: 91673e9dac7a04f1379c73cdf7c16fffa546c9c2bce8e31af5ddfd10b59c8c68
ppc64le
bpftool-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 7c575f3740489edbc3c32e6623f1f2130308c22f537166d8941b0f261d8d0f3c
bpftool-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 79e2d36463bc48dce5785bce894ab6779f17a61b2bbff092f3f37719cb70785c
bpftool-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 79e2d36463bc48dce5785bce894ab6779f17a61b2bbff092f3f37719cb70785c
kernel-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 8c820208397e1f1fc20b3609abba61d0256b739e67942b1c2e11b048b347b151
kernel-abi-whitelists-3.10.0-1062.72.1.el7.noarch.rpm
SHA-256: ce16049e7927a5c45f68b798a59d46210be1d85d82772430042a3ded4360cc98
kernel-bootwrapper-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: aadbcc9c38cd58e1156dbfc6d36e3d39008a07481d3f0dd5888e797c45afa852
kernel-debug-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 6144bae2bc36dbf0f2ea7aeb874c02f9e491c75b7060ab9cf4548f3b43021416
kernel-debug-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 614f51074eb989badbc7befc8dfba71330cc62acd14722c4fa6029b245459b96
kernel-debug-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 614f51074eb989badbc7befc8dfba71330cc62acd14722c4fa6029b245459b96
kernel-debug-devel-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 6678a7498ed09a5ad94488412118f95334f255e917ab1423f9045d314d5d29f9
kernel-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: fd8f95bcd3b574d8e7e0fb52260a04c2c7c8455fbba0df282f1fb2eb804c1e61
kernel-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: fd8f95bcd3b574d8e7e0fb52260a04c2c7c8455fbba0df282f1fb2eb804c1e61
kernel-debuginfo-common-ppc64le-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 1236a048eb9a97bd3b33a906a79f9b7b68f9e3972e44bb785f8ecf9728e75857
kernel-debuginfo-common-ppc64le-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 1236a048eb9a97bd3b33a906a79f9b7b68f9e3972e44bb785f8ecf9728e75857
kernel-devel-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 9bf404d9f41351724202998ccfa5a46bdc6cf9997ca4ae19e1cd925b2fc4cdd4
kernel-doc-3.10.0-1062.72.1.el7.noarch.rpm
SHA-256: 17ed67ac35ffd28dcf4ab5953755bd75e154fec17c0e7d78b0d9f39a4981c490
kernel-headers-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 2cd02593b24ac611c75fdba86d2a9c688e7d10de2fdd39b0a793e74d33ba8d83
kernel-tools-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: ed48d444d2233414208986f75cd075228646077e5060838cd1a71e0c91c7b1f4
kernel-tools-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 76f2e70f37c14e079f114308ec46e3ad4d02f49064f410304acec0049e294977
kernel-tools-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 76f2e70f37c14e079f114308ec46e3ad4d02f49064f410304acec0049e294977
kernel-tools-libs-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 5b93b8ffe4b97a4fe6c83615d5a925ae74f8009a60cbaef715ac6f3fee2ff88f
kernel-tools-libs-devel-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 004cc143c15544a7c362b33922f835e4303176abc56de5a651cd66009ee05490
perf-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 9e2189a2f325ac2a6bbaf36db2d6928d1acf73750c99329b523cece234d9a786
perf-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: ccb6abfa7d6ad40ca78a6b5ec59e04e5eb009fc685c6b69429d925b116c1cd8b
perf-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: ccb6abfa7d6ad40ca78a6b5ec59e04e5eb009fc685c6b69429d925b116c1cd8b
python-perf-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: a57f4d03f77d91a71f838d633d5f3d88eeeacaecb2545ab584d081a0935995c6
python-perf-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 111608d550d8fc53493ca19a22f176cfeffaa316f6db86d2eba4e1de93453529
python-perf-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm
SHA-256: 111608d550d8fc53493ca19a22f176cfeffaa316f6db86d2eba4e1de93453529
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7
SRPM
kernel-3.10.0-1062.72.1.el7.src.rpm
SHA-256: 91673e9dac7a04f1379c73cdf7c16fffa546c9c2bce8e31af5ddfd10b59c8c68
x86_64
bpftool-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: a0f0bead89a6572d1d4370b75f8681373405dd395ace33d316589386ec4fcdd9
bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5
bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5
kernel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: af2c369658fd340012f769cb768b9525ee9a6ebbe27508e76dfe00bc8d391dc3
kernel-abi-whitelists-3.10.0-1062.72.1.el7.noarch.rpm
SHA-256: ce16049e7927a5c45f68b798a59d46210be1d85d82772430042a3ded4360cc98
kernel-debug-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 19c7e0fe79111aed4d65d39c0005a256c714d256e6020e4b85542208e4c9ccc1
kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb
kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb
kernel-debug-devel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: f8bbe15dc9b8179eb9d3e536dd2dae2cf9ef7d4719813dc25a3eedb36dbef839
kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957
kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957
kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356
kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356
kernel-devel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: ef8c1f066098f92eb884bb46e3e39bcc4dc648dca6ccc1a11ab7fb90658f0604
kernel-doc-3.10.0-1062.72.1.el7.noarch.rpm
SHA-256: 17ed67ac35ffd28dcf4ab5953755bd75e154fec17c0e7d78b0d9f39a4981c490
kernel-headers-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 8bc3d8f4ebfb5004376d4155f186f09810a57f5119feebbefc2d5bc1a4efe67f
kernel-tools-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: d9b725eb7281f3a133184236e2894dde6ae64e578c6dabefaa4bf809449ba486
kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e
kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e
kernel-tools-libs-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 33daa5472722c70bd12a101a7cc960872303a9ace53cae0f49f8895613b7a201
kernel-tools-libs-devel-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: e58447fbae6896d10e17d75d6252bb800326fe0375906923c224054dc63c4da7
perf-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: be07c9fa7b0d7c7796a0d5df3e115446b24173ae22b947ae5006246cdf670e14
perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7
perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7
python-perf-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: c529d1df942ffb3f50f4577e1e8c8e33c1df8893798606ec7a57e86baad3f1e5
python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448
python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm
SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448
Related news
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
Red Hat Security Advisory 2023-3495-01 - Logging Subsystem 5.7.2 - Red Hat OpenShift. Issues addressed include cross site scripting and denial of service vulnerabilities.
Red Hat Security Advisory 2023-3431-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-3356-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.
Red Hat Security Advisory 2023-3326-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.6 images. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.
Red Hat Security Advisory 2023-1559-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1560-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2023-0266: A us...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack ove...
Red Hat Security Advisory 2023-1220-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1008-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP blue...
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in ho...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality...
A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.