Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:3277: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
Red Hat Security Data
#vulnerability#linux#red_hat#sap

Synopsis

Important: kernel security update

Type / Sévérité

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Sujet

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Produits concernés

  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64
  • Red Hat Enterprise Linux Server - TUS 7.7 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64

Correctifs

  • BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c

Red Hat Enterprise Linux Server - AUS 7.7

SRPM

kernel-3.10.0-1062.72.1.el7.src.rpm

SHA-256: 91673e9dac7a04f1379c73cdf7c16fffa546c9c2bce8e31af5ddfd10b59c8c68

x86_64

bpftool-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: a0f0bead89a6572d1d4370b75f8681373405dd395ace33d316589386ec4fcdd9

bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5

bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5

kernel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: af2c369658fd340012f769cb768b9525ee9a6ebbe27508e76dfe00bc8d391dc3

kernel-abi-whitelists-3.10.0-1062.72.1.el7.noarch.rpm

SHA-256: ce16049e7927a5c45f68b798a59d46210be1d85d82772430042a3ded4360cc98

kernel-debug-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 19c7e0fe79111aed4d65d39c0005a256c714d256e6020e4b85542208e4c9ccc1

kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb

kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb

kernel-debug-devel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: f8bbe15dc9b8179eb9d3e536dd2dae2cf9ef7d4719813dc25a3eedb36dbef839

kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957

kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957

kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356

kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356

kernel-devel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: ef8c1f066098f92eb884bb46e3e39bcc4dc648dca6ccc1a11ab7fb90658f0604

kernel-doc-3.10.0-1062.72.1.el7.noarch.rpm

SHA-256: 17ed67ac35ffd28dcf4ab5953755bd75e154fec17c0e7d78b0d9f39a4981c490

kernel-headers-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 8bc3d8f4ebfb5004376d4155f186f09810a57f5119feebbefc2d5bc1a4efe67f

kernel-tools-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: d9b725eb7281f3a133184236e2894dde6ae64e578c6dabefaa4bf809449ba486

kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e

kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e

kernel-tools-libs-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 33daa5472722c70bd12a101a7cc960872303a9ace53cae0f49f8895613b7a201

kernel-tools-libs-devel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: e58447fbae6896d10e17d75d6252bb800326fe0375906923c224054dc63c4da7

perf-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: be07c9fa7b0d7c7796a0d5df3e115446b24173ae22b947ae5006246cdf670e14

perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7

perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7

python-perf-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: c529d1df942ffb3f50f4577e1e8c8e33c1df8893798606ec7a57e86baad3f1e5

python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448

python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448

Red Hat Enterprise Linux Server - TUS 7.7

SRPM

kernel-3.10.0-1062.72.1.el7.src.rpm

SHA-256: 91673e9dac7a04f1379c73cdf7c16fffa546c9c2bce8e31af5ddfd10b59c8c68

x86_64

bpftool-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: a0f0bead89a6572d1d4370b75f8681373405dd395ace33d316589386ec4fcdd9

bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5

bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5

kernel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: af2c369658fd340012f769cb768b9525ee9a6ebbe27508e76dfe00bc8d391dc3

kernel-abi-whitelists-3.10.0-1062.72.1.el7.noarch.rpm

SHA-256: ce16049e7927a5c45f68b798a59d46210be1d85d82772430042a3ded4360cc98

kernel-debug-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 19c7e0fe79111aed4d65d39c0005a256c714d256e6020e4b85542208e4c9ccc1

kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb

kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb

kernel-debug-devel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: f8bbe15dc9b8179eb9d3e536dd2dae2cf9ef7d4719813dc25a3eedb36dbef839

kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957

kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957

kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356

kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356

kernel-devel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: ef8c1f066098f92eb884bb46e3e39bcc4dc648dca6ccc1a11ab7fb90658f0604

kernel-doc-3.10.0-1062.72.1.el7.noarch.rpm

SHA-256: 17ed67ac35ffd28dcf4ab5953755bd75e154fec17c0e7d78b0d9f39a4981c490

kernel-headers-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 8bc3d8f4ebfb5004376d4155f186f09810a57f5119feebbefc2d5bc1a4efe67f

kernel-tools-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: d9b725eb7281f3a133184236e2894dde6ae64e578c6dabefaa4bf809449ba486

kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e

kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e

kernel-tools-libs-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 33daa5472722c70bd12a101a7cc960872303a9ace53cae0f49f8895613b7a201

kernel-tools-libs-devel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: e58447fbae6896d10e17d75d6252bb800326fe0375906923c224054dc63c4da7

perf-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: be07c9fa7b0d7c7796a0d5df3e115446b24173ae22b947ae5006246cdf670e14

perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7

perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7

python-perf-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: c529d1df942ffb3f50f4577e1e8c8e33c1df8893798606ec7a57e86baad3f1e5

python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448

python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.72.1.el7.src.rpm

SHA-256: 91673e9dac7a04f1379c73cdf7c16fffa546c9c2bce8e31af5ddfd10b59c8c68

ppc64le

bpftool-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 7c575f3740489edbc3c32e6623f1f2130308c22f537166d8941b0f261d8d0f3c

bpftool-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 79e2d36463bc48dce5785bce894ab6779f17a61b2bbff092f3f37719cb70785c

bpftool-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 79e2d36463bc48dce5785bce894ab6779f17a61b2bbff092f3f37719cb70785c

kernel-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 8c820208397e1f1fc20b3609abba61d0256b739e67942b1c2e11b048b347b151

kernel-abi-whitelists-3.10.0-1062.72.1.el7.noarch.rpm

SHA-256: ce16049e7927a5c45f68b798a59d46210be1d85d82772430042a3ded4360cc98

kernel-bootwrapper-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: aadbcc9c38cd58e1156dbfc6d36e3d39008a07481d3f0dd5888e797c45afa852

kernel-debug-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 6144bae2bc36dbf0f2ea7aeb874c02f9e491c75b7060ab9cf4548f3b43021416

kernel-debug-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 614f51074eb989badbc7befc8dfba71330cc62acd14722c4fa6029b245459b96

kernel-debug-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 614f51074eb989badbc7befc8dfba71330cc62acd14722c4fa6029b245459b96

kernel-debug-devel-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 6678a7498ed09a5ad94488412118f95334f255e917ab1423f9045d314d5d29f9

kernel-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: fd8f95bcd3b574d8e7e0fb52260a04c2c7c8455fbba0df282f1fb2eb804c1e61

kernel-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: fd8f95bcd3b574d8e7e0fb52260a04c2c7c8455fbba0df282f1fb2eb804c1e61

kernel-debuginfo-common-ppc64le-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 1236a048eb9a97bd3b33a906a79f9b7b68f9e3972e44bb785f8ecf9728e75857

kernel-debuginfo-common-ppc64le-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 1236a048eb9a97bd3b33a906a79f9b7b68f9e3972e44bb785f8ecf9728e75857

kernel-devel-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 9bf404d9f41351724202998ccfa5a46bdc6cf9997ca4ae19e1cd925b2fc4cdd4

kernel-doc-3.10.0-1062.72.1.el7.noarch.rpm

SHA-256: 17ed67ac35ffd28dcf4ab5953755bd75e154fec17c0e7d78b0d9f39a4981c490

kernel-headers-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 2cd02593b24ac611c75fdba86d2a9c688e7d10de2fdd39b0a793e74d33ba8d83

kernel-tools-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: ed48d444d2233414208986f75cd075228646077e5060838cd1a71e0c91c7b1f4

kernel-tools-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 76f2e70f37c14e079f114308ec46e3ad4d02f49064f410304acec0049e294977

kernel-tools-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 76f2e70f37c14e079f114308ec46e3ad4d02f49064f410304acec0049e294977

kernel-tools-libs-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 5b93b8ffe4b97a4fe6c83615d5a925ae74f8009a60cbaef715ac6f3fee2ff88f

kernel-tools-libs-devel-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 004cc143c15544a7c362b33922f835e4303176abc56de5a651cd66009ee05490

perf-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 9e2189a2f325ac2a6bbaf36db2d6928d1acf73750c99329b523cece234d9a786

perf-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: ccb6abfa7d6ad40ca78a6b5ec59e04e5eb009fc685c6b69429d925b116c1cd8b

perf-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: ccb6abfa7d6ad40ca78a6b5ec59e04e5eb009fc685c6b69429d925b116c1cd8b

python-perf-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: a57f4d03f77d91a71f838d633d5f3d88eeeacaecb2545ab584d081a0935995c6

python-perf-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 111608d550d8fc53493ca19a22f176cfeffaa316f6db86d2eba4e1de93453529

python-perf-debuginfo-3.10.0-1062.72.1.el7.ppc64le.rpm

SHA-256: 111608d550d8fc53493ca19a22f176cfeffaa316f6db86d2eba4e1de93453529

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.72.1.el7.src.rpm

SHA-256: 91673e9dac7a04f1379c73cdf7c16fffa546c9c2bce8e31af5ddfd10b59c8c68

x86_64

bpftool-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: a0f0bead89a6572d1d4370b75f8681373405dd395ace33d316589386ec4fcdd9

bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5

bpftool-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 4de5ac3beedb05e3d89859fb35cb3a09a9343aaf966ca257aacd0050cef173f5

kernel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: af2c369658fd340012f769cb768b9525ee9a6ebbe27508e76dfe00bc8d391dc3

kernel-abi-whitelists-3.10.0-1062.72.1.el7.noarch.rpm

SHA-256: ce16049e7927a5c45f68b798a59d46210be1d85d82772430042a3ded4360cc98

kernel-debug-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 19c7e0fe79111aed4d65d39c0005a256c714d256e6020e4b85542208e4c9ccc1

kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb

kernel-debug-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6a629cabd2f12cf508518b404a77ad9232d70e777a10230ed41050118d25d2eb

kernel-debug-devel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: f8bbe15dc9b8179eb9d3e536dd2dae2cf9ef7d4719813dc25a3eedb36dbef839

kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957

kernel-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6692d443d0b23664974d63edda219f61ba07de2e70a25c2cddb9c55f6a965957

kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356

kernel-debuginfo-common-x86_64-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: e4081ff4ebcd59a70cf9ab6d64254ce71ce62db2509c3ffe98221378f4d60356

kernel-devel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: ef8c1f066098f92eb884bb46e3e39bcc4dc648dca6ccc1a11ab7fb90658f0604

kernel-doc-3.10.0-1062.72.1.el7.noarch.rpm

SHA-256: 17ed67ac35ffd28dcf4ab5953755bd75e154fec17c0e7d78b0d9f39a4981c490

kernel-headers-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 8bc3d8f4ebfb5004376d4155f186f09810a57f5119feebbefc2d5bc1a4efe67f

kernel-tools-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: d9b725eb7281f3a133184236e2894dde6ae64e578c6dabefaa4bf809449ba486

kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e

kernel-tools-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 631f5a139912854f3ed760fa62f7d6df25bec2e32f710663d5b5ac1c053f341e

kernel-tools-libs-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 33daa5472722c70bd12a101a7cc960872303a9ace53cae0f49f8895613b7a201

kernel-tools-libs-devel-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: e58447fbae6896d10e17d75d6252bb800326fe0375906923c224054dc63c4da7

perf-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: be07c9fa7b0d7c7796a0d5df3e115446b24173ae22b947ae5006246cdf670e14

perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7

perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 57949f6eb36e146dbdd4f7cfc8442052bbfdcc0169ef51f7d56fa1716c6c16f7

python-perf-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: c529d1df942ffb3f50f4577e1e8c8e33c1df8893798606ec7a57e86baad3f1e5

python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448

python-perf-debuginfo-3.10.0-1062.72.1.el7.x86_64.rpm

SHA-256: 6910d0cea4a5e8e831fdb4bda47dc3bb2f187af672ddc0df4c090381eb4a4448

Related news

RHSA-2023:4215: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.

RHSA-2023:4150: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.

RHSA-2023:4020: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.

Red Hat Security Advisory 2023-3495-01

Red Hat Security Advisory 2023-3495-01 - Logging Subsystem 5.7.2 - Red Hat OpenShift. Issues addressed include cross site scripting and denial of service vulnerabilities.

Red Hat Security Advisory 2023-3431-01

Red Hat Security Advisory 2023-3431-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-3356-01

Red Hat Security Advisory 2023-3356-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

Red Hat Security Advisory 2023-3326-01

Red Hat Security Advisory 2023-3326-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.6 images. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

Red Hat Security Advisory 2023-1559-01

Red Hat Security Advisory 2023-1559-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-1560-01

Red Hat Security Advisory 2023-1560-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

RHSA-2023:1560: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2023-0266: A us...

RHSA-2023:1435: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack ove...

Red Hat Security Advisory 2023-1220-01

Red Hat Security Advisory 2023-1220-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-1008-01

Red Hat Security Advisory 2023-1008-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.

RHSA-2023:0979: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP blue...

RHSA-2023:0856: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in ho...

RHSA-2023:0858: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality...

CVE-2022-3564

A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.