Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat 製品エラータ RHSA-2023:4215 - Security Advisory
発行日:
2023-07-19
更新日:
2023-07-19

RHSA-2023:4215 - Security Advisory

  • 概要
  • 更新パッケージ

概要

Important: kpatch-patch security update

タイプ/重大度

Security Advisory: Important

Red Hat Insights パッチ分析

このアドバイザリーの影響を受けるシステムを特定し、修正します。

影響を受けるシステムの表示

トピック

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

説明

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

解決策

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

影響を受ける製品

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le

修正

  • BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c

CVE

  • CVE-2022-3564

参考資料

  • https://access.redhat.com/security/updates/classification/#important
注記: これらのパッケージのより新しいバージョンを利用できる場合があります。 詳細はパッケージ名をクリックしてください。

Red Hat Enterprise Linux Server 7

SRPM
kpatch-patch-3_10_0-1160_81_1-1-3.el7.src.rpm SHA-256: c533b17151e1937a62b0913c7ecedab38f23e8fef64e79962b8fc106014597f9
kpatch-patch-3_10_0-1160_83_1-1-2.el7.src.rpm SHA-256: 64d38f41f1704966c6eef3eefc95df0059fd3b49bb094d14cbbb8748acc807a1
kpatch-patch-3_10_0-1160_88_1-1-1.el7.src.rpm SHA-256: 738ad938e41e402661109b32477ac40a2ad4f95b804c5d8891b32f4a67ae1da3
kpatch-patch-3_10_0-1160_90_1-1-1.el7.src.rpm SHA-256: 9c833fc0136a6d5bc796390549cb195de495ad1ab3da714649f1098dece02fa0
kpatch-patch-3_10_0-1160_92_1-1-1.el7.src.rpm SHA-256: 11de87ec93198ffb989c18f4f6af76a4f78dbf8a796c90e6c97c74d980db9ac1
x86_64
kpatch-patch-3_10_0-1160_81_1-1-3.el7.x86_64.rpm SHA-256: a7ac82762748124b460f5d600be24d3d424aa3bc5a65af337d0a0567eae2555f
kpatch-patch-3_10_0-1160_81_1-debuginfo-1-3.el7.x86_64.rpm SHA-256: 6660d4776b14629e006fe45072269e5582ef943bdf2350bd759a0a0a12aae34c
kpatch-patch-3_10_0-1160_83_1-1-2.el7.x86_64.rpm SHA-256: 785fc635e756cbad6c8ff0fa5ab17b10d84fb1e87ed2484f365911a2fae7f844
kpatch-patch-3_10_0-1160_83_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: fe71526705f460fe2b9383f655f6c88727d71952de62ea714fc35cf401f3c3b3
kpatch-patch-3_10_0-1160_88_1-1-1.el7.x86_64.rpm SHA-256: 01e85cade97bb6dfb4100c55cd967b0946e30949e468baa337df5b623fe3bfac
kpatch-patch-3_10_0-1160_88_1-debuginfo-1-1.el7.x86_64.rpm SHA-256: c7a7262ddb33fd9514c14532f9116dbbccfbbd0a062b4988b88b31e22b28852b
kpatch-patch-3_10_0-1160_90_1-1-1.el7.x86_64.rpm SHA-256: 28e95c5bcd62ee11089c66f4c13a0fc1b0b82e18a8eb0cb44645e2d881a62e63
kpatch-patch-3_10_0-1160_90_1-debuginfo-1-1.el7.x86_64.rpm SHA-256: 02b5d17c7d19ff0bd39c21f835915c4f769429a913a987f9becea4b03a495746
kpatch-patch-3_10_0-1160_92_1-1-1.el7.x86_64.rpm SHA-256: 298c9bb778a8a0fe5ea2d883009df7b422b45b95564b126276d1572898c631a9
kpatch-patch-3_10_0-1160_92_1-debuginfo-1-1.el7.x86_64.rpm SHA-256: be75ac6c22c40eb00e1590120832d01170e1b554015dadfeb7d53605ff9905c9

Red Hat Enterprise Linux for Power, little endian 7

SRPM
kpatch-patch-3_10_0-1160_81_1-1-3.el7.src.rpm SHA-256: c533b17151e1937a62b0913c7ecedab38f23e8fef64e79962b8fc106014597f9
kpatch-patch-3_10_0-1160_83_1-1-2.el7.src.rpm SHA-256: 64d38f41f1704966c6eef3eefc95df0059fd3b49bb094d14cbbb8748acc807a1
kpatch-patch-3_10_0-1160_88_1-1-1.el7.src.rpm SHA-256: 738ad938e41e402661109b32477ac40a2ad4f95b804c5d8891b32f4a67ae1da3
kpatch-patch-3_10_0-1160_90_1-1-1.el7.src.rpm SHA-256: 9c833fc0136a6d5bc796390549cb195de495ad1ab3da714649f1098dece02fa0
kpatch-patch-3_10_0-1160_92_1-1-1.el7.src.rpm SHA-256: 11de87ec93198ffb989c18f4f6af76a4f78dbf8a796c90e6c97c74d980db9ac1
ppc64le
kpatch-patch-3_10_0-1160_81_1-1-3.el7.ppc64le.rpm SHA-256: 39234fe567e0af2494c550e4e229bed7b4006539461e223ee9920bde303b57cd
kpatch-patch-3_10_0-1160_81_1-debuginfo-1-3.el7.ppc64le.rpm SHA-256: 807a990daddfe063840eba141978d801f53b71f56cb7b5f48d893349865afea7
kpatch-patch-3_10_0-1160_83_1-1-2.el7.ppc64le.rpm SHA-256: df665d0803b95135a21945f995872e5c983a9febc5e065b652e6a688e1fc02d8
kpatch-patch-3_10_0-1160_83_1-debuginfo-1-2.el7.ppc64le.rpm SHA-256: 18bafafb47fe3e409c6968d416ad398fa4baed336ce900f9aceb9e7e84f3b783
kpatch-patch-3_10_0-1160_88_1-1-1.el7.ppc64le.rpm SHA-256: 99e860f26fad11e0a1a3c6edcefe8f667181cdb07e956d41568ed52faf47460c
kpatch-patch-3_10_0-1160_88_1-debuginfo-1-1.el7.ppc64le.rpm SHA-256: 71145122cdef12ba4b28c7cfa69e8cb399c148a7d0604ecc577bf39d7eca112e
kpatch-patch-3_10_0-1160_90_1-1-1.el7.ppc64le.rpm SHA-256: ab8e30ad96bfc1f10cc45464122a238ae4e33ec3ab75acc9c7012287aadebf0e
kpatch-patch-3_10_0-1160_90_1-debuginfo-1-1.el7.ppc64le.rpm SHA-256: 8041db5e4f4f4c3f226eb22fcb3cd6ea1bc2ab85e6f2bb9511fec9ce79d542fb
kpatch-patch-3_10_0-1160_92_1-1-1.el7.ppc64le.rpm SHA-256: 7daa588180c93214a74a8d1278b2d8fb1159f98248957d93e62e32c0d1fbd0ba
kpatch-patch-3_10_0-1160_92_1-debuginfo-1-1.el7.ppc64le.rpm SHA-256: 5bf952ed1cbce8f879195070f42cb56b3e957481bdfa8b0e56f311671820dfa9

Red Hat のセキュリティーに関する連絡先は secalert@redhat.com です。 連絡先の詳細は https://access.redhat.com/security/team/contact/ をご覧ください。

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Statement effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter