Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2022-3564 CVE-2022-4269 CVE-2022-4378 |
CWE-ID | CWE-416 CWE-833 CWE-121 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #3 is available. |
Vulnerable software Subscribe |
Red Hat Enterprise Linux for Real Time - Telecommunications Update Service Operating systems & Components / Operating system kernel-rt (Red Hat package) Operating systems & Components / Operating system package or component |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU69799
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-3564
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows an attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the l2cap_reassemble_sdu() function in net/bluetooth/l2cap_core.c. An attacker with physical access to device can trigger a use-after-free error and execute arbitrary code on the system.
Install updates from vendor's website.
Red Hat Enterprise Linux for Real Time - Telecommunications Update Service: 8.4
kernel-rt (Red Hat package): before 4.18.0-305.82.1.rt7.154.el8_4
CPE2.3 External linkshttp://access.redhat.com/errata/RHSA-2023:1220
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU73186
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-4269
CWE-ID:
CWE-833 - Deadlock
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an error in the Linux kernel Traffic Control (TC) subsystem. A local user can use a specific network configuration (redirecting egress packets to ingress using TC action "mirred") to trigger a CPU soft lockup.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for Real Time - Telecommunications Update Service: 8.4
kernel-rt (Red Hat package): before 4.18.0-305.82.1.rt7.154.el8_4
CPE2.3 External linkshttp://access.redhat.com/errata/RHSA-2023:1220
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70442
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-4378
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the __do_proc_dointvec() function. A local user can trigger a stack-based buffer overflow and execute arbitrary code with elevated privileges.
Install updates from vendor's website.
Red Hat Enterprise Linux for Real Time - Telecommunications Update Service: 8.4
kernel-rt (Red Hat package): before 4.18.0-305.82.1.rt7.154.el8_4
CPE2.3 External linkshttp://access.redhat.com/errata/RHSA-2023:1220
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?