Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:4022: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-2588: A use-after-free flaw was found in route4_change in the net/sched/cls_route.c filter implementation in the Linux kernel. This flaw allows a local user to crash the system and possibly lead to a local privilege escalation problem.
Red Hat Security Data
#vulnerability#linux#red_hat#sap

Synopsis

Important: kernel security and bug fix update

Type / Sévérité

Security Advisory: Important

Analyse des correctifs dans Red Hat Insights

Identifiez et remédiez aux systèmes concernés par cette alerte.

Voir les systèmes concernés

Sujet

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • The iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2183540)
  • Double free issue in filelayout_alloc_commit_info (BZ#2212868)
  • RHEL 7.2: XFS inode cluster corruption (BZ#2213360)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Produits concernés

  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64
  • Red Hat Enterprise Linux Server - TUS 7.7 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64

Correctifs

  • BZ - 2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation

Red Hat Enterprise Linux Server - AUS 7.7

SRPM

kernel-3.10.0-1062.76.1.el7.src.rpm

SHA-256: 22620c3ed24ffc4462259ebbeffa27b9d726a735bce7bb8215eef69df41db368

x86_64

bpftool-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 980b43ab32bb799b06eda501c5814e448613184fae60e9fb1c727ff654bbf756

bpftool-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: fb09113353d18dc56def9c0cbba592adca5590dc14968ff0a9a8c74211e2554d

bpftool-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: fb09113353d18dc56def9c0cbba592adca5590dc14968ff0a9a8c74211e2554d

kernel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: ef1c9b02057fbe5e26cd7f01523393394b0dbea19aa725f6626cb0c9e840bbee

kernel-abi-whitelists-3.10.0-1062.76.1.el7.noarch.rpm

SHA-256: 7ce58e4ca94495a8c94f8bad39155439b62db48928bdc0f954c9676958ec82f5

kernel-debug-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 0b605d92e97a5e624dc41f05023680d86a7f76d50453fae3e60a5c1c598f4cdd

kernel-debug-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: b46c44214811dd90c6ef28b38387830e4de9ddd8e59cdffc2ed8739d91ffc52c

kernel-debug-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: b46c44214811dd90c6ef28b38387830e4de9ddd8e59cdffc2ed8739d91ffc52c

kernel-debug-devel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 9ff28ef07fc1db8b1766fd270c2d7e246cc602b0d4742a70028bc09257f3dc2b

kernel-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: e4b3cb4b3c99bf3933bd4410435685d4bead25f820baf890be4a8d547eb7eab3

kernel-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: e4b3cb4b3c99bf3933bd4410435685d4bead25f820baf890be4a8d547eb7eab3

kernel-debuginfo-common-x86_64-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: ca60ca1652cee601230da9e0005f1499ef7cb0d952f6469ba78fc9f47b008697

kernel-debuginfo-common-x86_64-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: ca60ca1652cee601230da9e0005f1499ef7cb0d952f6469ba78fc9f47b008697

kernel-devel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 63ec39c293fc8fe392a950e1b812d24c6e03f5fca28da3df28e07f3db53c9970

kernel-doc-3.10.0-1062.76.1.el7.noarch.rpm

SHA-256: 319e41f3dbf99af436e892ff3cd39dabf639225ff884343e2f00859b4661c3dc

kernel-headers-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 0c9430a9422f3fe563c226e9ab812f6be06079153be46f26d1242911ca58f5b8

kernel-tools-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 81b9cf905f3d3ffe6bca2ea33872f8043b4e5c2ca9ab8594ecc8d74e628c0e3e

kernel-tools-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 3ca2c80095da1fe3efdf8e344f3d17de77871df539b157cebee2bc77a5ed5b40

kernel-tools-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 3ca2c80095da1fe3efdf8e344f3d17de77871df539b157cebee2bc77a5ed5b40

kernel-tools-libs-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 7245f99dafb0e154c25975a684a73e9a03592e1801aa17a35efac77b08b76ed9

kernel-tools-libs-devel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 15f4fd71bc2597553bcbd692f78e4ac7fcac343148a26423f44bbef85d67324b

perf-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 69a2ad80a513c93011fb77953349713d23db44c3618ba4094e22491221d5084b

perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 1c16aabd60258aece6b039bdb7c64935c01fa388a90e17bda84d3de2e548f39b

perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 1c16aabd60258aece6b039bdb7c64935c01fa388a90e17bda84d3de2e548f39b

python-perf-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 294a2c96202c72e3ec19bb784133c212956b1f58d896142527db8a568ebca222

python-perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 47a7a25d1eecfde173ddbf8d1891ac13b8c23974eeea4eae24c4b553274abe60

python-perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 47a7a25d1eecfde173ddbf8d1891ac13b8c23974eeea4eae24c4b553274abe60

Red Hat Enterprise Linux Server - TUS 7.7

SRPM

kernel-3.10.0-1062.76.1.el7.src.rpm

SHA-256: 22620c3ed24ffc4462259ebbeffa27b9d726a735bce7bb8215eef69df41db368

x86_64

bpftool-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 980b43ab32bb799b06eda501c5814e448613184fae60e9fb1c727ff654bbf756

bpftool-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: fb09113353d18dc56def9c0cbba592adca5590dc14968ff0a9a8c74211e2554d

bpftool-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: fb09113353d18dc56def9c0cbba592adca5590dc14968ff0a9a8c74211e2554d

kernel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: ef1c9b02057fbe5e26cd7f01523393394b0dbea19aa725f6626cb0c9e840bbee

kernel-abi-whitelists-3.10.0-1062.76.1.el7.noarch.rpm

SHA-256: 7ce58e4ca94495a8c94f8bad39155439b62db48928bdc0f954c9676958ec82f5

kernel-debug-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 0b605d92e97a5e624dc41f05023680d86a7f76d50453fae3e60a5c1c598f4cdd

kernel-debug-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: b46c44214811dd90c6ef28b38387830e4de9ddd8e59cdffc2ed8739d91ffc52c

kernel-debug-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: b46c44214811dd90c6ef28b38387830e4de9ddd8e59cdffc2ed8739d91ffc52c

kernel-debug-devel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 9ff28ef07fc1db8b1766fd270c2d7e246cc602b0d4742a70028bc09257f3dc2b

kernel-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: e4b3cb4b3c99bf3933bd4410435685d4bead25f820baf890be4a8d547eb7eab3

kernel-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: e4b3cb4b3c99bf3933bd4410435685d4bead25f820baf890be4a8d547eb7eab3

kernel-debuginfo-common-x86_64-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: ca60ca1652cee601230da9e0005f1499ef7cb0d952f6469ba78fc9f47b008697

kernel-debuginfo-common-x86_64-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: ca60ca1652cee601230da9e0005f1499ef7cb0d952f6469ba78fc9f47b008697

kernel-devel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 63ec39c293fc8fe392a950e1b812d24c6e03f5fca28da3df28e07f3db53c9970

kernel-doc-3.10.0-1062.76.1.el7.noarch.rpm

SHA-256: 319e41f3dbf99af436e892ff3cd39dabf639225ff884343e2f00859b4661c3dc

kernel-headers-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 0c9430a9422f3fe563c226e9ab812f6be06079153be46f26d1242911ca58f5b8

kernel-tools-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 81b9cf905f3d3ffe6bca2ea33872f8043b4e5c2ca9ab8594ecc8d74e628c0e3e

kernel-tools-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 3ca2c80095da1fe3efdf8e344f3d17de77871df539b157cebee2bc77a5ed5b40

kernel-tools-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 3ca2c80095da1fe3efdf8e344f3d17de77871df539b157cebee2bc77a5ed5b40

kernel-tools-libs-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 7245f99dafb0e154c25975a684a73e9a03592e1801aa17a35efac77b08b76ed9

kernel-tools-libs-devel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 15f4fd71bc2597553bcbd692f78e4ac7fcac343148a26423f44bbef85d67324b

perf-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 69a2ad80a513c93011fb77953349713d23db44c3618ba4094e22491221d5084b

perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 1c16aabd60258aece6b039bdb7c64935c01fa388a90e17bda84d3de2e548f39b

perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 1c16aabd60258aece6b039bdb7c64935c01fa388a90e17bda84d3de2e548f39b

python-perf-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 294a2c96202c72e3ec19bb784133c212956b1f58d896142527db8a568ebca222

python-perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 47a7a25d1eecfde173ddbf8d1891ac13b8c23974eeea4eae24c4b553274abe60

python-perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 47a7a25d1eecfde173ddbf8d1891ac13b8c23974eeea4eae24c4b553274abe60

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.76.1.el7.src.rpm

SHA-256: 22620c3ed24ffc4462259ebbeffa27b9d726a735bce7bb8215eef69df41db368

ppc64le

bpftool-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 91a299cdc2c3618eb97ae5f03e54807902b64ecdf32007f3f31eaba7cc341736

bpftool-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 8982b0fb34de988dfeb419d0ca0205972fad3803589d81e971d6f6d57fa834aa

bpftool-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 8982b0fb34de988dfeb419d0ca0205972fad3803589d81e971d6f6d57fa834aa

kernel-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: fa0a64753eec3875011db30b62c9a44fb6eef68822b656164635b3105eb1dccb

kernel-abi-whitelists-3.10.0-1062.76.1.el7.noarch.rpm

SHA-256: 7ce58e4ca94495a8c94f8bad39155439b62db48928bdc0f954c9676958ec82f5

kernel-bootwrapper-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 5a383509e70cf07986f5da990d6ce76f66b644fe3f07d057422bd796e0b91f36

kernel-debug-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 08831fd3366839d77301a05a33326a9e772c2bd4c1f01432ef25a564574c433d

kernel-debug-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 9a5eb0442cf2e983362f300a45b11aad8bbe5f013826ba714582a14dbcce4466

kernel-debug-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 9a5eb0442cf2e983362f300a45b11aad8bbe5f013826ba714582a14dbcce4466

kernel-debug-devel-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 3c304996a9e90e204201fae83f38ab1646b662540efc83db162f3a65771b7dfa

kernel-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: cbcdd644fa7eafcf6494460d263f2450e7cd9bc9d660d1172bad2217654d9f59

kernel-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: cbcdd644fa7eafcf6494460d263f2450e7cd9bc9d660d1172bad2217654d9f59

kernel-debuginfo-common-ppc64le-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 4063b43f9aa2b38ff3696db373d3fbd1baeb544a7b421cdf9e45a88d07e09ea7

kernel-debuginfo-common-ppc64le-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 4063b43f9aa2b38ff3696db373d3fbd1baeb544a7b421cdf9e45a88d07e09ea7

kernel-devel-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: beabfb439836505fea06b6acf375c32c4e3cd6df5b27325d024ea114a5b04f1b

kernel-doc-3.10.0-1062.76.1.el7.noarch.rpm

SHA-256: 319e41f3dbf99af436e892ff3cd39dabf639225ff884343e2f00859b4661c3dc

kernel-headers-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: a26705b9c0ae10693fef92c2472c26173785fe7a0e5a15a1869e57876d6dcc10

kernel-tools-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 10c6d160d6cef4210b2f06f4f1b544f61a37293bc4a8c8147959d6d656087cc7

kernel-tools-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: a14f2a643dddc7141c1ee139c6dd2e1cfcb2a27b439f0c784d2799dd8cdaec43

kernel-tools-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: a14f2a643dddc7141c1ee139c6dd2e1cfcb2a27b439f0c784d2799dd8cdaec43

kernel-tools-libs-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: ac0fab484c662985888867d5ced57d3c96390f2a4058a5bec84fa6b789402acc

kernel-tools-libs-devel-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 8355d4cb9d87512a8f9ce9197512e2211a060d6b45b21f49199711f5fe0c5f25

perf-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: 350ebd8e0835a5d1744691d1d43ff20c246043c0fe412a9aab99fb076bead4d6

perf-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: c62a4e8c16bcbdac8fe2bb743dd8ba8778571683f8daf7a84064011d99f247fd

perf-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: c62a4e8c16bcbdac8fe2bb743dd8ba8778571683f8daf7a84064011d99f247fd

python-perf-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: af3a48afd13263709ff84a3a25bc2df08c1e9acb484a3fdc6b687332a27f60b7

python-perf-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: e0fbd9bff015b83a25e788b942e14fa5dc54e0a695b4c7492ae3db3ef6177740

python-perf-debuginfo-3.10.0-1062.76.1.el7.ppc64le.rpm

SHA-256: e0fbd9bff015b83a25e788b942e14fa5dc54e0a695b4c7492ae3db3ef6177740

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.76.1.el7.src.rpm

SHA-256: 22620c3ed24ffc4462259ebbeffa27b9d726a735bce7bb8215eef69df41db368

x86_64

bpftool-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 980b43ab32bb799b06eda501c5814e448613184fae60e9fb1c727ff654bbf756

bpftool-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: fb09113353d18dc56def9c0cbba592adca5590dc14968ff0a9a8c74211e2554d

bpftool-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: fb09113353d18dc56def9c0cbba592adca5590dc14968ff0a9a8c74211e2554d

kernel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: ef1c9b02057fbe5e26cd7f01523393394b0dbea19aa725f6626cb0c9e840bbee

kernel-abi-whitelists-3.10.0-1062.76.1.el7.noarch.rpm

SHA-256: 7ce58e4ca94495a8c94f8bad39155439b62db48928bdc0f954c9676958ec82f5

kernel-debug-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 0b605d92e97a5e624dc41f05023680d86a7f76d50453fae3e60a5c1c598f4cdd

kernel-debug-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: b46c44214811dd90c6ef28b38387830e4de9ddd8e59cdffc2ed8739d91ffc52c

kernel-debug-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: b46c44214811dd90c6ef28b38387830e4de9ddd8e59cdffc2ed8739d91ffc52c

kernel-debug-devel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 9ff28ef07fc1db8b1766fd270c2d7e246cc602b0d4742a70028bc09257f3dc2b

kernel-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: e4b3cb4b3c99bf3933bd4410435685d4bead25f820baf890be4a8d547eb7eab3

kernel-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: e4b3cb4b3c99bf3933bd4410435685d4bead25f820baf890be4a8d547eb7eab3

kernel-debuginfo-common-x86_64-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: ca60ca1652cee601230da9e0005f1499ef7cb0d952f6469ba78fc9f47b008697

kernel-debuginfo-common-x86_64-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: ca60ca1652cee601230da9e0005f1499ef7cb0d952f6469ba78fc9f47b008697

kernel-devel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 63ec39c293fc8fe392a950e1b812d24c6e03f5fca28da3df28e07f3db53c9970

kernel-doc-3.10.0-1062.76.1.el7.noarch.rpm

SHA-256: 319e41f3dbf99af436e892ff3cd39dabf639225ff884343e2f00859b4661c3dc

kernel-headers-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 0c9430a9422f3fe563c226e9ab812f6be06079153be46f26d1242911ca58f5b8

kernel-tools-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 81b9cf905f3d3ffe6bca2ea33872f8043b4e5c2ca9ab8594ecc8d74e628c0e3e

kernel-tools-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 3ca2c80095da1fe3efdf8e344f3d17de77871df539b157cebee2bc77a5ed5b40

kernel-tools-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 3ca2c80095da1fe3efdf8e344f3d17de77871df539b157cebee2bc77a5ed5b40

kernel-tools-libs-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 7245f99dafb0e154c25975a684a73e9a03592e1801aa17a35efac77b08b76ed9

kernel-tools-libs-devel-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 15f4fd71bc2597553bcbd692f78e4ac7fcac343148a26423f44bbef85d67324b

perf-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 69a2ad80a513c93011fb77953349713d23db44c3618ba4094e22491221d5084b

perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 1c16aabd60258aece6b039bdb7c64935c01fa388a90e17bda84d3de2e548f39b

perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 1c16aabd60258aece6b039bdb7c64935c01fa388a90e17bda84d3de2e548f39b

python-perf-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 294a2c96202c72e3ec19bb784133c212956b1f58d896142527db8a568ebca222

python-perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 47a7a25d1eecfde173ddbf8d1891ac13b8c23974eeea4eae24c4b553274abe60

python-perf-debuginfo-3.10.0-1062.76.1.el7.x86_64.rpm

SHA-256: 47a7a25d1eecfde173ddbf8d1891ac13b8c23974eeea4eae24c4b553274abe60

Related news

Red Hat Security Advisory 2022-7338-01

Red Hat Security Advisory 2022-7338-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-7337-01

Red Hat Security Advisory 2022-7337-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:7338: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * ...

RHSA-2022:7337: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * CVE...

RHSA-2022:7279: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka S...

RHSA-2022:7280: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete c...

Red Hat Security Advisory 2022-7110-01

Red Hat Security Advisory 2022-7110-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:7110: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu:...

RHSA-2022:6872: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete clea...

"As Nasty as Dirty Pipe" — 8 Year Old Linux Kernel Vulnerability Uncovered

Details of an eight-year-old security vulnerability in the Linux kernel have emerged that the researchers say is "as nasty as Dirty Pipe." Dubbed DirtyCred by a group of academics from Northwestern University, the security weakness exploits a previously unknown flaw (CVE-2022-2588) to escalate privileges to the maximum level. "DirtyCred is a kernel exploitation concept that swaps unprivileged