Headline
RHSA-2023:1109: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-4378: A stack overflow flaw was found in the Linux kernel’s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Concurrent reading of /proc/cpuinfo by multiple tasks causes soft lockup (BZ#2154442)
- RHEL8: panic when THP split (BZ#2156111)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux Server - TUS 8.2 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
Fixes
- BZ - 2152548 - CVE-2022-4378 kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
Red Hat Enterprise Linux Server - AUS 8.2
SRPM
kernel-4.18.0-193.100.1.el8_2.src.rpm
SHA-256: aebe3d6188cc79904dba563241351aba70e47fb3c06e46064e8471a4b8b20801
x86_64
bpftool-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: a9e235a5e3c462b3ed912219e16a9bf3726f1c9e020ad39183aeac1f92d1eff9
bpftool-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: aab1a5c8969d3b6e70f4e8b20512f41e11aaecebeac844e284e9035efc0f9047
kernel-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: c24695d5ada07259a7b98639c2a6d0789a1e8bbcba289192456ab18ec65a8c14
kernel-abi-whitelists-4.18.0-193.100.1.el8_2.noarch.rpm
SHA-256: 08eb46161ed9e5c4981c099c76aca8603c22f5049bfd9f95b831a0e851e750be
kernel-core-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: bca7f1d17e73c584666cff6da9a4f371a6fb23866119ea37dc5087369f936f7c
kernel-cross-headers-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 9e97d1dd2aefaf4bb0eb01728c25f64349c00886a0d6f0a1d869ed0be556739e
kernel-debug-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 9a94a3550abd0415e2223566d5db5faea8c89bb7a91c9c1c42936a538b95e16b
kernel-debug-core-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: e4f16641202dd86ce36cac0af56614b5c96eb4970f02f9f374cbfccf7ff2a180
kernel-debug-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: d81e38c265f4624fc8c759be55280e22a8290ac295464eed684b4d93e9346982
kernel-debug-devel-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 78ad2c8cb919e21be629028e4a170ed824741dd58161b5d4f1f4a8ef6540cfb1
kernel-debug-modules-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: f3edca0e01eff9d157544626803d0f3cbfc979c327e027972facbd7a190652da
kernel-debug-modules-extra-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 484f03d00fee4ed0803903f5fcbb61980fda1b68567167ad6167f74c863790e0
kernel-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 2b74ed12e49c3e0a7af7bdec428519b1ec19981826b10f27618b8df6fc2b4bf1
kernel-debuginfo-common-x86_64-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 8f44cbbe661d72d3f4db2e05b2841b436d5dd9fbcaf8397ec348b5a0da40eec9
kernel-devel-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 1af5f047f4b9cadd293584899cbce7a329f0a5e63582c1a0006010783fa0b357
kernel-doc-4.18.0-193.100.1.el8_2.noarch.rpm
SHA-256: 19b82a10c063d23b1bca7c65ca64847dc22136f2d06b64e8e3844760cb304d4e
kernel-headers-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: f859753982ac65c21f43743e364365e2ff02fc7b2499526ec4c749344c3237fe
kernel-modules-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 0c5e9a3df6df381782cf07cd9309acb3abca37b1d31261fd8bc0bd0e30f9c538
kernel-modules-extra-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 2a7428a5fc3e8bf35fe55819779d21f610b6f504231de018980d1972adeaa3b9
kernel-tools-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: bc8387aeb407ec5a5ddec98ad3b7460d16e1ed6dc49cfc02ffa04436175929f5
kernel-tools-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: d0879451f07ac457ca70cf809ba66e336a1603ad52f8f972f77671475908739a
kernel-tools-libs-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 380cfe500be38a28712f5b6a349949eb2374bcaba527ae11b3a82ca53dd459d6
perf-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 68514095f7251619c68e30b9b5955235d2ef2bf32d5f10c44fb5c312a4284ba3
perf-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: ccdc37f93375f8572d64af9506cbd709bb83921ed0dc591eba13755fd1640b70
python3-perf-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 903f721bfed94eb2a09801013716dce8db3e06ddbbab83ec4cb717d6b8d92b40
python3-perf-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: a21d93600a700e8091ca731d52331e0ab06082becb8b5867d08fa11ce559f0a5
Red Hat Enterprise Linux Server - TUS 8.2
SRPM
kernel-4.18.0-193.100.1.el8_2.src.rpm
SHA-256: aebe3d6188cc79904dba563241351aba70e47fb3c06e46064e8471a4b8b20801
x86_64
bpftool-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: a9e235a5e3c462b3ed912219e16a9bf3726f1c9e020ad39183aeac1f92d1eff9
bpftool-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: aab1a5c8969d3b6e70f4e8b20512f41e11aaecebeac844e284e9035efc0f9047
kernel-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: c24695d5ada07259a7b98639c2a6d0789a1e8bbcba289192456ab18ec65a8c14
kernel-abi-whitelists-4.18.0-193.100.1.el8_2.noarch.rpm
SHA-256: 08eb46161ed9e5c4981c099c76aca8603c22f5049bfd9f95b831a0e851e750be
kernel-core-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: bca7f1d17e73c584666cff6da9a4f371a6fb23866119ea37dc5087369f936f7c
kernel-cross-headers-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 9e97d1dd2aefaf4bb0eb01728c25f64349c00886a0d6f0a1d869ed0be556739e
kernel-debug-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 9a94a3550abd0415e2223566d5db5faea8c89bb7a91c9c1c42936a538b95e16b
kernel-debug-core-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: e4f16641202dd86ce36cac0af56614b5c96eb4970f02f9f374cbfccf7ff2a180
kernel-debug-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: d81e38c265f4624fc8c759be55280e22a8290ac295464eed684b4d93e9346982
kernel-debug-devel-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 78ad2c8cb919e21be629028e4a170ed824741dd58161b5d4f1f4a8ef6540cfb1
kernel-debug-modules-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: f3edca0e01eff9d157544626803d0f3cbfc979c327e027972facbd7a190652da
kernel-debug-modules-extra-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 484f03d00fee4ed0803903f5fcbb61980fda1b68567167ad6167f74c863790e0
kernel-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 2b74ed12e49c3e0a7af7bdec428519b1ec19981826b10f27618b8df6fc2b4bf1
kernel-debuginfo-common-x86_64-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 8f44cbbe661d72d3f4db2e05b2841b436d5dd9fbcaf8397ec348b5a0da40eec9
kernel-devel-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 1af5f047f4b9cadd293584899cbce7a329f0a5e63582c1a0006010783fa0b357
kernel-doc-4.18.0-193.100.1.el8_2.noarch.rpm
SHA-256: 19b82a10c063d23b1bca7c65ca64847dc22136f2d06b64e8e3844760cb304d4e
kernel-headers-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: f859753982ac65c21f43743e364365e2ff02fc7b2499526ec4c749344c3237fe
kernel-modules-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 0c5e9a3df6df381782cf07cd9309acb3abca37b1d31261fd8bc0bd0e30f9c538
kernel-modules-extra-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 2a7428a5fc3e8bf35fe55819779d21f610b6f504231de018980d1972adeaa3b9
kernel-tools-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: bc8387aeb407ec5a5ddec98ad3b7460d16e1ed6dc49cfc02ffa04436175929f5
kernel-tools-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: d0879451f07ac457ca70cf809ba66e336a1603ad52f8f972f77671475908739a
kernel-tools-libs-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 380cfe500be38a28712f5b6a349949eb2374bcaba527ae11b3a82ca53dd459d6
perf-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 68514095f7251619c68e30b9b5955235d2ef2bf32d5f10c44fb5c312a4284ba3
perf-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: ccdc37f93375f8572d64af9506cbd709bb83921ed0dc591eba13755fd1640b70
python3-perf-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 903f721bfed94eb2a09801013716dce8db3e06ddbbab83ec4cb717d6b8d92b40
python3-perf-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: a21d93600a700e8091ca731d52331e0ab06082becb8b5867d08fa11ce559f0a5
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2
SRPM
kernel-4.18.0-193.100.1.el8_2.src.rpm
SHA-256: aebe3d6188cc79904dba563241351aba70e47fb3c06e46064e8471a4b8b20801
ppc64le
bpftool-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 7ec1142d08f3f73324060a926c0779c81e84ba889214029408e8b068ea4a4a99
bpftool-debuginfo-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 8ff2785d6fb3ba6c7da9ca697923ecff896a7ad93e0ed22e53e19991fec94e2b
kernel-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 3227f0fab83f4291c1b23e902a79d03a5d3c1d82aeaa152c11458310a15dcd4d
kernel-abi-whitelists-4.18.0-193.100.1.el8_2.noarch.rpm
SHA-256: 08eb46161ed9e5c4981c099c76aca8603c22f5049bfd9f95b831a0e851e750be
kernel-core-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: fd2a95fd858020b92e6dce35f20b87b8d2ae10d76f932efe19d41cfd4ae4f2f9
kernel-cross-headers-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: aa8ffb48cc79a801699d4e0d6a20a39c0db69593da44fd2b4c761fa4bd665836
kernel-debug-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 836a45f2438f4384cd9d743b759ca022c9dae044106ec4b161a7de17b3d482d4
kernel-debug-core-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: b55b24023b442d5e04e441452e9a38610819126a0abcf14205f7a4221141470e
kernel-debug-debuginfo-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 8f9a3baedbb9e599ef3aa9cf7b2a577eafcd36f51b3ba7d86102318d5287a4c4
kernel-debug-devel-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 00cb7510722a22a46be6d711045d2b7ed1284eee6422fcf18d46216d95c31482
kernel-debug-modules-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 1833e1eae60ff517f1219671f051509d365e31fa3464d8b848df123785cfb1e4
kernel-debug-modules-extra-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: bd56e177ab206b195c3589858ba8d10ef5b697a36ccecbd2776fbebe72ad090b
kernel-debuginfo-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: b2cda3badfd4b86febc1d0429ccaae086f4198a542771229cfa1e71e0f9d7dcd
kernel-debuginfo-common-ppc64le-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 56d4b74fbbb0886031dcf43bc31681dff5af20f4fa6e7e1e215c56c555a1ed16
kernel-devel-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 4011072b1148047b0f08622bf53b20dc5d896bd994a1edc364242ac30f35c233
kernel-doc-4.18.0-193.100.1.el8_2.noarch.rpm
SHA-256: 19b82a10c063d23b1bca7c65ca64847dc22136f2d06b64e8e3844760cb304d4e
kernel-headers-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 857cf1aaf5a60468a7654fd932b88ac852efbc34cae47b31b9336e0e129cf2a8
kernel-modules-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: ff4354a57fedcf993650d8098462e6c6cc2e83f5ea750e28dd0b511fa36e61e7
kernel-modules-extra-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 1dadfdf4ef85e02a0cb38e87418faa419dee16f340fbd7b9b693a60e5d5958ca
kernel-tools-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 76eff91d59af3bad76c5266a6f34dfe9b114ed59197c8a09b421190275d1c324
kernel-tools-debuginfo-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: c28d15808595d66e137fc048070cad5ae24a97e60c5da7089665f04b9aa8740f
kernel-tools-libs-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 7a5b3167f75eb3f31f79e65b24cdac110dadc4b5e7fa5449bd18c5a4bd92797f
perf-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 4ac484245787db9a08b62b6b0e2c69ff15a59bfe9bb94d7539b0cc5f9e267144
perf-debuginfo-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: c26f5fa44a6d0eb050899f69ecddf06aef5101de652cc30415c1b7e86d341d89
python3-perf-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 1422963255bafff722b5cde81a38fa0b7360796852629cd53445b12413393134
python3-perf-debuginfo-4.18.0-193.100.1.el8_2.ppc64le.rpm
SHA-256: 39c08cdfbb8cc9e566efa9b17e480ee53460e5d83951c81e0ab35e4ee72b6cb1
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2
SRPM
kernel-4.18.0-193.100.1.el8_2.src.rpm
SHA-256: aebe3d6188cc79904dba563241351aba70e47fb3c06e46064e8471a4b8b20801
x86_64
bpftool-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: a9e235a5e3c462b3ed912219e16a9bf3726f1c9e020ad39183aeac1f92d1eff9
bpftool-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: aab1a5c8969d3b6e70f4e8b20512f41e11aaecebeac844e284e9035efc0f9047
kernel-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: c24695d5ada07259a7b98639c2a6d0789a1e8bbcba289192456ab18ec65a8c14
kernel-abi-whitelists-4.18.0-193.100.1.el8_2.noarch.rpm
SHA-256: 08eb46161ed9e5c4981c099c76aca8603c22f5049bfd9f95b831a0e851e750be
kernel-core-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: bca7f1d17e73c584666cff6da9a4f371a6fb23866119ea37dc5087369f936f7c
kernel-cross-headers-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 9e97d1dd2aefaf4bb0eb01728c25f64349c00886a0d6f0a1d869ed0be556739e
kernel-debug-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 9a94a3550abd0415e2223566d5db5faea8c89bb7a91c9c1c42936a538b95e16b
kernel-debug-core-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: e4f16641202dd86ce36cac0af56614b5c96eb4970f02f9f374cbfccf7ff2a180
kernel-debug-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: d81e38c265f4624fc8c759be55280e22a8290ac295464eed684b4d93e9346982
kernel-debug-devel-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 78ad2c8cb919e21be629028e4a170ed824741dd58161b5d4f1f4a8ef6540cfb1
kernel-debug-modules-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: f3edca0e01eff9d157544626803d0f3cbfc979c327e027972facbd7a190652da
kernel-debug-modules-extra-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 484f03d00fee4ed0803903f5fcbb61980fda1b68567167ad6167f74c863790e0
kernel-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 2b74ed12e49c3e0a7af7bdec428519b1ec19981826b10f27618b8df6fc2b4bf1
kernel-debuginfo-common-x86_64-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 8f44cbbe661d72d3f4db2e05b2841b436d5dd9fbcaf8397ec348b5a0da40eec9
kernel-devel-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 1af5f047f4b9cadd293584899cbce7a329f0a5e63582c1a0006010783fa0b357
kernel-doc-4.18.0-193.100.1.el8_2.noarch.rpm
SHA-256: 19b82a10c063d23b1bca7c65ca64847dc22136f2d06b64e8e3844760cb304d4e
kernel-headers-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: f859753982ac65c21f43743e364365e2ff02fc7b2499526ec4c749344c3237fe
kernel-modules-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 0c5e9a3df6df381782cf07cd9309acb3abca37b1d31261fd8bc0bd0e30f9c538
kernel-modules-extra-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 2a7428a5fc3e8bf35fe55819779d21f610b6f504231de018980d1972adeaa3b9
kernel-tools-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: bc8387aeb407ec5a5ddec98ad3b7460d16e1ed6dc49cfc02ffa04436175929f5
kernel-tools-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: d0879451f07ac457ca70cf809ba66e336a1603ad52f8f972f77671475908739a
kernel-tools-libs-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 380cfe500be38a28712f5b6a349949eb2374bcaba527ae11b3a82ca53dd459d6
perf-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 68514095f7251619c68e30b9b5955235d2ef2bf32d5f10c44fb5c312a4284ba3
perf-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: ccdc37f93375f8572d64af9506cbd709bb83921ed0dc591eba13755fd1640b70
python3-perf-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: 903f721bfed94eb2a09801013716dce8db3e06ddbbab83ec4cb717d6b8d92b40
python3-perf-debuginfo-4.18.0-193.100.1.el8_2.x86_64.rpm
SHA-256: a21d93600a700e8091ca731d52331e0ab06082becb8b5867d08fa11ce559f0a5
Related news
IBM Security Guardium 11.3 could allow an authenticated user to cause a denial of service due to improper input validation. IBM X-Force ID: 240903.
Red Hat Security Advisory 2023-3431-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-1953-01 - Red Hat OpenShift Logging Subsystem 5.6.5 update. Issues addressed include cross site scripting and denial of service vulnerabilities.
Red Hat Security Advisory 2023-1659-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...
Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...
Red Hat Security Advisory 2023-1202-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack ove...
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was found ...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was fou...
Red Hat Security Advisory 2023-1109-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
Red Hat Security Advisory 2023-1103-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2022-42703: A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c fun...
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2022-42703: A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c ...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Red Hat Security Advisory 2023-1008-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
Ubuntu Security Notice 5832-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5831-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5803-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamas Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.