Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:4717: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation
Red Hat Security Data
#vulnerability#linux#red_hat#sap

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64
  • Red Hat Enterprise Linux Server - TUS 7.7 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
  • Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 7.7 x86_64

Fixes

  • BZ - 2051505 - CVE-2022-0492 kernel: cgroups v1 release_agent feature may allow privilege escalation

Red Hat Enterprise Linux Server - AUS 7.7

SRPM

kernel-3.10.0-1062.67.1.el7.src.rpm

SHA-256: c2ec7ce05dba5f197bc9db26c19333640a56aa5b9df3e72453a5da6e507942fc

x86_64

bpftool-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: b5e37b0a3b5eb8dff13f522c0c377cdc570c095498c35deb4abbbcb7c065967c

bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6

bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6

kernel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: cf42cf926e0124638c0414f101aff7aaa65b7d06a45d19c14c74dc3ef1581147

kernel-abi-whitelists-3.10.0-1062.67.1.el7.noarch.rpm

SHA-256: 217d0243feee1b787b70f9aab14f4d9e893e0089fe57447ee85d520d97c42721

kernel-debug-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: e67e188c80d368025cb9598e9a040b957567e31f78e5a59fcc1d762ecd8d083e

kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d

kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d

kernel-debug-devel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 77bc0e5cf03c89b561d233050afd936ec597f2d97c665dc079a57a72df4e800f

kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1

kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1

kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af

kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af

kernel-devel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: ab2d9c10cb62b3bc87453ea7812790027359e4fa1501c253d5c694b573577c85

kernel-doc-3.10.0-1062.67.1.el7.noarch.rpm

SHA-256: 85c857f9d518db959a6a5b5480baac333213ac1dfced41cdb0c8bc34f12c06f8

kernel-headers-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: e27850e07cb84688e8a3261c88d86bb6278d09ab1b935d19088dc542b7e80cf0

kernel-tools-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 07cab0cc0f42569fd4c305a0f6b8ee91995f057f249a90a8b8a03a6d982d144c

kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0

kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0

kernel-tools-libs-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 58c5ada98bbf650a67bc87bd1df17d0de74099ac622f9f1e3a8ea6e8b51a2c5c

kernel-tools-libs-devel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 608b444f5867045dcc676160664975355260dfdb67f9c258a4b9120297507839

perf-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 1277ddfe61172ba4fe213d980ff761e229a9d8de4ebab65413bcd6612f4657e6

perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964

perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964

python-perf-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 9b22a907b965c7550b53b4922e24faf6f24922f21b36fe86f72951916b5da72d

python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed

python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed

Red Hat Enterprise Linux Server - TUS 7.7

SRPM

kernel-3.10.0-1062.67.1.el7.src.rpm

SHA-256: c2ec7ce05dba5f197bc9db26c19333640a56aa5b9df3e72453a5da6e507942fc

x86_64

bpftool-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: b5e37b0a3b5eb8dff13f522c0c377cdc570c095498c35deb4abbbcb7c065967c

bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6

bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6

kernel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: cf42cf926e0124638c0414f101aff7aaa65b7d06a45d19c14c74dc3ef1581147

kernel-abi-whitelists-3.10.0-1062.67.1.el7.noarch.rpm

SHA-256: 217d0243feee1b787b70f9aab14f4d9e893e0089fe57447ee85d520d97c42721

kernel-debug-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: e67e188c80d368025cb9598e9a040b957567e31f78e5a59fcc1d762ecd8d083e

kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d

kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d

kernel-debug-devel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 77bc0e5cf03c89b561d233050afd936ec597f2d97c665dc079a57a72df4e800f

kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1

kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1

kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af

kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af

kernel-devel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: ab2d9c10cb62b3bc87453ea7812790027359e4fa1501c253d5c694b573577c85

kernel-doc-3.10.0-1062.67.1.el7.noarch.rpm

SHA-256: 85c857f9d518db959a6a5b5480baac333213ac1dfced41cdb0c8bc34f12c06f8

kernel-headers-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: e27850e07cb84688e8a3261c88d86bb6278d09ab1b935d19088dc542b7e80cf0

kernel-tools-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 07cab0cc0f42569fd4c305a0f6b8ee91995f057f249a90a8b8a03a6d982d144c

kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0

kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0

kernel-tools-libs-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 58c5ada98bbf650a67bc87bd1df17d0de74099ac622f9f1e3a8ea6e8b51a2c5c

kernel-tools-libs-devel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 608b444f5867045dcc676160664975355260dfdb67f9c258a4b9120297507839

perf-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 1277ddfe61172ba4fe213d980ff761e229a9d8de4ebab65413bcd6612f4657e6

perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964

perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964

python-perf-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 9b22a907b965c7550b53b4922e24faf6f24922f21b36fe86f72951916b5da72d

python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed

python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.67.1.el7.src.rpm

SHA-256: c2ec7ce05dba5f197bc9db26c19333640a56aa5b9df3e72453a5da6e507942fc

ppc64le

bpftool-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 201e396998510e493bfaccd1de574eadf3de07374c9590b3e62637404431ab71

bpftool-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: e6481f87d794dd922f2e5ad18719b9462bcec3684e19090b18da8b150da050ef

bpftool-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: e6481f87d794dd922f2e5ad18719b9462bcec3684e19090b18da8b150da050ef

kernel-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: c1a2082d6609804698236c2618cf283f7805f59ccd3110ac6a2fd73482ddb8b9

kernel-abi-whitelists-3.10.0-1062.67.1.el7.noarch.rpm

SHA-256: 217d0243feee1b787b70f9aab14f4d9e893e0089fe57447ee85d520d97c42721

kernel-bootwrapper-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 8edf50b8bd94406d271728255245e666bada16eb7a4a21c1942eedf3e8c55767

kernel-debug-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 365868df567e982c1d96dd5dc5c9201413dcf1275c91699aa7228de132a3a831

kernel-debug-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 084e47bd030ee9d75f6d4c03f2948148d38719a4d4b6eef460d30b4e88e1d6cb

kernel-debug-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 084e47bd030ee9d75f6d4c03f2948148d38719a4d4b6eef460d30b4e88e1d6cb

kernel-debug-devel-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 4c09570ffbc83daeeab499da406932191e8f8a754519530a39ddc51b3ccbf750

kernel-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 71e4d194f973eb5b13d96e76ab5390f2fd5abcbc68b388b35427e9efa806dabf

kernel-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 71e4d194f973eb5b13d96e76ab5390f2fd5abcbc68b388b35427e9efa806dabf

kernel-debuginfo-common-ppc64le-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 7fce3d1448924c41a72f1dde1227a980841d394fa107b24ca70b0dc8f62b27fd

kernel-debuginfo-common-ppc64le-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 7fce3d1448924c41a72f1dde1227a980841d394fa107b24ca70b0dc8f62b27fd

kernel-devel-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 72b88b40e7e3c48bd44565cf385b97527a64fd1f37203f0980be7a3dc8f9eb98

kernel-doc-3.10.0-1062.67.1.el7.noarch.rpm

SHA-256: 85c857f9d518db959a6a5b5480baac333213ac1dfced41cdb0c8bc34f12c06f8

kernel-headers-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 4f9a3917d618cb1740109f23301fff00396f1979c8511567dad592c4df0a57c7

kernel-tools-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 84e94bec67db70ddbadd358ef9c39c10a635686b301e66f3acc5251006e7f664

kernel-tools-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 69c1019c19abf28f5a73315c7ce4f5c5dfa3d02bb4d8b7d441b9f1942c34097d

kernel-tools-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 69c1019c19abf28f5a73315c7ce4f5c5dfa3d02bb4d8b7d441b9f1942c34097d

kernel-tools-libs-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: aeaee08f251a75c7176347aad1f481b4627f42f2a0807e826d5e29f738028aec

kernel-tools-libs-devel-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 3d6a863d78fe2bab1bb4b8fe8196823db3062e0c7d43366eef3afa4cc0fa9ccd

perf-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 6859637826ff002ae5bab706016119bbe80396cfab9ee295c8a675586dd81a0b

perf-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: abf06c87fe739f3e9913173dfad815a8ff54effb6b57634dab3789d2f0526b49

perf-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: abf06c87fe739f3e9913173dfad815a8ff54effb6b57634dab3789d2f0526b49

python-perf-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 3c884e930cbfe98e45454be9e9c3fe4298803ac2a05e14f1652c3860b8c5c0a6

python-perf-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 06fe8672c42691f58f69de2209be3b0e2e63d87671b881aff21825a38f366f82

python-perf-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm

SHA-256: 06fe8672c42691f58f69de2209be3b0e2e63d87671b881aff21825a38f366f82

Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.67.1.el7.src.rpm

SHA-256: c2ec7ce05dba5f197bc9db26c19333640a56aa5b9df3e72453a5da6e507942fc

x86_64

bpftool-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: b5e37b0a3b5eb8dff13f522c0c377cdc570c095498c35deb4abbbcb7c065967c

bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6

bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6

kernel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: cf42cf926e0124638c0414f101aff7aaa65b7d06a45d19c14c74dc3ef1581147

kernel-abi-whitelists-3.10.0-1062.67.1.el7.noarch.rpm

SHA-256: 217d0243feee1b787b70f9aab14f4d9e893e0089fe57447ee85d520d97c42721

kernel-debug-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: e67e188c80d368025cb9598e9a040b957567e31f78e5a59fcc1d762ecd8d083e

kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d

kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d

kernel-debug-devel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 77bc0e5cf03c89b561d233050afd936ec597f2d97c665dc079a57a72df4e800f

kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1

kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1

kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af

kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af

kernel-devel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: ab2d9c10cb62b3bc87453ea7812790027359e4fa1501c253d5c694b573577c85

kernel-doc-3.10.0-1062.67.1.el7.noarch.rpm

SHA-256: 85c857f9d518db959a6a5b5480baac333213ac1dfced41cdb0c8bc34f12c06f8

kernel-headers-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: e27850e07cb84688e8a3261c88d86bb6278d09ab1b935d19088dc542b7e80cf0

kernel-tools-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 07cab0cc0f42569fd4c305a0f6b8ee91995f057f249a90a8b8a03a6d982d144c

kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0

kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0

kernel-tools-libs-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 58c5ada98bbf650a67bc87bd1df17d0de74099ac622f9f1e3a8ea6e8b51a2c5c

kernel-tools-libs-devel-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 608b444f5867045dcc676160664975355260dfdb67f9c258a4b9120297507839

perf-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 1277ddfe61172ba4fe213d980ff761e229a9d8de4ebab65413bcd6612f4657e6

perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964

perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964

python-perf-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: 9b22a907b965c7550b53b4922e24faf6f24922f21b36fe86f72951916b5da72d

python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed

python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm

SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed

Related news

Docker cgroups Container Escape

This Metasploit exploit module takes advantage of a Docker image which has either the privileged flag, or SYS_ADMIN Linux capability. If the host kernel is vulnerable, its possible to escape the Docker image and achieve root on the host operating system. A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.

CVE-2023-33953: Security Bulletins

gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering in the HPACK parser - Unbounded CPU consumption in the HPACK parser The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client. The unbounded memory buffering bugs: - The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb. - HPACK varints have an encoding quirk whereby an infinite number of 0’s can be added at the start of an integer. gRPC’s hpack parser needed to read all of them before concluding a parse. - gRPC’s metadata overflow check was performed per frame, so ...

CVE-2023-28069: DSA-2022-258: Dell Streaming Data Platform Security Update for Multiple Third-Party Component Vulnerabilities

Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.

CVE-2022-1941: Security Bulletins  |  Customer Care  |  Google Cloud

A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.

CVE-2022-29286: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.

CVE-2022-26657: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.

CVE-2022-26655: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.

CVE-2022-25357: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.

CVE-2022-27930: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.

CVE-2022-27932: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.

CVE-2022-27935: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via Epic Telehealth.

CVE-2022-27936: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.

CVE-2021-40012: July

Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality.

RHSA-2022:5392: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.11 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.3.11 general availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-redirects: Exposure of Sensitive Information via Authorization Header leak * CVE-2022-21803: nconf: Prototype pollution in memory store * CVE-2022-23806: golang: crypto/elliptic IsOnCurv...

Red Hat Security Advisory 2022-5157-01

Red Hat Security Advisory 2022-5157-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

CVE-2022-20233: Pixel Update Bulletin—June 2022  |  Android Open Source Project

In param_find_digests_internal and related functions of the Titan-M source, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222472803References: N/A

Kernel Live Patch Security Notice LSN-0086-1

It was discovered that a race condition existed in the network scheduling subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. Various other issues were also addressed.

Red Hat Security Advisory 2022-4721-01

Red Hat Security Advisory 2022-4721-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2022-4717-01

Red Hat Security Advisory 2022-4717-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:4721: Red Hat Security Advisory: kpatch-patch security update

An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation

Red Hat Security Advisory 2022-4644-01

Red Hat Security Advisory 2022-4644-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2022-4655-01

Red Hat Security Advisory 2022-4655-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2022-4642-01

Red Hat Security Advisory 2022-4642-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and privilege escalation vulnerabilities.

RHSA-2022:4644: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation

RHSA-2022:4642: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation

RHSA-2022:4655: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation

Red Hat Security Advisory 2022-2186-01

Red Hat Security Advisory 2022-2186-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:2211: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation

RHSA-2022:2186: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation

RHSA-2022:2189: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2021-4083: kernel: fget: check that the fd still exists after getting a ref to it * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation

CVE-2022-0492

A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.