Headline
RHSA-2022:4717: Red Hat Security Advisory: kernel security update
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation
Synopsis
Important: kernel security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
- Red Hat Enterprise Linux Server - TUS 7.7 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
- Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 7.7 x86_64
Fixes
- BZ - 2051505 - CVE-2022-0492 kernel: cgroups v1 release_agent feature may allow privilege escalation
Red Hat Enterprise Linux Server - AUS 7.7
SRPM
kernel-3.10.0-1062.67.1.el7.src.rpm
SHA-256: c2ec7ce05dba5f197bc9db26c19333640a56aa5b9df3e72453a5da6e507942fc
x86_64
bpftool-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: b5e37b0a3b5eb8dff13f522c0c377cdc570c095498c35deb4abbbcb7c065967c
bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6
bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6
kernel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: cf42cf926e0124638c0414f101aff7aaa65b7d06a45d19c14c74dc3ef1581147
kernel-abi-whitelists-3.10.0-1062.67.1.el7.noarch.rpm
SHA-256: 217d0243feee1b787b70f9aab14f4d9e893e0089fe57447ee85d520d97c42721
kernel-debug-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: e67e188c80d368025cb9598e9a040b957567e31f78e5a59fcc1d762ecd8d083e
kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d
kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d
kernel-debug-devel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 77bc0e5cf03c89b561d233050afd936ec597f2d97c665dc079a57a72df4e800f
kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1
kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1
kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af
kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af
kernel-devel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: ab2d9c10cb62b3bc87453ea7812790027359e4fa1501c253d5c694b573577c85
kernel-doc-3.10.0-1062.67.1.el7.noarch.rpm
SHA-256: 85c857f9d518db959a6a5b5480baac333213ac1dfced41cdb0c8bc34f12c06f8
kernel-headers-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: e27850e07cb84688e8a3261c88d86bb6278d09ab1b935d19088dc542b7e80cf0
kernel-tools-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 07cab0cc0f42569fd4c305a0f6b8ee91995f057f249a90a8b8a03a6d982d144c
kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0
kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0
kernel-tools-libs-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 58c5ada98bbf650a67bc87bd1df17d0de74099ac622f9f1e3a8ea6e8b51a2c5c
kernel-tools-libs-devel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 608b444f5867045dcc676160664975355260dfdb67f9c258a4b9120297507839
perf-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 1277ddfe61172ba4fe213d980ff761e229a9d8de4ebab65413bcd6612f4657e6
perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964
perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964
python-perf-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 9b22a907b965c7550b53b4922e24faf6f24922f21b36fe86f72951916b5da72d
python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed
python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed
Red Hat Enterprise Linux Server - TUS 7.7
SRPM
kernel-3.10.0-1062.67.1.el7.src.rpm
SHA-256: c2ec7ce05dba5f197bc9db26c19333640a56aa5b9df3e72453a5da6e507942fc
x86_64
bpftool-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: b5e37b0a3b5eb8dff13f522c0c377cdc570c095498c35deb4abbbcb7c065967c
bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6
bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6
kernel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: cf42cf926e0124638c0414f101aff7aaa65b7d06a45d19c14c74dc3ef1581147
kernel-abi-whitelists-3.10.0-1062.67.1.el7.noarch.rpm
SHA-256: 217d0243feee1b787b70f9aab14f4d9e893e0089fe57447ee85d520d97c42721
kernel-debug-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: e67e188c80d368025cb9598e9a040b957567e31f78e5a59fcc1d762ecd8d083e
kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d
kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d
kernel-debug-devel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 77bc0e5cf03c89b561d233050afd936ec597f2d97c665dc079a57a72df4e800f
kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1
kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1
kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af
kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af
kernel-devel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: ab2d9c10cb62b3bc87453ea7812790027359e4fa1501c253d5c694b573577c85
kernel-doc-3.10.0-1062.67.1.el7.noarch.rpm
SHA-256: 85c857f9d518db959a6a5b5480baac333213ac1dfced41cdb0c8bc34f12c06f8
kernel-headers-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: e27850e07cb84688e8a3261c88d86bb6278d09ab1b935d19088dc542b7e80cf0
kernel-tools-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 07cab0cc0f42569fd4c305a0f6b8ee91995f057f249a90a8b8a03a6d982d144c
kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0
kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0
kernel-tools-libs-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 58c5ada98bbf650a67bc87bd1df17d0de74099ac622f9f1e3a8ea6e8b51a2c5c
kernel-tools-libs-devel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 608b444f5867045dcc676160664975355260dfdb67f9c258a4b9120297507839
perf-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 1277ddfe61172ba4fe213d980ff761e229a9d8de4ebab65413bcd6612f4657e6
perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964
perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964
python-perf-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 9b22a907b965c7550b53b4922e24faf6f24922f21b36fe86f72951916b5da72d
python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed
python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7
SRPM
kernel-3.10.0-1062.67.1.el7.src.rpm
SHA-256: c2ec7ce05dba5f197bc9db26c19333640a56aa5b9df3e72453a5da6e507942fc
ppc64le
bpftool-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 201e396998510e493bfaccd1de574eadf3de07374c9590b3e62637404431ab71
bpftool-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: e6481f87d794dd922f2e5ad18719b9462bcec3684e19090b18da8b150da050ef
bpftool-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: e6481f87d794dd922f2e5ad18719b9462bcec3684e19090b18da8b150da050ef
kernel-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: c1a2082d6609804698236c2618cf283f7805f59ccd3110ac6a2fd73482ddb8b9
kernel-abi-whitelists-3.10.0-1062.67.1.el7.noarch.rpm
SHA-256: 217d0243feee1b787b70f9aab14f4d9e893e0089fe57447ee85d520d97c42721
kernel-bootwrapper-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 8edf50b8bd94406d271728255245e666bada16eb7a4a21c1942eedf3e8c55767
kernel-debug-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 365868df567e982c1d96dd5dc5c9201413dcf1275c91699aa7228de132a3a831
kernel-debug-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 084e47bd030ee9d75f6d4c03f2948148d38719a4d4b6eef460d30b4e88e1d6cb
kernel-debug-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 084e47bd030ee9d75f6d4c03f2948148d38719a4d4b6eef460d30b4e88e1d6cb
kernel-debug-devel-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 4c09570ffbc83daeeab499da406932191e8f8a754519530a39ddc51b3ccbf750
kernel-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 71e4d194f973eb5b13d96e76ab5390f2fd5abcbc68b388b35427e9efa806dabf
kernel-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 71e4d194f973eb5b13d96e76ab5390f2fd5abcbc68b388b35427e9efa806dabf
kernel-debuginfo-common-ppc64le-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 7fce3d1448924c41a72f1dde1227a980841d394fa107b24ca70b0dc8f62b27fd
kernel-debuginfo-common-ppc64le-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 7fce3d1448924c41a72f1dde1227a980841d394fa107b24ca70b0dc8f62b27fd
kernel-devel-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 72b88b40e7e3c48bd44565cf385b97527a64fd1f37203f0980be7a3dc8f9eb98
kernel-doc-3.10.0-1062.67.1.el7.noarch.rpm
SHA-256: 85c857f9d518db959a6a5b5480baac333213ac1dfced41cdb0c8bc34f12c06f8
kernel-headers-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 4f9a3917d618cb1740109f23301fff00396f1979c8511567dad592c4df0a57c7
kernel-tools-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 84e94bec67db70ddbadd358ef9c39c10a635686b301e66f3acc5251006e7f664
kernel-tools-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 69c1019c19abf28f5a73315c7ce4f5c5dfa3d02bb4d8b7d441b9f1942c34097d
kernel-tools-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 69c1019c19abf28f5a73315c7ce4f5c5dfa3d02bb4d8b7d441b9f1942c34097d
kernel-tools-libs-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: aeaee08f251a75c7176347aad1f481b4627f42f2a0807e826d5e29f738028aec
kernel-tools-libs-devel-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 3d6a863d78fe2bab1bb4b8fe8196823db3062e0c7d43366eef3afa4cc0fa9ccd
perf-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 6859637826ff002ae5bab706016119bbe80396cfab9ee295c8a675586dd81a0b
perf-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: abf06c87fe739f3e9913173dfad815a8ff54effb6b57634dab3789d2f0526b49
perf-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: abf06c87fe739f3e9913173dfad815a8ff54effb6b57634dab3789d2f0526b49
python-perf-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 3c884e930cbfe98e45454be9e9c3fe4298803ac2a05e14f1652c3860b8c5c0a6
python-perf-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 06fe8672c42691f58f69de2209be3b0e2e63d87671b881aff21825a38f366f82
python-perf-debuginfo-3.10.0-1062.67.1.el7.ppc64le.rpm
SHA-256: 06fe8672c42691f58f69de2209be3b0e2e63d87671b881aff21825a38f366f82
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 7.7
SRPM
kernel-3.10.0-1062.67.1.el7.src.rpm
SHA-256: c2ec7ce05dba5f197bc9db26c19333640a56aa5b9df3e72453a5da6e507942fc
x86_64
bpftool-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: b5e37b0a3b5eb8dff13f522c0c377cdc570c095498c35deb4abbbcb7c065967c
bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6
bpftool-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 00821962edb7077be7f25aa0d5d459ceb5c30032d3f5f6eaf10327617c268cf6
kernel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: cf42cf926e0124638c0414f101aff7aaa65b7d06a45d19c14c74dc3ef1581147
kernel-abi-whitelists-3.10.0-1062.67.1.el7.noarch.rpm
SHA-256: 217d0243feee1b787b70f9aab14f4d9e893e0089fe57447ee85d520d97c42721
kernel-debug-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: e67e188c80d368025cb9598e9a040b957567e31f78e5a59fcc1d762ecd8d083e
kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d
kernel-debug-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 247c44fdf6a899fa0d8fb8c53565535b1594a06e0c1e3c534ad3b84e38e8a52d
kernel-debug-devel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 77bc0e5cf03c89b561d233050afd936ec597f2d97c665dc079a57a72df4e800f
kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1
kernel-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 15078cfdb2b5b2609411f0e017dd87dd8a8ce77de2da9076989ec330e32ba0f1
kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af
kernel-debuginfo-common-x86_64-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: fefb4295d55249ef2afb893d54ae519e862526aab4c6dd7f9608dad7ef5cc6af
kernel-devel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: ab2d9c10cb62b3bc87453ea7812790027359e4fa1501c253d5c694b573577c85
kernel-doc-3.10.0-1062.67.1.el7.noarch.rpm
SHA-256: 85c857f9d518db959a6a5b5480baac333213ac1dfced41cdb0c8bc34f12c06f8
kernel-headers-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: e27850e07cb84688e8a3261c88d86bb6278d09ab1b935d19088dc542b7e80cf0
kernel-tools-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 07cab0cc0f42569fd4c305a0f6b8ee91995f057f249a90a8b8a03a6d982d144c
kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0
kernel-tools-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 51ae7fa0a5cbcec4ed7dced539fb3238a451bf209ebf87690b97317a7016a5c0
kernel-tools-libs-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 58c5ada98bbf650a67bc87bd1df17d0de74099ac622f9f1e3a8ea6e8b51a2c5c
kernel-tools-libs-devel-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 608b444f5867045dcc676160664975355260dfdb67f9c258a4b9120297507839
perf-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 1277ddfe61172ba4fe213d980ff761e229a9d8de4ebab65413bcd6612f4657e6
perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964
perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 87bb13490adf36f938675cbf310fec21bf882125752e77d84035dd244723d964
python-perf-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: 9b22a907b965c7550b53b4922e24faf6f24922f21b36fe86f72951916b5da72d
python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed
python-perf-debuginfo-3.10.0-1062.67.1.el7.x86_64.rpm
SHA-256: becd5acc4f84cc0f64ad0941a2a9cf4170687a7ab5bb1e85ca0e98e476f300ed
Related news
This Metasploit exploit module takes advantage of a Docker image which has either the privileged flag, or SYS_ADMIN Linux capability. If the host kernel is vulnerable, its possible to escape the Docker image and achieve root on the host operating system. A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering in the HPACK parser - Unbounded CPU consumption in the HPACK parser The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client. The unbounded memory buffering bugs: - The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb. - HPACK varints have an encoding quirk whereby an infinite number of 0’s can be added at the start of an integer. gRPC’s hpack parser needed to read all of them before concluding a parse. - gRPC’s metadata overflow check was performed per frame, so ...
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.
A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via Epic Telehealth.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality.
Red Hat Advanced Cluster Management for Kubernetes 2.3.11 general availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-redirects: Exposure of Sensitive Information via Authorization Header leak * CVE-2022-21803: nconf: Prototype pollution in memory store * CVE-2022-23806: golang: crypto/elliptic IsOnCurv...
Red Hat Security Advisory 2022-5157-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.
In param_find_digests_internal and related functions of the Titan-M source, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222472803References: N/A
It was discovered that a race condition existed in the network scheduling subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. Various other issues were also addressed.
Red Hat Security Advisory 2022-4721-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a privilege escalation vulnerability.
Red Hat Security Advisory 2022-4717-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.
An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation
Red Hat Security Advisory 2022-4644-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a privilege escalation vulnerability.
Red Hat Security Advisory 2022-4655-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a privilege escalation vulnerability.
Red Hat Security Advisory 2022-4642-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and privilege escalation vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation
Red Hat Security Advisory 2022-2186-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation
An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation
An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2021-4083: kernel: fget: check that the fd still exists after getting a ref to it * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation
A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.