Headline
RHSA-2023:4697: Red Hat Security Advisory: kernel security update
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets with a total size of 252 bytes, which results in an out-of-bounds write when the third packet enters fl_set_geneve_opt, potentially leading to a denial of service or privilege escalation.
Synopsis
Important: kernel security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
- Red Hat Enterprise Linux Server - TUS 7.7 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64
Fixes
- BZ - 2215768 - CVE-2023-35788 kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
Red Hat Enterprise Linux Server - AUS 7.7
SRPM
kernel-3.10.0-1062.77.1.el7.src.rpm
SHA-256: bb3e98c54682224765c7c349608e97479c05bbc657c1190278a308955159fe83
x86_64
bpftool-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 708c9a490983f3506d9c2079ce19af26d86b7212c33816b179044392a3acd8fc
bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356
bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356
kernel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 79c03b791d863e55bc92097c844b93d8f26a7ed980b2a3f0050fcb8d1a6fcf64
kernel-abi-whitelists-3.10.0-1062.77.1.el7.noarch.rpm
SHA-256: 97e9f535ad4aa2fd2fd35c94a568c30ed6d0e64bc68952ca1ea5119b95fe0368
kernel-debug-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 304333bbceab9473686b0ee8797f79d0bff4ffa4452ce30cedc83644d45f0fd9
kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e
kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e
kernel-debug-devel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 9f56c329dfc19e6765ccfe887177a8052051b1a747e860a197e24d1d426310b2
kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc
kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc
kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868
kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868
kernel-devel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 5d8a33e80ce0c09968b8b929e0c13cb3bc98cfeffa62ba24ba7be1ea08b9defa
kernel-doc-3.10.0-1062.77.1.el7.noarch.rpm
SHA-256: 4a006504974f9aed531c3edf2d2a07101a4fc10649a8775bdc422b2bf330837f
kernel-headers-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: c7853d5f7724769eabcb223fd6eeb6088132073fd9e5328d4df888b98bfc3b1f
kernel-tools-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 74bc6401150c4f385fe759575af9c39ecf60719f4ab7aab986884e3295fd82c2
kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195
kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195
kernel-tools-libs-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 4c50227eb5142d9a3f45169608b7cd67535b63d94846a91d5e298c75150e1650
kernel-tools-libs-devel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 562083cb005b5fc83c5158064e422b2bce2b752368f991010f7aff446416726f
perf-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 1f1549f79a18d747cb6e038df5ebd14d4a28cb50f2adf92acbee8bd5e801762c
perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a
perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a
python-perf-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: d71e219bb8eea654a6a135909ff6f36e7260f193483f8690ffc6ed0cf714eb91
python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7
python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7
Red Hat Enterprise Linux Server - TUS 7.7
SRPM
kernel-3.10.0-1062.77.1.el7.src.rpm
SHA-256: bb3e98c54682224765c7c349608e97479c05bbc657c1190278a308955159fe83
x86_64
bpftool-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 708c9a490983f3506d9c2079ce19af26d86b7212c33816b179044392a3acd8fc
bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356
bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356
kernel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 79c03b791d863e55bc92097c844b93d8f26a7ed980b2a3f0050fcb8d1a6fcf64
kernel-abi-whitelists-3.10.0-1062.77.1.el7.noarch.rpm
SHA-256: 97e9f535ad4aa2fd2fd35c94a568c30ed6d0e64bc68952ca1ea5119b95fe0368
kernel-debug-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 304333bbceab9473686b0ee8797f79d0bff4ffa4452ce30cedc83644d45f0fd9
kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e
kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e
kernel-debug-devel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 9f56c329dfc19e6765ccfe887177a8052051b1a747e860a197e24d1d426310b2
kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc
kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc
kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868
kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868
kernel-devel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 5d8a33e80ce0c09968b8b929e0c13cb3bc98cfeffa62ba24ba7be1ea08b9defa
kernel-doc-3.10.0-1062.77.1.el7.noarch.rpm
SHA-256: 4a006504974f9aed531c3edf2d2a07101a4fc10649a8775bdc422b2bf330837f
kernel-headers-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: c7853d5f7724769eabcb223fd6eeb6088132073fd9e5328d4df888b98bfc3b1f
kernel-tools-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 74bc6401150c4f385fe759575af9c39ecf60719f4ab7aab986884e3295fd82c2
kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195
kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195
kernel-tools-libs-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 4c50227eb5142d9a3f45169608b7cd67535b63d94846a91d5e298c75150e1650
kernel-tools-libs-devel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 562083cb005b5fc83c5158064e422b2bce2b752368f991010f7aff446416726f
perf-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 1f1549f79a18d747cb6e038df5ebd14d4a28cb50f2adf92acbee8bd5e801762c
perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a
perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a
python-perf-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: d71e219bb8eea654a6a135909ff6f36e7260f193483f8690ffc6ed0cf714eb91
python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7
python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7
SRPM
kernel-3.10.0-1062.77.1.el7.src.rpm
SHA-256: bb3e98c54682224765c7c349608e97479c05bbc657c1190278a308955159fe83
ppc64le
bpftool-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 055606edf1056011f64f82cb10c05b02d3fb1a2f0c0c447e87a2d690d1472a29
bpftool-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 948271f3ebdf2eecb556d41120fc1affbf294337fbfe636470512f0272bfdd99
bpftool-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 948271f3ebdf2eecb556d41120fc1affbf294337fbfe636470512f0272bfdd99
kernel-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: c0a55bb5205ffc479aec2417022a05f8171b9310233dee4f2f19be4fd1f62493
kernel-abi-whitelists-3.10.0-1062.77.1.el7.noarch.rpm
SHA-256: 97e9f535ad4aa2fd2fd35c94a568c30ed6d0e64bc68952ca1ea5119b95fe0368
kernel-bootwrapper-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: df643fd1b16480373e4b67241a75983980ede9cdbdaae5c2059713844967c049
kernel-debug-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 4d6fbabea61f343f99248d0f1a39c047dd4e1a98128dda5863511476e48f666b
kernel-debug-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 5f29fde207e90b912808ca6a02df8f120e1e66aff26a71ca1fd384b29cc894df
kernel-debug-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 5f29fde207e90b912808ca6a02df8f120e1e66aff26a71ca1fd384b29cc894df
kernel-debug-devel-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 49f2bff42b42c9d3b9c3bcada452dd6bd9543fe19a858f1a46ff5f79853cd604
kernel-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 39d4c5375036418616405d3a762211b76c22ce4867989c1347a01500b6ff7d19
kernel-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 39d4c5375036418616405d3a762211b76c22ce4867989c1347a01500b6ff7d19
kernel-debuginfo-common-ppc64le-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 7234af5e9798c77193378f131291388e2fe05e3e2603a752132fb54b2d59ce97
kernel-debuginfo-common-ppc64le-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 7234af5e9798c77193378f131291388e2fe05e3e2603a752132fb54b2d59ce97
kernel-devel-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 17baad5e9720f7f6254c5fe57cc2ec0c97b02880390e2be799953164b3db65df
kernel-doc-3.10.0-1062.77.1.el7.noarch.rpm
SHA-256: 4a006504974f9aed531c3edf2d2a07101a4fc10649a8775bdc422b2bf330837f
kernel-headers-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 0fb39ba8823b62d0e1afa42cd33d8df4c32d63e5582b6f85f3d4c38cc36b1c2d
kernel-tools-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: cda149e2b462ffc8c19b07ffb5d067439ed7ef7bd577a772e7b6e99df487a48d
kernel-tools-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 7f88693fdc844c6a6c0a6fdc6b70332181f189287c5497bcf382da7ccc4e9663
kernel-tools-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 7f88693fdc844c6a6c0a6fdc6b70332181f189287c5497bcf382da7ccc4e9663
kernel-tools-libs-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 723c901f7a7f590f5b6bb48e538a10be0fe2ac146ebebbbf401dc95d391b16c6
kernel-tools-libs-devel-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: dd4afb3514c8cdfeec46d5922e39bdb31ce5946c34e6b6438df1b2907490b03a
perf-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: d0eddcf66334d638ae3eb926680dcdd742b86fc0b8821a4e77e78ed8fe504e24
perf-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 82ab1411c980daa22c20217082453dc45bebd376671ad74d656a86f533c586c0
perf-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: 82ab1411c980daa22c20217082453dc45bebd376671ad74d656a86f533c586c0
python-perf-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: b71afc9ca71a22227933e6f24e6277e187d0a71a58c3eccaf420e3cd6b0ee6bb
python-perf-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: a93db7c50b0d9a22c937087db39a4af7afd65b012ee2c6b09a108ea1515daba3
python-perf-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm
SHA-256: a93db7c50b0d9a22c937087db39a4af7afd65b012ee2c6b09a108ea1515daba3
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7
SRPM
kernel-3.10.0-1062.77.1.el7.src.rpm
SHA-256: bb3e98c54682224765c7c349608e97479c05bbc657c1190278a308955159fe83
x86_64
bpftool-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 708c9a490983f3506d9c2079ce19af26d86b7212c33816b179044392a3acd8fc
bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356
bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356
kernel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 79c03b791d863e55bc92097c844b93d8f26a7ed980b2a3f0050fcb8d1a6fcf64
kernel-abi-whitelists-3.10.0-1062.77.1.el7.noarch.rpm
SHA-256: 97e9f535ad4aa2fd2fd35c94a568c30ed6d0e64bc68952ca1ea5119b95fe0368
kernel-debug-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 304333bbceab9473686b0ee8797f79d0bff4ffa4452ce30cedc83644d45f0fd9
kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e
kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e
kernel-debug-devel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 9f56c329dfc19e6765ccfe887177a8052051b1a747e860a197e24d1d426310b2
kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc
kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc
kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868
kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868
kernel-devel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 5d8a33e80ce0c09968b8b929e0c13cb3bc98cfeffa62ba24ba7be1ea08b9defa
kernel-doc-3.10.0-1062.77.1.el7.noarch.rpm
SHA-256: 4a006504974f9aed531c3edf2d2a07101a4fc10649a8775bdc422b2bf330837f
kernel-headers-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: c7853d5f7724769eabcb223fd6eeb6088132073fd9e5328d4df888b98bfc3b1f
kernel-tools-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 74bc6401150c4f385fe759575af9c39ecf60719f4ab7aab986884e3295fd82c2
kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195
kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195
kernel-tools-libs-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 4c50227eb5142d9a3f45169608b7cd67535b63d94846a91d5e298c75150e1650
kernel-tools-libs-devel-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 562083cb005b5fc83c5158064e422b2bce2b752368f991010f7aff446416726f
perf-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 1f1549f79a18d747cb6e038df5ebd14d4a28cb50f2adf92acbee8bd5e801762c
perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a
perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a
python-perf-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: d71e219bb8eea654a6a135909ff6f36e7260f193483f8690ffc6ed0cf714eb91
python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7
python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm
SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7
Related news
IBM QRadar SIEM 7.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 267484.
Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Red Hat Security Advisory 2023-5603-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, out of bounds write, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1206: A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%. * CVE-2...
Red Hat Security Advisory 2023-5221-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.
It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Querijn Voet discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Various other vulnerabilities were also discovered and addressed.
Red Hat Security Advisory 2023-4962-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which ...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code l...
Red Hat Security Advisory 2023-4834-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances. * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE pa...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2124: An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-3090: A flaw was found in the IPVLAN netwo...
Debian Linux Security Advisory 5480-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
Red Hat OpenShift Container Platform release 4.13.8 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...
An update for kpatch-patch-4_18_0-147_78_1, kpatch-patch-4_18_0-147_80_1, kpatch-patch-4_18_0-147_81_1, kpatch-patch-4_18_0-147_83_1, and kpatch-patch-4_18_0-147_85_1 is now available for Red Hat Enterprise Linux 8.1. Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, w...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-45869: A flaw was found in the Linux kernel in the KVM. A race condition in direct_page_fault allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualization and the TDP MMU are enabled. * CVE-2023-0458: A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() ...
Ubuntu Security Notice 6235-1 - It was discovered that the NTFS file system implementation in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service. Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did not properly implement speculative execution barriers in usercopy functions in certain situations. A local attacker could use this to expose sensitive information.
Ubuntu Security Notice 6220-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.
Ubuntu Security Notice 6206-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NTFS file system implementation in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6193-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.
Ubuntu Security Notice 6192-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the Linux kernel did not properly handle locking when IOPOLL mode is being used. A local attacker could use this to cause a denial of service.
An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.