Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:4697: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets with a total size of 252 bytes, which results in an out-of-bounds write when the third packet enters fl_set_geneve_opt, potentially leading to a denial of service or privilege escalation.
Red Hat Security Data
#vulnerability#linux#red_hat#dos#sap

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64
  • Red Hat Enterprise Linux Server - TUS 7.7 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64

Fixes

  • BZ - 2215768 - CVE-2023-35788 kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()

Red Hat Enterprise Linux Server - AUS 7.7

SRPM

kernel-3.10.0-1062.77.1.el7.src.rpm

SHA-256: bb3e98c54682224765c7c349608e97479c05bbc657c1190278a308955159fe83

x86_64

bpftool-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 708c9a490983f3506d9c2079ce19af26d86b7212c33816b179044392a3acd8fc

bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356

bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356

kernel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 79c03b791d863e55bc92097c844b93d8f26a7ed980b2a3f0050fcb8d1a6fcf64

kernel-abi-whitelists-3.10.0-1062.77.1.el7.noarch.rpm

SHA-256: 97e9f535ad4aa2fd2fd35c94a568c30ed6d0e64bc68952ca1ea5119b95fe0368

kernel-debug-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 304333bbceab9473686b0ee8797f79d0bff4ffa4452ce30cedc83644d45f0fd9

kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e

kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e

kernel-debug-devel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 9f56c329dfc19e6765ccfe887177a8052051b1a747e860a197e24d1d426310b2

kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc

kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc

kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868

kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868

kernel-devel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 5d8a33e80ce0c09968b8b929e0c13cb3bc98cfeffa62ba24ba7be1ea08b9defa

kernel-doc-3.10.0-1062.77.1.el7.noarch.rpm

SHA-256: 4a006504974f9aed531c3edf2d2a07101a4fc10649a8775bdc422b2bf330837f

kernel-headers-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: c7853d5f7724769eabcb223fd6eeb6088132073fd9e5328d4df888b98bfc3b1f

kernel-tools-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 74bc6401150c4f385fe759575af9c39ecf60719f4ab7aab986884e3295fd82c2

kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195

kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195

kernel-tools-libs-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 4c50227eb5142d9a3f45169608b7cd67535b63d94846a91d5e298c75150e1650

kernel-tools-libs-devel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 562083cb005b5fc83c5158064e422b2bce2b752368f991010f7aff446416726f

perf-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 1f1549f79a18d747cb6e038df5ebd14d4a28cb50f2adf92acbee8bd5e801762c

perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a

perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a

python-perf-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: d71e219bb8eea654a6a135909ff6f36e7260f193483f8690ffc6ed0cf714eb91

python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7

python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7

Red Hat Enterprise Linux Server - TUS 7.7

SRPM

kernel-3.10.0-1062.77.1.el7.src.rpm

SHA-256: bb3e98c54682224765c7c349608e97479c05bbc657c1190278a308955159fe83

x86_64

bpftool-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 708c9a490983f3506d9c2079ce19af26d86b7212c33816b179044392a3acd8fc

bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356

bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356

kernel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 79c03b791d863e55bc92097c844b93d8f26a7ed980b2a3f0050fcb8d1a6fcf64

kernel-abi-whitelists-3.10.0-1062.77.1.el7.noarch.rpm

SHA-256: 97e9f535ad4aa2fd2fd35c94a568c30ed6d0e64bc68952ca1ea5119b95fe0368

kernel-debug-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 304333bbceab9473686b0ee8797f79d0bff4ffa4452ce30cedc83644d45f0fd9

kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e

kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e

kernel-debug-devel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 9f56c329dfc19e6765ccfe887177a8052051b1a747e860a197e24d1d426310b2

kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc

kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc

kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868

kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868

kernel-devel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 5d8a33e80ce0c09968b8b929e0c13cb3bc98cfeffa62ba24ba7be1ea08b9defa

kernel-doc-3.10.0-1062.77.1.el7.noarch.rpm

SHA-256: 4a006504974f9aed531c3edf2d2a07101a4fc10649a8775bdc422b2bf330837f

kernel-headers-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: c7853d5f7724769eabcb223fd6eeb6088132073fd9e5328d4df888b98bfc3b1f

kernel-tools-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 74bc6401150c4f385fe759575af9c39ecf60719f4ab7aab986884e3295fd82c2

kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195

kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195

kernel-tools-libs-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 4c50227eb5142d9a3f45169608b7cd67535b63d94846a91d5e298c75150e1650

kernel-tools-libs-devel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 562083cb005b5fc83c5158064e422b2bce2b752368f991010f7aff446416726f

perf-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 1f1549f79a18d747cb6e038df5ebd14d4a28cb50f2adf92acbee8bd5e801762c

perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a

perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a

python-perf-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: d71e219bb8eea654a6a135909ff6f36e7260f193483f8690ffc6ed0cf714eb91

python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7

python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.77.1.el7.src.rpm

SHA-256: bb3e98c54682224765c7c349608e97479c05bbc657c1190278a308955159fe83

ppc64le

bpftool-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 055606edf1056011f64f82cb10c05b02d3fb1a2f0c0c447e87a2d690d1472a29

bpftool-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 948271f3ebdf2eecb556d41120fc1affbf294337fbfe636470512f0272bfdd99

bpftool-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 948271f3ebdf2eecb556d41120fc1affbf294337fbfe636470512f0272bfdd99

kernel-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: c0a55bb5205ffc479aec2417022a05f8171b9310233dee4f2f19be4fd1f62493

kernel-abi-whitelists-3.10.0-1062.77.1.el7.noarch.rpm

SHA-256: 97e9f535ad4aa2fd2fd35c94a568c30ed6d0e64bc68952ca1ea5119b95fe0368

kernel-bootwrapper-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: df643fd1b16480373e4b67241a75983980ede9cdbdaae5c2059713844967c049

kernel-debug-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 4d6fbabea61f343f99248d0f1a39c047dd4e1a98128dda5863511476e48f666b

kernel-debug-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 5f29fde207e90b912808ca6a02df8f120e1e66aff26a71ca1fd384b29cc894df

kernel-debug-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 5f29fde207e90b912808ca6a02df8f120e1e66aff26a71ca1fd384b29cc894df

kernel-debug-devel-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 49f2bff42b42c9d3b9c3bcada452dd6bd9543fe19a858f1a46ff5f79853cd604

kernel-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 39d4c5375036418616405d3a762211b76c22ce4867989c1347a01500b6ff7d19

kernel-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 39d4c5375036418616405d3a762211b76c22ce4867989c1347a01500b6ff7d19

kernel-debuginfo-common-ppc64le-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 7234af5e9798c77193378f131291388e2fe05e3e2603a752132fb54b2d59ce97

kernel-debuginfo-common-ppc64le-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 7234af5e9798c77193378f131291388e2fe05e3e2603a752132fb54b2d59ce97

kernel-devel-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 17baad5e9720f7f6254c5fe57cc2ec0c97b02880390e2be799953164b3db65df

kernel-doc-3.10.0-1062.77.1.el7.noarch.rpm

SHA-256: 4a006504974f9aed531c3edf2d2a07101a4fc10649a8775bdc422b2bf330837f

kernel-headers-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 0fb39ba8823b62d0e1afa42cd33d8df4c32d63e5582b6f85f3d4c38cc36b1c2d

kernel-tools-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: cda149e2b462ffc8c19b07ffb5d067439ed7ef7bd577a772e7b6e99df487a48d

kernel-tools-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 7f88693fdc844c6a6c0a6fdc6b70332181f189287c5497bcf382da7ccc4e9663

kernel-tools-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 7f88693fdc844c6a6c0a6fdc6b70332181f189287c5497bcf382da7ccc4e9663

kernel-tools-libs-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 723c901f7a7f590f5b6bb48e538a10be0fe2ac146ebebbbf401dc95d391b16c6

kernel-tools-libs-devel-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: dd4afb3514c8cdfeec46d5922e39bdb31ce5946c34e6b6438df1b2907490b03a

perf-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: d0eddcf66334d638ae3eb926680dcdd742b86fc0b8821a4e77e78ed8fe504e24

perf-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 82ab1411c980daa22c20217082453dc45bebd376671ad74d656a86f533c586c0

perf-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: 82ab1411c980daa22c20217082453dc45bebd376671ad74d656a86f533c586c0

python-perf-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: b71afc9ca71a22227933e6f24e6277e187d0a71a58c3eccaf420e3cd6b0ee6bb

python-perf-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: a93db7c50b0d9a22c937087db39a4af7afd65b012ee2c6b09a108ea1515daba3

python-perf-debuginfo-3.10.0-1062.77.1.el7.ppc64le.rpm

SHA-256: a93db7c50b0d9a22c937087db39a4af7afd65b012ee2c6b09a108ea1515daba3

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.77.1.el7.src.rpm

SHA-256: bb3e98c54682224765c7c349608e97479c05bbc657c1190278a308955159fe83

x86_64

bpftool-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 708c9a490983f3506d9c2079ce19af26d86b7212c33816b179044392a3acd8fc

bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356

bpftool-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 6f764c28dd5d879546a116a1310da68ecd1ad73463ca529b54f69c9ac7a5e356

kernel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 79c03b791d863e55bc92097c844b93d8f26a7ed980b2a3f0050fcb8d1a6fcf64

kernel-abi-whitelists-3.10.0-1062.77.1.el7.noarch.rpm

SHA-256: 97e9f535ad4aa2fd2fd35c94a568c30ed6d0e64bc68952ca1ea5119b95fe0368

kernel-debug-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 304333bbceab9473686b0ee8797f79d0bff4ffa4452ce30cedc83644d45f0fd9

kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e

kernel-debug-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 809f73f9db6be08de3ae58bea55ad8283e53c07d2abbf6d5dc2daf74e3b04e1e

kernel-debug-devel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 9f56c329dfc19e6765ccfe887177a8052051b1a747e860a197e24d1d426310b2

kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc

kernel-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 1ed3c459afd6959cd6749bc95e096f67c536508cc324042f15e9e9a91f4029cc

kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868

kernel-debuginfo-common-x86_64-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b68915455a9cebb5abd05c4f25d9238926cbc828c8ef7b2b292f7cbb987ae868

kernel-devel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 5d8a33e80ce0c09968b8b929e0c13cb3bc98cfeffa62ba24ba7be1ea08b9defa

kernel-doc-3.10.0-1062.77.1.el7.noarch.rpm

SHA-256: 4a006504974f9aed531c3edf2d2a07101a4fc10649a8775bdc422b2bf330837f

kernel-headers-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: c7853d5f7724769eabcb223fd6eeb6088132073fd9e5328d4df888b98bfc3b1f

kernel-tools-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 74bc6401150c4f385fe759575af9c39ecf60719f4ab7aab986884e3295fd82c2

kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195

kernel-tools-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 969be4799ad6894c3d6eff2870bdde0bf99f63e6a700907fd1565913b948f195

kernel-tools-libs-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 4c50227eb5142d9a3f45169608b7cd67535b63d94846a91d5e298c75150e1650

kernel-tools-libs-devel-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 562083cb005b5fc83c5158064e422b2bce2b752368f991010f7aff446416726f

perf-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 1f1549f79a18d747cb6e038df5ebd14d4a28cb50f2adf92acbee8bd5e801762c

perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a

perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: b80febf8bb5ade3290faeefc09ce2d7bd12a0254c523d9582c0a7cfc76ec517a

python-perf-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: d71e219bb8eea654a6a135909ff6f36e7260f193483f8690ffc6ed0cf714eb91

python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7

python-perf-debuginfo-3.10.0-1062.77.1.el7.x86_64.rpm

SHA-256: 7949e6bfbbe51cf8c45882bc2dfe6813b5af47d13c2bd2b1aaa3982a695333c7

Related news

CVE-2023-43057: Security Bulletin: IBM QRadar SIEM contains multiple vulnerabilities

IBM QRadar SIEM 7.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 267484.

CVE-2023-22130: Oracle Critical Patch Update Advisory - October 2023

Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

Red Hat Security Advisory 2023-5603-01

Red Hat Security Advisory 2023-5603-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, out of bounds write, and use-after-free vulnerabilities.

RHSA-2023:5603: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1206: A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%. * CVE-2...

Red Hat Security Advisory 2023-5221-01

Red Hat Security Advisory 2023-5221-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.

Kernel Live Patch Security Notice LSN-0097-1

It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Querijn Voet discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Various other vulnerabilities were also discovered and addressed.

Red Hat Security Advisory 2023-4962-01

Red Hat Security Advisory 2023-4962-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.

RHSA-2023:4961: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which ...

RHSA-2023:4888: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42896: A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code l...

Red Hat Security Advisory 2023-4834-01

Red Hat Security Advisory 2023-4834-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

RHSA-2023:4819: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances. * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE pa...

RHSA-2023:4817: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2124: An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-3090: A flaw was found in the IPVLAN netwo...

Debian Security Advisory 5480-1

Debian Linux Security Advisory 5480-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

RHSA-2023:4456: Red Hat Security Advisory: OpenShift Container Platform 4.13.8 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.8 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:4516: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch-4_18_0-147_78_1, kpatch-patch-4_18_0-147_80_1, kpatch-patch-4_18_0-147_81_1, kpatch-patch-4_18_0-147_83_1, and kpatch-patch-4_18_0-147_85_1 is now available for Red Hat Enterprise Linux 8.1. Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, w...

RHSA-2023:4378: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-45869: A flaw was found in the Linux kernel in the KVM. A race condition in direct_page_fault allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualization and the TDP MMU are enabled. * CVE-2023-0458: A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() ...

Ubuntu Security Notice USN-6235-1

Ubuntu Security Notice 6235-1 - It was discovered that the NTFS file system implementation in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service. Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did not properly implement speculative execution barriers in usercopy functions in certain situations. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6220-1

Ubuntu Security Notice 6220-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Ubuntu Security Notice USN-6206-1

Ubuntu Security Notice 6206-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NTFS file system implementation in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6193-1

Ubuntu Security Notice 6193-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Ubuntu Security Notice USN-6192-1

Ubuntu Security Notice 6192-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the Linux kernel did not properly handle locking when IOPOLL mode is being used. A local attacker could use this to cause a denial of service.

CVE-2023-35788: security - Linux kernel: off-by-one in fl_set_geneve_opt

An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.