Headline
RHSA-2022:5802: Red Hat Security Advisory: kernel security update
An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Synopsis
Important: kernel security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server - AUS 7.6 x86_64
- Red Hat Enterprise Linux Server - TUS 7.6 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6 x86_64
Fixes
- BZ - 2092427 - CVE-2022-32250 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Red Hat Enterprise Linux Server - AUS 7.6
SRPM
kernel-3.10.0-957.95.1.el7.src.rpm
SHA-256: 9172add7766a3361095983757466e4933f4eec5618ed251ab93aead7eed0046a
x86_64
bpftool-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 818db1be7df9234f4898346559258d96ec43a2601e2e7d48df9bbf0eef4a0228
kernel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: a288e329aa131d463cd9c1b5fa6ffee427da51d3d9006c3f20c0ff6958b90595
kernel-abi-whitelists-3.10.0-957.95.1.el7.noarch.rpm
SHA-256: 419655c01bdefb32c5e67486ef8d89414aee785f11d5f11dc64b19c8d90beafb
kernel-debug-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: f96ce42c95e926107a483d4479dbba80a3339172a0b4587f4216f10511865743
kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e
kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e
kernel-debug-devel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 7b3e549fae194819cdd6d0a297dea38ce33fa9c2ec054e3903c9b812d096a8de
kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f
kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f
kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911
kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911
kernel-devel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 04b7fe0f8f70564218174e7299fcb84f64706723be17e6d14f6c050c0eee060b
kernel-doc-3.10.0-957.95.1.el7.noarch.rpm
SHA-256: 1d89b9ba97cf4b46f263fe7cdf3626c20adaef2ecc9d0307d9d5971191a13379
kernel-headers-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 275ba980616295230062fd17f82a96779f727b08600c4e08b71daf9f2a9e62f7
kernel-tools-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 2ee03b6f1c6e7ab5e757903ade2a42d88e2177840de3bb9668c4678a3552a755
kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea
kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea
kernel-tools-libs-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 4332733b82aacd47fa4d50a530d6c611c829e6455cbe93aa0c307644957347e1
kernel-tools-libs-devel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: fe0bc7db66db3d90a1b33e822c5c06452cadd8c5dab95c464214fc67431e196b
perf-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: d599d42af8b90988808a0fc90273649835e0cb977e51b821b885ad0312a20a9d
perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755
perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755
python-perf-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: c7d8ae662799d21b6b7b1f29f9deef19845f729b70ff10abf1a847fb6f412a2e
python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c
python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c
Red Hat Enterprise Linux Server - TUS 7.6
SRPM
kernel-3.10.0-957.95.1.el7.src.rpm
SHA-256: 9172add7766a3361095983757466e4933f4eec5618ed251ab93aead7eed0046a
x86_64
bpftool-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 818db1be7df9234f4898346559258d96ec43a2601e2e7d48df9bbf0eef4a0228
kernel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: a288e329aa131d463cd9c1b5fa6ffee427da51d3d9006c3f20c0ff6958b90595
kernel-abi-whitelists-3.10.0-957.95.1.el7.noarch.rpm
SHA-256: 419655c01bdefb32c5e67486ef8d89414aee785f11d5f11dc64b19c8d90beafb
kernel-debug-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: f96ce42c95e926107a483d4479dbba80a3339172a0b4587f4216f10511865743
kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e
kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e
kernel-debug-devel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 7b3e549fae194819cdd6d0a297dea38ce33fa9c2ec054e3903c9b812d096a8de
kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f
kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f
kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911
kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911
kernel-devel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 04b7fe0f8f70564218174e7299fcb84f64706723be17e6d14f6c050c0eee060b
kernel-doc-3.10.0-957.95.1.el7.noarch.rpm
SHA-256: 1d89b9ba97cf4b46f263fe7cdf3626c20adaef2ecc9d0307d9d5971191a13379
kernel-headers-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 275ba980616295230062fd17f82a96779f727b08600c4e08b71daf9f2a9e62f7
kernel-tools-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 2ee03b6f1c6e7ab5e757903ade2a42d88e2177840de3bb9668c4678a3552a755
kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea
kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea
kernel-tools-libs-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 4332733b82aacd47fa4d50a530d6c611c829e6455cbe93aa0c307644957347e1
kernel-tools-libs-devel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: fe0bc7db66db3d90a1b33e822c5c06452cadd8c5dab95c464214fc67431e196b
perf-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: d599d42af8b90988808a0fc90273649835e0cb977e51b821b885ad0312a20a9d
perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755
perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755
python-perf-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: c7d8ae662799d21b6b7b1f29f9deef19845f729b70ff10abf1a847fb6f412a2e
python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c
python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6
SRPM
kernel-3.10.0-957.95.1.el7.src.rpm
SHA-256: 9172add7766a3361095983757466e4933f4eec5618ed251ab93aead7eed0046a
ppc64le
kernel-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 577e1be737d8772a5226d226ac3317a0389f85d0f91d8e9ae161b2178d7f5ab6
kernel-abi-whitelists-3.10.0-957.95.1.el7.noarch.rpm
SHA-256: 419655c01bdefb32c5e67486ef8d89414aee785f11d5f11dc64b19c8d90beafb
kernel-bootwrapper-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 243bd072ea061ea600e133406fa1d059377e3866fbe4483b8248461828a5865e
kernel-debug-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 43c369ed9d627e6d05d25fcfe6b7226d6cd7734937df7c305423d403225ee83d
kernel-debug-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 9f40c99be28faf5bc98d3e81915778dfc956ed43a73b5bf514bdeae54ee4e9f6
kernel-debug-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 9f40c99be28faf5bc98d3e81915778dfc956ed43a73b5bf514bdeae54ee4e9f6
kernel-debug-devel-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 26e50078c4720b4c0f6d5722191ea640df2e03200e0d67e5fa0fc7b0d9b3c4dc
kernel-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 4c9f7155275b7e9c7dafba77df32fa891bea41b9e96a87c994f3e0bbf5b7d7e6
kernel-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 4c9f7155275b7e9c7dafba77df32fa891bea41b9e96a87c994f3e0bbf5b7d7e6
kernel-debuginfo-common-ppc64le-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 5de1914d477d113f3cc0608d393214693bee9d8628674bd63cb9ccd60737e64e
kernel-debuginfo-common-ppc64le-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 5de1914d477d113f3cc0608d393214693bee9d8628674bd63cb9ccd60737e64e
kernel-devel-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: caa70cc96b7136c741613f3328228554b1bc2d9e625603a63a0c5bdc6ff59492
kernel-doc-3.10.0-957.95.1.el7.noarch.rpm
SHA-256: 1d89b9ba97cf4b46f263fe7cdf3626c20adaef2ecc9d0307d9d5971191a13379
kernel-headers-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 0e69693cc9ffd650414db5a44a9420f177ff1fbd1bd520d871eac596b2842576
kernel-tools-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: b7e3a4dfe2aa415340a6338ccee666bc94364b474b4ae07dfd48b30c9c449a37
kernel-tools-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: cf356e483a9ba65aeaf0c0dae2dad7c50c19269359cd8687f0ee8fbf382b2b58
kernel-tools-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: cf356e483a9ba65aeaf0c0dae2dad7c50c19269359cd8687f0ee8fbf382b2b58
kernel-tools-libs-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 94b406678252a87ea8c5ab9f134869d8d4837af0e32a2dfafb85d8ed146371d8
kernel-tools-libs-devel-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: e9d2966dd9516d5b5f0d3d98898e88c3baaaed808986301ad318f9cae8b63f32
perf-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 38f7b1137be01971a086b0e33c5e73c8051db0fbc0728f88cddfa779b27952b5
perf-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 08a11b968f73c8a7b5dbd9acf62b85c22d9d94e91a548bfd68c6b5febd9addd8
perf-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 08a11b968f73c8a7b5dbd9acf62b85c22d9d94e91a548bfd68c6b5febd9addd8
python-perf-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 39aee1daaa3c869218a66fb0153509b844d89c2dacb531a9e282d9e2c766d3d9
python-perf-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 1d829504fd7ba29a8a638286bef91f011d86c3cf746bd79f704a3c63d634c9a1
python-perf-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm
SHA-256: 1d829504fd7ba29a8a638286bef91f011d86c3cf746bd79f704a3c63d634c9a1
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6
SRPM
kernel-3.10.0-957.95.1.el7.src.rpm
SHA-256: 9172add7766a3361095983757466e4933f4eec5618ed251ab93aead7eed0046a
x86_64
kernel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: a288e329aa131d463cd9c1b5fa6ffee427da51d3d9006c3f20c0ff6958b90595
kernel-abi-whitelists-3.10.0-957.95.1.el7.noarch.rpm
SHA-256: 419655c01bdefb32c5e67486ef8d89414aee785f11d5f11dc64b19c8d90beafb
kernel-debug-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: f96ce42c95e926107a483d4479dbba80a3339172a0b4587f4216f10511865743
kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e
kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e
kernel-debug-devel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 7b3e549fae194819cdd6d0a297dea38ce33fa9c2ec054e3903c9b812d096a8de
kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f
kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f
kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911
kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911
kernel-devel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 04b7fe0f8f70564218174e7299fcb84f64706723be17e6d14f6c050c0eee060b
kernel-doc-3.10.0-957.95.1.el7.noarch.rpm
SHA-256: 1d89b9ba97cf4b46f263fe7cdf3626c20adaef2ecc9d0307d9d5971191a13379
kernel-headers-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 275ba980616295230062fd17f82a96779f727b08600c4e08b71daf9f2a9e62f7
kernel-tools-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 2ee03b6f1c6e7ab5e757903ade2a42d88e2177840de3bb9668c4678a3552a755
kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea
kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea
kernel-tools-libs-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 4332733b82aacd47fa4d50a530d6c611c829e6455cbe93aa0c307644957347e1
kernel-tools-libs-devel-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: fe0bc7db66db3d90a1b33e822c5c06452cadd8c5dab95c464214fc67431e196b
perf-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: d599d42af8b90988808a0fc90273649835e0cb977e51b821b885ad0312a20a9d
perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755
perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755
python-perf-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: c7d8ae662799d21b6b7b1f29f9deef19845f729b70ff10abf1a847fb6f412a2e
python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c
python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm
SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c
Related news
Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.
Red Hat Security Advisory 2022-6551-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include denial of service, information leakage, privilege escalation, and use-after...
Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2
OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.
Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...
Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Advanced Cluster Management for Kubernetes 2.3.12 General Availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS
Red Hat Security Advisory 2022-6103-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.1.
Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Red Hat Security Advisory 2022-6051-01 - An update is now available for RHOL-5.5-RHEL-8. Issues addressed include denial of service, man-in-the-middle, and out of bounds read vulnerabilities.
Red Hat Security Advisory 2022-6075-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...
Red Hat Security Advisory 2022-5806-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5730-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.25.
Red Hat Security Advisory 2022-5805-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Red Hat OpenShift Container Platform release 4.10.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921...
Red Hat Security Advisory 2022-5641-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5626-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5636-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-2022-1...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...
An update is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.