Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5802: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Red Hat Security Data
#vulnerability#linux#red_hat#sap

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.6 x86_64
  • Red Hat Enterprise Linux Server - TUS 7.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6 x86_64

Fixes

  • BZ - 2092427 - CVE-2022-32250 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

Red Hat Enterprise Linux Server - AUS 7.6

SRPM

kernel-3.10.0-957.95.1.el7.src.rpm

SHA-256: 9172add7766a3361095983757466e4933f4eec5618ed251ab93aead7eed0046a

x86_64

bpftool-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 818db1be7df9234f4898346559258d96ec43a2601e2e7d48df9bbf0eef4a0228

kernel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: a288e329aa131d463cd9c1b5fa6ffee427da51d3d9006c3f20c0ff6958b90595

kernel-abi-whitelists-3.10.0-957.95.1.el7.noarch.rpm

SHA-256: 419655c01bdefb32c5e67486ef8d89414aee785f11d5f11dc64b19c8d90beafb

kernel-debug-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: f96ce42c95e926107a483d4479dbba80a3339172a0b4587f4216f10511865743

kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e

kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e

kernel-debug-devel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 7b3e549fae194819cdd6d0a297dea38ce33fa9c2ec054e3903c9b812d096a8de

kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f

kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f

kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911

kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911

kernel-devel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 04b7fe0f8f70564218174e7299fcb84f64706723be17e6d14f6c050c0eee060b

kernel-doc-3.10.0-957.95.1.el7.noarch.rpm

SHA-256: 1d89b9ba97cf4b46f263fe7cdf3626c20adaef2ecc9d0307d9d5971191a13379

kernel-headers-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 275ba980616295230062fd17f82a96779f727b08600c4e08b71daf9f2a9e62f7

kernel-tools-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 2ee03b6f1c6e7ab5e757903ade2a42d88e2177840de3bb9668c4678a3552a755

kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea

kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea

kernel-tools-libs-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 4332733b82aacd47fa4d50a530d6c611c829e6455cbe93aa0c307644957347e1

kernel-tools-libs-devel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: fe0bc7db66db3d90a1b33e822c5c06452cadd8c5dab95c464214fc67431e196b

perf-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: d599d42af8b90988808a0fc90273649835e0cb977e51b821b885ad0312a20a9d

perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755

perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755

python-perf-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: c7d8ae662799d21b6b7b1f29f9deef19845f729b70ff10abf1a847fb6f412a2e

python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c

python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c

Red Hat Enterprise Linux Server - TUS 7.6

SRPM

kernel-3.10.0-957.95.1.el7.src.rpm

SHA-256: 9172add7766a3361095983757466e4933f4eec5618ed251ab93aead7eed0046a

x86_64

bpftool-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 818db1be7df9234f4898346559258d96ec43a2601e2e7d48df9bbf0eef4a0228

kernel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: a288e329aa131d463cd9c1b5fa6ffee427da51d3d9006c3f20c0ff6958b90595

kernel-abi-whitelists-3.10.0-957.95.1.el7.noarch.rpm

SHA-256: 419655c01bdefb32c5e67486ef8d89414aee785f11d5f11dc64b19c8d90beafb

kernel-debug-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: f96ce42c95e926107a483d4479dbba80a3339172a0b4587f4216f10511865743

kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e

kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e

kernel-debug-devel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 7b3e549fae194819cdd6d0a297dea38ce33fa9c2ec054e3903c9b812d096a8de

kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f

kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f

kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911

kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911

kernel-devel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 04b7fe0f8f70564218174e7299fcb84f64706723be17e6d14f6c050c0eee060b

kernel-doc-3.10.0-957.95.1.el7.noarch.rpm

SHA-256: 1d89b9ba97cf4b46f263fe7cdf3626c20adaef2ecc9d0307d9d5971191a13379

kernel-headers-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 275ba980616295230062fd17f82a96779f727b08600c4e08b71daf9f2a9e62f7

kernel-tools-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 2ee03b6f1c6e7ab5e757903ade2a42d88e2177840de3bb9668c4678a3552a755

kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea

kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea

kernel-tools-libs-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 4332733b82aacd47fa4d50a530d6c611c829e6455cbe93aa0c307644957347e1

kernel-tools-libs-devel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: fe0bc7db66db3d90a1b33e822c5c06452cadd8c5dab95c464214fc67431e196b

perf-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: d599d42af8b90988808a0fc90273649835e0cb977e51b821b885ad0312a20a9d

perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755

perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755

python-perf-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: c7d8ae662799d21b6b7b1f29f9deef19845f729b70ff10abf1a847fb6f412a2e

python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c

python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6

SRPM

kernel-3.10.0-957.95.1.el7.src.rpm

SHA-256: 9172add7766a3361095983757466e4933f4eec5618ed251ab93aead7eed0046a

ppc64le

kernel-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 577e1be737d8772a5226d226ac3317a0389f85d0f91d8e9ae161b2178d7f5ab6

kernel-abi-whitelists-3.10.0-957.95.1.el7.noarch.rpm

SHA-256: 419655c01bdefb32c5e67486ef8d89414aee785f11d5f11dc64b19c8d90beafb

kernel-bootwrapper-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 243bd072ea061ea600e133406fa1d059377e3866fbe4483b8248461828a5865e

kernel-debug-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 43c369ed9d627e6d05d25fcfe6b7226d6cd7734937df7c305423d403225ee83d

kernel-debug-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 9f40c99be28faf5bc98d3e81915778dfc956ed43a73b5bf514bdeae54ee4e9f6

kernel-debug-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 9f40c99be28faf5bc98d3e81915778dfc956ed43a73b5bf514bdeae54ee4e9f6

kernel-debug-devel-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 26e50078c4720b4c0f6d5722191ea640df2e03200e0d67e5fa0fc7b0d9b3c4dc

kernel-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 4c9f7155275b7e9c7dafba77df32fa891bea41b9e96a87c994f3e0bbf5b7d7e6

kernel-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 4c9f7155275b7e9c7dafba77df32fa891bea41b9e96a87c994f3e0bbf5b7d7e6

kernel-debuginfo-common-ppc64le-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 5de1914d477d113f3cc0608d393214693bee9d8628674bd63cb9ccd60737e64e

kernel-debuginfo-common-ppc64le-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 5de1914d477d113f3cc0608d393214693bee9d8628674bd63cb9ccd60737e64e

kernel-devel-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: caa70cc96b7136c741613f3328228554b1bc2d9e625603a63a0c5bdc6ff59492

kernel-doc-3.10.0-957.95.1.el7.noarch.rpm

SHA-256: 1d89b9ba97cf4b46f263fe7cdf3626c20adaef2ecc9d0307d9d5971191a13379

kernel-headers-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 0e69693cc9ffd650414db5a44a9420f177ff1fbd1bd520d871eac596b2842576

kernel-tools-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: b7e3a4dfe2aa415340a6338ccee666bc94364b474b4ae07dfd48b30c9c449a37

kernel-tools-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: cf356e483a9ba65aeaf0c0dae2dad7c50c19269359cd8687f0ee8fbf382b2b58

kernel-tools-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: cf356e483a9ba65aeaf0c0dae2dad7c50c19269359cd8687f0ee8fbf382b2b58

kernel-tools-libs-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 94b406678252a87ea8c5ab9f134869d8d4837af0e32a2dfafb85d8ed146371d8

kernel-tools-libs-devel-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: e9d2966dd9516d5b5f0d3d98898e88c3baaaed808986301ad318f9cae8b63f32

perf-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 38f7b1137be01971a086b0e33c5e73c8051db0fbc0728f88cddfa779b27952b5

perf-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 08a11b968f73c8a7b5dbd9acf62b85c22d9d94e91a548bfd68c6b5febd9addd8

perf-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 08a11b968f73c8a7b5dbd9acf62b85c22d9d94e91a548bfd68c6b5febd9addd8

python-perf-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 39aee1daaa3c869218a66fb0153509b844d89c2dacb531a9e282d9e2c766d3d9

python-perf-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 1d829504fd7ba29a8a638286bef91f011d86c3cf746bd79f704a3c63d634c9a1

python-perf-debuginfo-3.10.0-957.95.1.el7.ppc64le.rpm

SHA-256: 1d829504fd7ba29a8a638286bef91f011d86c3cf746bd79f704a3c63d634c9a1

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6

SRPM

kernel-3.10.0-957.95.1.el7.src.rpm

SHA-256: 9172add7766a3361095983757466e4933f4eec5618ed251ab93aead7eed0046a

x86_64

kernel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: a288e329aa131d463cd9c1b5fa6ffee427da51d3d9006c3f20c0ff6958b90595

kernel-abi-whitelists-3.10.0-957.95.1.el7.noarch.rpm

SHA-256: 419655c01bdefb32c5e67486ef8d89414aee785f11d5f11dc64b19c8d90beafb

kernel-debug-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: f96ce42c95e926107a483d4479dbba80a3339172a0b4587f4216f10511865743

kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e

kernel-debug-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: e0be3a88b49f45e04717ca33a89070581ae6f953c44fc080f8ce37f4c5e4a88e

kernel-debug-devel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 7b3e549fae194819cdd6d0a297dea38ce33fa9c2ec054e3903c9b812d096a8de

kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f

kernel-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 97e5a3ea0c26e1cabc9a6717608f9fb65580d14d99927530b587458cd6c1fb1f

kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911

kernel-debuginfo-common-x86_64-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 52fa9c083b4277bfbe5d5c2f1f991284a66ae96de6bbb4ce9b147660c6da6911

kernel-devel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 04b7fe0f8f70564218174e7299fcb84f64706723be17e6d14f6c050c0eee060b

kernel-doc-3.10.0-957.95.1.el7.noarch.rpm

SHA-256: 1d89b9ba97cf4b46f263fe7cdf3626c20adaef2ecc9d0307d9d5971191a13379

kernel-headers-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 275ba980616295230062fd17f82a96779f727b08600c4e08b71daf9f2a9e62f7

kernel-tools-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 2ee03b6f1c6e7ab5e757903ade2a42d88e2177840de3bb9668c4678a3552a755

kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea

kernel-tools-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 7e02ef2ee8ed751a2890ec45c4660d1d388822e192a2fb368c8b88b3ec8133ea

kernel-tools-libs-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 4332733b82aacd47fa4d50a530d6c611c829e6455cbe93aa0c307644957347e1

kernel-tools-libs-devel-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: fe0bc7db66db3d90a1b33e822c5c06452cadd8c5dab95c464214fc67431e196b

perf-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: d599d42af8b90988808a0fc90273649835e0cb977e51b821b885ad0312a20a9d

perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755

perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 4c9a45cb895aad26c44e981a3b21792c6d2bd3f8cea272a6971434cb3b1a8755

python-perf-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: c7d8ae662799d21b6b7b1f29f9deef19845f729b70ff10abf1a847fb6f412a2e

python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c

python-perf-debuginfo-3.10.0-957.95.1.el7.x86_64.rpm

SHA-256: 327910b78fb727a07e04eacc24432b6053c5f2a6f0a6ff8ab6633fdcdbf8566c

Related news

Red Hat Security Advisory 2022-6696-01

Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6551-01

Red Hat Security Advisory 2022-6551-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include denial of service, information leakage, privilege escalation, and use-after...

RHSA-2022:6507: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2

CVE-2022-38701: en/security-disclosure/2022/2022-09.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.

RHSA-2022:6370: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...

Red Hat Security Advisory 2022-6271-01

Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6271: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.12 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.3.12 General Availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS

Red Hat Security Advisory 2022-6103-01

Red Hat Security Advisory 2022-6103-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.1.

RHSA-2022:6103: Red Hat Security Advisory: OpenShift Container Platform 4.11.1 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6051-01

Red Hat Security Advisory 2022-6051-01 - An update is now available for RHOL-5.5-RHEL-8. Issues addressed include denial of service, man-in-the-middle, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-6075-01

Red Hat Security Advisory 2022-6075-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:6073: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

Red Hat Security Advisory 2022-5806-01

Red Hat Security Advisory 2022-5806-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5730-01

Red Hat Security Advisory 2022-5730-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.25.

Red Hat Security Advisory 2022-5805-01

Red Hat Security Advisory 2022-5805-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:5819: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5839: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5804: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5834: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5806: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5730: Red Hat Security Advisory: OpenShift Container Platform 4.10.25 bug fix and security update

Red Hat OpenShift Container Platform release 4.10.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921...

Red Hat Security Advisory 2022-5641-01

Red Hat Security Advisory 2022-5641-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5626-01

Red Hat Security Advisory 2022-5626-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5636-01

Red Hat Security Advisory 2022-5636-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5626: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-2022-1...

RHSA-2022:5633: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...

RHSA-2022:5648: Red Hat Security Advisory: kpatch-patch security update

An update is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5641: Red Hat Security Advisory: kpatch-patch security update

An update is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5636: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

CVE-2022-32250: security - Linux Kernel use-after-free write in netfilter

net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.