Headline
RHSA-2022:6741: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Posix ACL object is leaked in several places upon setattr and fsetxattr syscalls (BZ#2106586)
- netfilter: backports from upstream (BZ#2120634)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
- Red Hat Enterprise Linux Server - TUS 7.7 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64
Fixes
- BZ - 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation
Red Hat Enterprise Linux Server - AUS 7.7
SRPM
kernel-3.10.0-1062.70.1.el7.src.rpm
SHA-256: 0c6c14387a205647ded22ea4936c1e493d03970ea79e9d0ac6323baa2f9eebba
x86_64
bpftool-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: c81752fd7b93c9306ba4916ca586967fb7317238ed0f6afe638bd2da864a3d69
bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa
bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa
kernel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: fc9ec0ba8b2adb8dee8417a1d6ad3095ca090a618e5b5c32be7852c8d19a987e
kernel-abi-whitelists-3.10.0-1062.70.1.el7.noarch.rpm
SHA-256: fb14c65c8e3ca3ae4a546407a575354753e91ca61f68f0a6626f108449eb18ca
kernel-debug-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 912663058afe41c3d418ee47b4568cc771f97fe691c3b58e16eabf3b48110f6f
kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359
kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359
kernel-debug-devel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: b8d16352b3302d2d3961a21747417867df72925edb1f85fbe090688178af99cd
kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76
kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76
kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885
kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885
kernel-devel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: cd3e046ad803e953941f89bfb4e83bcd6d6654b34fccf47da5f0f5de1b11fba0
kernel-doc-3.10.0-1062.70.1.el7.noarch.rpm
SHA-256: 0dfe02298921afaba7714d548a86dfe68990431d721f116923b6ea1154d90bfb
kernel-headers-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 773d521441e44c40bf1cb6b3e6b0d7489f6265b1519f433accdf86b1ffb65a50
kernel-tools-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: f45c868db8bdedead1e1ea424fd9c9a47ce9ebe19a00feab8731726c5d212501
kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a
kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a
kernel-tools-libs-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: e2ec2549af5db38d84e1dcfcf17df5c1a2e6276eb8f80ceb0b2ce296d0cb90fa
kernel-tools-libs-devel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: c2aec475c27f022021c696f8f68d17efa030cd2eee93c81ca9405e3061b9b79c
perf-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: c362c809e53518fd9e3a98cf453a8a25f63962160eb49a2d8e8438b34f97eb26
perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a
perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a
python-perf-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: a9980c4d7bb862c998f0956527cd1d44ee47124acb0ab4c11554ae8901e9311c
python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6
python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6
Red Hat Enterprise Linux Server - TUS 7.7
SRPM
kernel-3.10.0-1062.70.1.el7.src.rpm
SHA-256: 0c6c14387a205647ded22ea4936c1e493d03970ea79e9d0ac6323baa2f9eebba
x86_64
bpftool-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: c81752fd7b93c9306ba4916ca586967fb7317238ed0f6afe638bd2da864a3d69
bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa
bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa
kernel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: fc9ec0ba8b2adb8dee8417a1d6ad3095ca090a618e5b5c32be7852c8d19a987e
kernel-abi-whitelists-3.10.0-1062.70.1.el7.noarch.rpm
SHA-256: fb14c65c8e3ca3ae4a546407a575354753e91ca61f68f0a6626f108449eb18ca
kernel-debug-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 912663058afe41c3d418ee47b4568cc771f97fe691c3b58e16eabf3b48110f6f
kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359
kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359
kernel-debug-devel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: b8d16352b3302d2d3961a21747417867df72925edb1f85fbe090688178af99cd
kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76
kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76
kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885
kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885
kernel-devel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: cd3e046ad803e953941f89bfb4e83bcd6d6654b34fccf47da5f0f5de1b11fba0
kernel-doc-3.10.0-1062.70.1.el7.noarch.rpm
SHA-256: 0dfe02298921afaba7714d548a86dfe68990431d721f116923b6ea1154d90bfb
kernel-headers-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 773d521441e44c40bf1cb6b3e6b0d7489f6265b1519f433accdf86b1ffb65a50
kernel-tools-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: f45c868db8bdedead1e1ea424fd9c9a47ce9ebe19a00feab8731726c5d212501
kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a
kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a
kernel-tools-libs-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: e2ec2549af5db38d84e1dcfcf17df5c1a2e6276eb8f80ceb0b2ce296d0cb90fa
kernel-tools-libs-devel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: c2aec475c27f022021c696f8f68d17efa030cd2eee93c81ca9405e3061b9b79c
perf-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: c362c809e53518fd9e3a98cf453a8a25f63962160eb49a2d8e8438b34f97eb26
perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a
perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a
python-perf-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: a9980c4d7bb862c998f0956527cd1d44ee47124acb0ab4c11554ae8901e9311c
python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6
python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7
SRPM
kernel-3.10.0-1062.70.1.el7.src.rpm
SHA-256: 0c6c14387a205647ded22ea4936c1e493d03970ea79e9d0ac6323baa2f9eebba
ppc64le
bpftool-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: c191c6cec76dab0d29fb09a8af57da0f903aa81a007d4afc722750621f8fd451
bpftool-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: e685505864f91dee7e2656af0fb3e88667bc3deeb6afc628ead571d0132deb8e
bpftool-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: e685505864f91dee7e2656af0fb3e88667bc3deeb6afc628ead571d0132deb8e
kernel-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 7fa65bc69da405ed79bfb51a68cff3d52a48bfbb61efce8797948a2aac9894ad
kernel-abi-whitelists-3.10.0-1062.70.1.el7.noarch.rpm
SHA-256: fb14c65c8e3ca3ae4a546407a575354753e91ca61f68f0a6626f108449eb18ca
kernel-bootwrapper-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 530742a3807be032182d2c48d962d60809bed23e5d39a4bc668cba5e54feaa1c
kernel-debug-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 98eec0d63f5ca00055e1594dbecbc22d1e19cac1f830a0810dfbdf39db0ce604
kernel-debug-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 6dd6b017d01ecca953231169e3d0df47e70dd5c3d7fcd20748d6b6f1550c00c2
kernel-debug-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 6dd6b017d01ecca953231169e3d0df47e70dd5c3d7fcd20748d6b6f1550c00c2
kernel-debug-devel-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 6b2cbec98d66099f446f1ed179838222e5f88b62da88d7bb6238ad18b0104a7a
kernel-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: ab91594e2e388e63b3c20b4805961b5dd24388595fb5121cd0569d3c29a31db1
kernel-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: ab91594e2e388e63b3c20b4805961b5dd24388595fb5121cd0569d3c29a31db1
kernel-debuginfo-common-ppc64le-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: e31e72b9ea60800133afd822e960bde8cb34788e2bcee0e2f0c9f721efbfcbed
kernel-debuginfo-common-ppc64le-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: e31e72b9ea60800133afd822e960bde8cb34788e2bcee0e2f0c9f721efbfcbed
kernel-devel-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: c5e4bb1ebd6a870d474403d9b9ea0916c645c4a2c91729a61f5a116b66809088
kernel-doc-3.10.0-1062.70.1.el7.noarch.rpm
SHA-256: 0dfe02298921afaba7714d548a86dfe68990431d721f116923b6ea1154d90bfb
kernel-headers-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: ff796eb86a421637435f74e1fe10de2408b5302a51b10b4ff513012c8b97c51d
kernel-tools-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 200c0315b6576199d8d7bdf922e93978dc91b804d9d416be5bd58c9d364d8ba3
kernel-tools-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 34f0a85fc94e5b9e67534e6b412a206756cf3cf90813195d8c660eb0d32284f8
kernel-tools-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 34f0a85fc94e5b9e67534e6b412a206756cf3cf90813195d8c660eb0d32284f8
kernel-tools-libs-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 076d6e64f4eb8a30ffa247b1c4dce9aa65a584c85f2e1aff433f2415812edf28
kernel-tools-libs-devel-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 3dbb82883d3c38bfeae9c41655c41567713603846914a34760090622e3168c96
perf-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 82042d8f1a20d523cbc90ab52cb178a06a8bb8619c36c6a7da4687458bc5e59f
perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: d03e12b7993d40cc54631cbfccefebf7cb244aa86fea49c044f37dca157a8d0e
perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: d03e12b7993d40cc54631cbfccefebf7cb244aa86fea49c044f37dca157a8d0e
python-perf-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 35361e6532818523fd16aa1555035b5c09419b0753b78ce2776d42308d250a2c
python-perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 0e628ffef029ffce5629c8aae3f7f11679d9c46be2d85bcbc6bdc669a6e317a4
python-perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm
SHA-256: 0e628ffef029ffce5629c8aae3f7f11679d9c46be2d85bcbc6bdc669a6e317a4
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7
SRPM
kernel-3.10.0-1062.70.1.el7.src.rpm
SHA-256: 0c6c14387a205647ded22ea4936c1e493d03970ea79e9d0ac6323baa2f9eebba
x86_64
bpftool-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: c81752fd7b93c9306ba4916ca586967fb7317238ed0f6afe638bd2da864a3d69
bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa
bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa
kernel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: fc9ec0ba8b2adb8dee8417a1d6ad3095ca090a618e5b5c32be7852c8d19a987e
kernel-abi-whitelists-3.10.0-1062.70.1.el7.noarch.rpm
SHA-256: fb14c65c8e3ca3ae4a546407a575354753e91ca61f68f0a6626f108449eb18ca
kernel-debug-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 912663058afe41c3d418ee47b4568cc771f97fe691c3b58e16eabf3b48110f6f
kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359
kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359
kernel-debug-devel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: b8d16352b3302d2d3961a21747417867df72925edb1f85fbe090688178af99cd
kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76
kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76
kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885
kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885
kernel-devel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: cd3e046ad803e953941f89bfb4e83bcd6d6654b34fccf47da5f0f5de1b11fba0
kernel-doc-3.10.0-1062.70.1.el7.noarch.rpm
SHA-256: 0dfe02298921afaba7714d548a86dfe68990431d721f116923b6ea1154d90bfb
kernel-headers-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 773d521441e44c40bf1cb6b3e6b0d7489f6265b1519f433accdf86b1ffb65a50
kernel-tools-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: f45c868db8bdedead1e1ea424fd9c9a47ce9ebe19a00feab8731726c5d212501
kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a
kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a
kernel-tools-libs-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: e2ec2549af5db38d84e1dcfcf17df5c1a2e6276eb8f80ceb0b2ce296d0cb90fa
kernel-tools-libs-devel-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: c2aec475c27f022021c696f8f68d17efa030cd2eee93c81ca9405e3061b9b79c
perf-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: c362c809e53518fd9e3a98cf453a8a25f63962160eb49a2d8e8438b34f97eb26
perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a
perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a
python-perf-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: a9980c4d7bb862c998f0956527cd1d44ee47124acb0ab4c11554ae8901e9311c
python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6
python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm
SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6
Related news
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
Ubuntu Security Notice 5650-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2022-6432-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
Red Hat OpenShift Container Platform release 4.7.56 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Red Hat Security Advisory 2022-5626-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5564-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.
Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5236-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...