Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:6741: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
Red Hat Security Data
#vulnerability#linux#red_hat#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Posix ACL object is leaked in several places upon setattr and fsetxattr syscalls (BZ#2106586)
  • netfilter: backports from upstream (BZ#2120634)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64
  • Red Hat Enterprise Linux Server - TUS 7.7 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64

Fixes

  • BZ - 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation

Red Hat Enterprise Linux Server - AUS 7.7

SRPM

kernel-3.10.0-1062.70.1.el7.src.rpm

SHA-256: 0c6c14387a205647ded22ea4936c1e493d03970ea79e9d0ac6323baa2f9eebba

x86_64

bpftool-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: c81752fd7b93c9306ba4916ca586967fb7317238ed0f6afe638bd2da864a3d69

bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa

bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa

kernel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: fc9ec0ba8b2adb8dee8417a1d6ad3095ca090a618e5b5c32be7852c8d19a987e

kernel-abi-whitelists-3.10.0-1062.70.1.el7.noarch.rpm

SHA-256: fb14c65c8e3ca3ae4a546407a575354753e91ca61f68f0a6626f108449eb18ca

kernel-debug-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 912663058afe41c3d418ee47b4568cc771f97fe691c3b58e16eabf3b48110f6f

kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359

kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359

kernel-debug-devel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: b8d16352b3302d2d3961a21747417867df72925edb1f85fbe090688178af99cd

kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76

kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76

kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885

kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885

kernel-devel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: cd3e046ad803e953941f89bfb4e83bcd6d6654b34fccf47da5f0f5de1b11fba0

kernel-doc-3.10.0-1062.70.1.el7.noarch.rpm

SHA-256: 0dfe02298921afaba7714d548a86dfe68990431d721f116923b6ea1154d90bfb

kernel-headers-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 773d521441e44c40bf1cb6b3e6b0d7489f6265b1519f433accdf86b1ffb65a50

kernel-tools-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: f45c868db8bdedead1e1ea424fd9c9a47ce9ebe19a00feab8731726c5d212501

kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a

kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a

kernel-tools-libs-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: e2ec2549af5db38d84e1dcfcf17df5c1a2e6276eb8f80ceb0b2ce296d0cb90fa

kernel-tools-libs-devel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: c2aec475c27f022021c696f8f68d17efa030cd2eee93c81ca9405e3061b9b79c

perf-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: c362c809e53518fd9e3a98cf453a8a25f63962160eb49a2d8e8438b34f97eb26

perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a

perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a

python-perf-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: a9980c4d7bb862c998f0956527cd1d44ee47124acb0ab4c11554ae8901e9311c

python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6

python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6

Red Hat Enterprise Linux Server - TUS 7.7

SRPM

kernel-3.10.0-1062.70.1.el7.src.rpm

SHA-256: 0c6c14387a205647ded22ea4936c1e493d03970ea79e9d0ac6323baa2f9eebba

x86_64

bpftool-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: c81752fd7b93c9306ba4916ca586967fb7317238ed0f6afe638bd2da864a3d69

bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa

bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa

kernel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: fc9ec0ba8b2adb8dee8417a1d6ad3095ca090a618e5b5c32be7852c8d19a987e

kernel-abi-whitelists-3.10.0-1062.70.1.el7.noarch.rpm

SHA-256: fb14c65c8e3ca3ae4a546407a575354753e91ca61f68f0a6626f108449eb18ca

kernel-debug-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 912663058afe41c3d418ee47b4568cc771f97fe691c3b58e16eabf3b48110f6f

kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359

kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359

kernel-debug-devel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: b8d16352b3302d2d3961a21747417867df72925edb1f85fbe090688178af99cd

kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76

kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76

kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885

kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885

kernel-devel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: cd3e046ad803e953941f89bfb4e83bcd6d6654b34fccf47da5f0f5de1b11fba0

kernel-doc-3.10.0-1062.70.1.el7.noarch.rpm

SHA-256: 0dfe02298921afaba7714d548a86dfe68990431d721f116923b6ea1154d90bfb

kernel-headers-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 773d521441e44c40bf1cb6b3e6b0d7489f6265b1519f433accdf86b1ffb65a50

kernel-tools-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: f45c868db8bdedead1e1ea424fd9c9a47ce9ebe19a00feab8731726c5d212501

kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a

kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a

kernel-tools-libs-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: e2ec2549af5db38d84e1dcfcf17df5c1a2e6276eb8f80ceb0b2ce296d0cb90fa

kernel-tools-libs-devel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: c2aec475c27f022021c696f8f68d17efa030cd2eee93c81ca9405e3061b9b79c

perf-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: c362c809e53518fd9e3a98cf453a8a25f63962160eb49a2d8e8438b34f97eb26

perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a

perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a

python-perf-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: a9980c4d7bb862c998f0956527cd1d44ee47124acb0ab4c11554ae8901e9311c

python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6

python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.70.1.el7.src.rpm

SHA-256: 0c6c14387a205647ded22ea4936c1e493d03970ea79e9d0ac6323baa2f9eebba

ppc64le

bpftool-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: c191c6cec76dab0d29fb09a8af57da0f903aa81a007d4afc722750621f8fd451

bpftool-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: e685505864f91dee7e2656af0fb3e88667bc3deeb6afc628ead571d0132deb8e

bpftool-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: e685505864f91dee7e2656af0fb3e88667bc3deeb6afc628ead571d0132deb8e

kernel-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 7fa65bc69da405ed79bfb51a68cff3d52a48bfbb61efce8797948a2aac9894ad

kernel-abi-whitelists-3.10.0-1062.70.1.el7.noarch.rpm

SHA-256: fb14c65c8e3ca3ae4a546407a575354753e91ca61f68f0a6626f108449eb18ca

kernel-bootwrapper-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 530742a3807be032182d2c48d962d60809bed23e5d39a4bc668cba5e54feaa1c

kernel-debug-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 98eec0d63f5ca00055e1594dbecbc22d1e19cac1f830a0810dfbdf39db0ce604

kernel-debug-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 6dd6b017d01ecca953231169e3d0df47e70dd5c3d7fcd20748d6b6f1550c00c2

kernel-debug-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 6dd6b017d01ecca953231169e3d0df47e70dd5c3d7fcd20748d6b6f1550c00c2

kernel-debug-devel-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 6b2cbec98d66099f446f1ed179838222e5f88b62da88d7bb6238ad18b0104a7a

kernel-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: ab91594e2e388e63b3c20b4805961b5dd24388595fb5121cd0569d3c29a31db1

kernel-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: ab91594e2e388e63b3c20b4805961b5dd24388595fb5121cd0569d3c29a31db1

kernel-debuginfo-common-ppc64le-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: e31e72b9ea60800133afd822e960bde8cb34788e2bcee0e2f0c9f721efbfcbed

kernel-debuginfo-common-ppc64le-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: e31e72b9ea60800133afd822e960bde8cb34788e2bcee0e2f0c9f721efbfcbed

kernel-devel-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: c5e4bb1ebd6a870d474403d9b9ea0916c645c4a2c91729a61f5a116b66809088

kernel-doc-3.10.0-1062.70.1.el7.noarch.rpm

SHA-256: 0dfe02298921afaba7714d548a86dfe68990431d721f116923b6ea1154d90bfb

kernel-headers-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: ff796eb86a421637435f74e1fe10de2408b5302a51b10b4ff513012c8b97c51d

kernel-tools-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 200c0315b6576199d8d7bdf922e93978dc91b804d9d416be5bd58c9d364d8ba3

kernel-tools-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 34f0a85fc94e5b9e67534e6b412a206756cf3cf90813195d8c660eb0d32284f8

kernel-tools-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 34f0a85fc94e5b9e67534e6b412a206756cf3cf90813195d8c660eb0d32284f8

kernel-tools-libs-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 076d6e64f4eb8a30ffa247b1c4dce9aa65a584c85f2e1aff433f2415812edf28

kernel-tools-libs-devel-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 3dbb82883d3c38bfeae9c41655c41567713603846914a34760090622e3168c96

perf-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 82042d8f1a20d523cbc90ab52cb178a06a8bb8619c36c6a7da4687458bc5e59f

perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: d03e12b7993d40cc54631cbfccefebf7cb244aa86fea49c044f37dca157a8d0e

perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: d03e12b7993d40cc54631cbfccefebf7cb244aa86fea49c044f37dca157a8d0e

python-perf-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 35361e6532818523fd16aa1555035b5c09419b0753b78ce2776d42308d250a2c

python-perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 0e628ffef029ffce5629c8aae3f7f11679d9c46be2d85bcbc6bdc669a6e317a4

python-perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm

SHA-256: 0e628ffef029ffce5629c8aae3f7f11679d9c46be2d85bcbc6bdc669a6e317a4

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.70.1.el7.src.rpm

SHA-256: 0c6c14387a205647ded22ea4936c1e493d03970ea79e9d0ac6323baa2f9eebba

x86_64

bpftool-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: c81752fd7b93c9306ba4916ca586967fb7317238ed0f6afe638bd2da864a3d69

bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa

bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 0279a074ac870a056fc094a1302c4c3b4a9e14c5af2dacf02e7759c93879e3aa

kernel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: fc9ec0ba8b2adb8dee8417a1d6ad3095ca090a618e5b5c32be7852c8d19a987e

kernel-abi-whitelists-3.10.0-1062.70.1.el7.noarch.rpm

SHA-256: fb14c65c8e3ca3ae4a546407a575354753e91ca61f68f0a6626f108449eb18ca

kernel-debug-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 912663058afe41c3d418ee47b4568cc771f97fe691c3b58e16eabf3b48110f6f

kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359

kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 8d64fd20c4414a06d1f5f4c0f09853b234582d136ad94d19598fff3c4c7a8359

kernel-debug-devel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: b8d16352b3302d2d3961a21747417867df72925edb1f85fbe090688178af99cd

kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76

kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 18069ef9b25e155d4be0012408181223ba509cfd78a3a3ca8ab17b7e326eca76

kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885

kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4221e3edcf1ee82f89e3bf70158969e575baf9fc6ef4f0f8c537a6535169e885

kernel-devel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: cd3e046ad803e953941f89bfb4e83bcd6d6654b34fccf47da5f0f5de1b11fba0

kernel-doc-3.10.0-1062.70.1.el7.noarch.rpm

SHA-256: 0dfe02298921afaba7714d548a86dfe68990431d721f116923b6ea1154d90bfb

kernel-headers-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 773d521441e44c40bf1cb6b3e6b0d7489f6265b1519f433accdf86b1ffb65a50

kernel-tools-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: f45c868db8bdedead1e1ea424fd9c9a47ce9ebe19a00feab8731726c5d212501

kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a

kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 4c812904ae2411c8e5a35f4ad6af360b1256228bac3a73eb5c3092748964ee9a

kernel-tools-libs-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: e2ec2549af5db38d84e1dcfcf17df5c1a2e6276eb8f80ceb0b2ce296d0cb90fa

kernel-tools-libs-devel-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: c2aec475c27f022021c696f8f68d17efa030cd2eee93c81ca9405e3061b9b79c

perf-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: c362c809e53518fd9e3a98cf453a8a25f63962160eb49a2d8e8438b34f97eb26

perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a

perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: 1b7042eb4d3bfd4e8072536c3e6e15bed54761e57ccaa0782be9dd115d5ce36a

python-perf-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: a9980c4d7bb862c998f0956527cd1d44ee47124acb0ab4c11554ae8901e9311c

python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6

python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm

SHA-256: aeea8aecf3a55f9bad64f1c80ab6c4de57c470389650f940957974c88a5f54f6

Related news

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Ubuntu Security Notice USN-5650-1

Ubuntu Security Notice 5650-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2022-6432-01

Red Hat Security Advisory 2022-6432-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:6432: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

RHSA-2022:6053: Red Hat Security Advisory: OpenShift Container Platform 4.7.56 security and bug fix update

Red Hat OpenShift Container Platform release 4.7.56 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

RHSA-2022:5806: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

Red Hat Security Advisory 2022-5626-01

Red Hat Security Advisory 2022-5626-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5564-01

Red Hat Security Advisory 2022-5564-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2022-5249-01

Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5236-01

Red Hat Security Advisory 2022-5236-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...