Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5232: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
  • CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Red Hat Security Data
#vulnerability#linux#red_hat#ibm

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
  • kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • XFS inode cluster corruption (BZ#2050464)
  • sock: sock_dequeue_err_skb() needs hard irq safety (BZ#2070408)
  • libceph: fix potential use-after-free on linger ping and resends (BZ#2088025)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Virtualization Host 4 for RHEL 7 x86_64

Fixes

  • BZ - 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation
  • BZ - 2092427 - CVE-2022-1966 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

Red Hat Enterprise Linux Server 7

SRPM

kernel-3.10.0-1160.71.1.el7.src.rpm

SHA-256: 37020eb55c26d2d476c5acdf813f755bcdde8d1540af5d2410f0bb68ebb4d65b

x86_64

bpftool-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 5df2f1bf9f6a4bf95fbb72d589ca040a1c45f11deabe9e045debccdb990c4d0d

bpftool-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: bef30bfcb93886f76e17858300e2112135843f402eb349d9264630e24aa9a522

bpftool-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: bef30bfcb93886f76e17858300e2112135843f402eb349d9264630e24aa9a522

kernel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 616bba6870435f5e432901eff5fb886aa2c3422103622c1cc9e9e38dc4a1d99c

kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 8ca063d57675719f54b675041ad63e0fd8d4012c04a5e0bed926b0f29806e758

kernel-debug-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: a13f437acd4237be9c0c39f7b3fe71ccfe25b0f8b747d0d71c892d6c97c24d92

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: dc83cdc5537a59f91f9ab3f9d720d0c6931462d7d97fea1c61a8f227db43366d

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: dc83cdc5537a59f91f9ab3f9d720d0c6931462d7d97fea1c61a8f227db43366d

kernel-debug-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 79865b52e229ec22278978c511e98108ff3ef18b9308d6f66bfa372eb1299ba9

kernel-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 4805ee612e84e131887b27292672975de80db0130b4d0a9365ad457112bf8054

kernel-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 4805ee612e84e131887b27292672975de80db0130b4d0a9365ad457112bf8054

kernel-debuginfo-common-x86_64-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7d23c57b26f55491917d3b5be61662647a571ab54d5b4647ab99f6ae84224f4c

kernel-debuginfo-common-x86_64-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7d23c57b26f55491917d3b5be61662647a571ab54d5b4647ab99f6ae84224f4c

kernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 79eaae7e725fe3cbb14c6029adaf96cf49400c4b7c2b134f12a3ac0b6e017995

kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 492e0ea85cd4a112f450b74e0da5e385b00aef992f78c8f8093672edb437fe7f

kernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 71e2db5d918b71b891aaf1fc5bda40c4e2490010010544a0914c393bd94bfa0b

kernel-tools-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 1c8660c866653f9262c1fce1f724edfc9cf5f713035e5240a0cdd09a8859d6ac

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: e054c06c83d46325e9331e6aa20e879a4d3ef501bde92bc73c22a522163be380

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: e054c06c83d46325e9331e6aa20e879a4d3ef501bde92bc73c22a522163be380

kernel-tools-libs-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 1fdc1b28c3971fd78a1c24a17a76d3244410c21aefde0cf0adef476492736edd

kernel-tools-libs-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 557b4c6a5a892a1e63f599ba27cba5db4469f940f61a7c1db09c7e910e48d708

perf-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 88952335dd5a75512a81e0d49d4cf538aff406290c2d1e3b66e7c2c2967b0422

perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 66c54dc4f210680642433a0f4401b5b4bcfdaa5eec518d66dae847777ba4f1c1

perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 66c54dc4f210680642433a0f4401b5b4bcfdaa5eec518d66dae847777ba4f1c1

python-perf-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 53a3f7a590aa55d53016547ad73ae00545c1b4bc6de9f442bb15244d61831675

python-perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7ff7cbf1ae4a91ee36d2cf2ebfcd3905479d7c577266f7fa9ee76332726e81ae

python-perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7ff7cbf1ae4a91ee36d2cf2ebfcd3905479d7c577266f7fa9ee76332726e81ae

Red Hat Enterprise Linux Workstation 7

SRPM

kernel-3.10.0-1160.71.1.el7.src.rpm

SHA-256: 37020eb55c26d2d476c5acdf813f755bcdde8d1540af5d2410f0bb68ebb4d65b

x86_64

bpftool-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 5df2f1bf9f6a4bf95fbb72d589ca040a1c45f11deabe9e045debccdb990c4d0d

bpftool-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: bef30bfcb93886f76e17858300e2112135843f402eb349d9264630e24aa9a522

bpftool-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: bef30bfcb93886f76e17858300e2112135843f402eb349d9264630e24aa9a522

kernel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 616bba6870435f5e432901eff5fb886aa2c3422103622c1cc9e9e38dc4a1d99c

kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 8ca063d57675719f54b675041ad63e0fd8d4012c04a5e0bed926b0f29806e758

kernel-debug-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: a13f437acd4237be9c0c39f7b3fe71ccfe25b0f8b747d0d71c892d6c97c24d92

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: dc83cdc5537a59f91f9ab3f9d720d0c6931462d7d97fea1c61a8f227db43366d

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: dc83cdc5537a59f91f9ab3f9d720d0c6931462d7d97fea1c61a8f227db43366d

kernel-debug-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 79865b52e229ec22278978c511e98108ff3ef18b9308d6f66bfa372eb1299ba9

kernel-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 4805ee612e84e131887b27292672975de80db0130b4d0a9365ad457112bf8054

kernel-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 4805ee612e84e131887b27292672975de80db0130b4d0a9365ad457112bf8054

kernel-debuginfo-common-x86_64-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7d23c57b26f55491917d3b5be61662647a571ab54d5b4647ab99f6ae84224f4c

kernel-debuginfo-common-x86_64-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7d23c57b26f55491917d3b5be61662647a571ab54d5b4647ab99f6ae84224f4c

kernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 79eaae7e725fe3cbb14c6029adaf96cf49400c4b7c2b134f12a3ac0b6e017995

kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 492e0ea85cd4a112f450b74e0da5e385b00aef992f78c8f8093672edb437fe7f

kernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 71e2db5d918b71b891aaf1fc5bda40c4e2490010010544a0914c393bd94bfa0b

kernel-tools-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 1c8660c866653f9262c1fce1f724edfc9cf5f713035e5240a0cdd09a8859d6ac

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: e054c06c83d46325e9331e6aa20e879a4d3ef501bde92bc73c22a522163be380

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: e054c06c83d46325e9331e6aa20e879a4d3ef501bde92bc73c22a522163be380

kernel-tools-libs-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 1fdc1b28c3971fd78a1c24a17a76d3244410c21aefde0cf0adef476492736edd

kernel-tools-libs-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 557b4c6a5a892a1e63f599ba27cba5db4469f940f61a7c1db09c7e910e48d708

perf-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 88952335dd5a75512a81e0d49d4cf538aff406290c2d1e3b66e7c2c2967b0422

perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 66c54dc4f210680642433a0f4401b5b4bcfdaa5eec518d66dae847777ba4f1c1

perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 66c54dc4f210680642433a0f4401b5b4bcfdaa5eec518d66dae847777ba4f1c1

python-perf-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 53a3f7a590aa55d53016547ad73ae00545c1b4bc6de9f442bb15244d61831675

python-perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7ff7cbf1ae4a91ee36d2cf2ebfcd3905479d7c577266f7fa9ee76332726e81ae

python-perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7ff7cbf1ae4a91ee36d2cf2ebfcd3905479d7c577266f7fa9ee76332726e81ae

Red Hat Enterprise Linux Desktop 7

SRPM

kernel-3.10.0-1160.71.1.el7.src.rpm

SHA-256: 37020eb55c26d2d476c5acdf813f755bcdde8d1540af5d2410f0bb68ebb4d65b

x86_64

bpftool-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 5df2f1bf9f6a4bf95fbb72d589ca040a1c45f11deabe9e045debccdb990c4d0d

bpftool-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: bef30bfcb93886f76e17858300e2112135843f402eb349d9264630e24aa9a522

bpftool-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: bef30bfcb93886f76e17858300e2112135843f402eb349d9264630e24aa9a522

kernel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 616bba6870435f5e432901eff5fb886aa2c3422103622c1cc9e9e38dc4a1d99c

kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 8ca063d57675719f54b675041ad63e0fd8d4012c04a5e0bed926b0f29806e758

kernel-debug-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: a13f437acd4237be9c0c39f7b3fe71ccfe25b0f8b747d0d71c892d6c97c24d92

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: dc83cdc5537a59f91f9ab3f9d720d0c6931462d7d97fea1c61a8f227db43366d

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: dc83cdc5537a59f91f9ab3f9d720d0c6931462d7d97fea1c61a8f227db43366d

kernel-debug-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 79865b52e229ec22278978c511e98108ff3ef18b9308d6f66bfa372eb1299ba9

kernel-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 4805ee612e84e131887b27292672975de80db0130b4d0a9365ad457112bf8054

kernel-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 4805ee612e84e131887b27292672975de80db0130b4d0a9365ad457112bf8054

kernel-debuginfo-common-x86_64-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7d23c57b26f55491917d3b5be61662647a571ab54d5b4647ab99f6ae84224f4c

kernel-debuginfo-common-x86_64-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7d23c57b26f55491917d3b5be61662647a571ab54d5b4647ab99f6ae84224f4c

kernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 79eaae7e725fe3cbb14c6029adaf96cf49400c4b7c2b134f12a3ac0b6e017995

kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 492e0ea85cd4a112f450b74e0da5e385b00aef992f78c8f8093672edb437fe7f

kernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 71e2db5d918b71b891aaf1fc5bda40c4e2490010010544a0914c393bd94bfa0b

kernel-tools-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 1c8660c866653f9262c1fce1f724edfc9cf5f713035e5240a0cdd09a8859d6ac

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: e054c06c83d46325e9331e6aa20e879a4d3ef501bde92bc73c22a522163be380

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: e054c06c83d46325e9331e6aa20e879a4d3ef501bde92bc73c22a522163be380

kernel-tools-libs-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 1fdc1b28c3971fd78a1c24a17a76d3244410c21aefde0cf0adef476492736edd

kernel-tools-libs-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 557b4c6a5a892a1e63f599ba27cba5db4469f940f61a7c1db09c7e910e48d708

perf-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 88952335dd5a75512a81e0d49d4cf538aff406290c2d1e3b66e7c2c2967b0422

perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 66c54dc4f210680642433a0f4401b5b4bcfdaa5eec518d66dae847777ba4f1c1

perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 66c54dc4f210680642433a0f4401b5b4bcfdaa5eec518d66dae847777ba4f1c1

python-perf-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 53a3f7a590aa55d53016547ad73ae00545c1b4bc6de9f442bb15244d61831675

python-perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7ff7cbf1ae4a91ee36d2cf2ebfcd3905479d7c577266f7fa9ee76332726e81ae

python-perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7ff7cbf1ae4a91ee36d2cf2ebfcd3905479d7c577266f7fa9ee76332726e81ae

Red Hat Enterprise Linux for IBM z Systems 7

SRPM

kernel-3.10.0-1160.71.1.el7.src.rpm

SHA-256: 37020eb55c26d2d476c5acdf813f755bcdde8d1540af5d2410f0bb68ebb4d65b

s390x

bpftool-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: e2f725a6b8dca66e1d9dc4f0c0dfaf7938729c913d34ced159a348c10133cea6

bpftool-debuginfo-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: 14904bca4cde1c63355138dcb5df0e719c812c645293f483ebae1c6021da0546

kernel-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: c9f9cc38e8c683acbe768fc4c21b0ac74f5c6083ab7796953dbdbc0b365e4e41

kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 8ca063d57675719f54b675041ad63e0fd8d4012c04a5e0bed926b0f29806e758

kernel-debug-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: 69ca5d485301c5ab1fc2a03ed5a47fe504c03ef30cc7564f5ec895aa91292af5

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: b86b8c4ce485e3717e714a4204aeae72472049f18e6c60c23ca4cff76c696f09

kernel-debug-devel-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: b007a466cf7d81175cae477a5116cc9856f17f9c8e5506c84cce1c8986e0c847

kernel-debuginfo-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: ca0a9581eeb5d21d1e13e9732f2f80a02b1153ef08180056ab57860f57565180

kernel-debuginfo-common-s390x-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: 399d9e139c856ae916d7057d14f7320cd561fd1314d769f1c5b7ce8cf007b130

kernel-devel-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: 68a57b6e6d58e88d74c39a4ef2bda7c696adf03404fb19e5768a92088648906e

kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 492e0ea85cd4a112f450b74e0da5e385b00aef992f78c8f8093672edb437fe7f

kernel-headers-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: c5d60c031d6729ac3ce0ae0404903cacf795b7ac963019e29e394e722866bc34

kernel-kdump-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: a17226290f952b9620a31e0a9ac52fb8e76bea75acae03092f9d6b787a3bf3f4

kernel-kdump-debuginfo-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: 78f4bc09058b59b2ab412aba713035807bb36d20c358ae7d0eab7b1973fc423d

kernel-kdump-devel-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: 91e96b7bea6a9d450c4b7270e764c897955e7412349110c3324327d4f69d3c03

perf-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: 2964e549c3ee6631bd462c036748de804c496f13f2a0563cc4918624b3a4b093

perf-debuginfo-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: 1c0153a32b7630f2af72c3f72bad3a2c0de3cb3e8485442c36b3ccf87147f65c

python-perf-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: 2fbb26bccb5e446ff193ed3bc5e3b6c841c689e6b95c24e2b4d4c930eca0c349

python-perf-debuginfo-3.10.0-1160.71.1.el7.s390x.rpm

SHA-256: e832a3796b2aa0040ce5b67cbd3855336ee44e7e6154de7ffd7df2b4f561fba2

Red Hat Enterprise Linux for Power, big endian 7

SRPM

kernel-3.10.0-1160.71.1.el7.src.rpm

SHA-256: 37020eb55c26d2d476c5acdf813f755bcdde8d1540af5d2410f0bb68ebb4d65b

ppc64

bpftool-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 9c8470972f28284289260750e6ba82bdd1f800c7efaad7078e37eda33f9df40f

bpftool-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: e17f94d82ba3fba7b042d68d88772d6b915cd8ae1ef228a7f7e026d9556a5faa

bpftool-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: e17f94d82ba3fba7b042d68d88772d6b915cd8ae1ef228a7f7e026d9556a5faa

kernel-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 8c69eb11eb2aa2bb0d23316938b265402189200577e0e1f9dc40df4c706d3f41

kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 8ca063d57675719f54b675041ad63e0fd8d4012c04a5e0bed926b0f29806e758

kernel-bootwrapper-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: c7355d94c69bbfb29d6cfa2fb712d70e2f8dc63fa665b6b0ee2649525e29028d

kernel-debug-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: c88b69a076731b69ac41ad05ae77bb8ea8643854ab429fdf038accb1f62704f5

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 786adc53d8922ce8f7593f410c21a58b06780ac22a986706415c94eaa8e50df8

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 786adc53d8922ce8f7593f410c21a58b06780ac22a986706415c94eaa8e50df8

kernel-debug-devel-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 119bd2be0baa167113f4a6528bf15b4fddab2142594daff2c93fad5a5b6e00c6

kernel-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 62db046d728fb173d383125843d8fd5413add752ce4b3b8551e8d0ca1d9a8111

kernel-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 62db046d728fb173d383125843d8fd5413add752ce4b3b8551e8d0ca1d9a8111

kernel-debuginfo-common-ppc64-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: e39f89c4c226f0c69e1920d36913dd73a9b9b269dfc764fd962ce3d8fc2cb63c

kernel-debuginfo-common-ppc64-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: e39f89c4c226f0c69e1920d36913dd73a9b9b269dfc764fd962ce3d8fc2cb63c

kernel-devel-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: bdd59865988f01df3dda9bdf745e6f3aaa6a08ede52bc1089b4b0b06daa7c8c6

kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 492e0ea85cd4a112f450b74e0da5e385b00aef992f78c8f8093672edb437fe7f

kernel-headers-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: c9b1ad7f9fd8e6c1a5311b7f8a212b0fafa73f37aed195f5cc3a16fb25e6a2f9

kernel-tools-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 60a1bb23ce36b96195effb5dc061798fa1b4796da9bd6b2b235f9a17e3a25915

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 87f03bf8bc50793bb5d73d97be0dbfe690e54f2f313294757a5c3c908f33a438

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 87f03bf8bc50793bb5d73d97be0dbfe690e54f2f313294757a5c3c908f33a438

kernel-tools-libs-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: c4ea32136408503e2f28e1ad5aec6a97670150bbcee5e6ccf4111120132e5498

kernel-tools-libs-devel-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: ada0e29d6eba069258c1c1962770c57f1e1946990328a35db29e667c3c74a5af

perf-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: bfe6d9872c2fa860af23375e45574c040132d64786bed4b35a8cff978a827eca

perf-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 1547718037ce57ac76721901792f9bf2833ffcbb73a0940529f018c898a96f09

perf-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 1547718037ce57ac76721901792f9bf2833ffcbb73a0940529f018c898a96f09

python-perf-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: e543aa6aff990360ac3115dc9141495e702728330621e3fad9461cd391a2714c

python-perf-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 26312c287bda378911908c81f2081246dfb6953383f2ec3a68de265693e30b2c

python-perf-debuginfo-3.10.0-1160.71.1.el7.ppc64.rpm

SHA-256: 26312c287bda378911908c81f2081246dfb6953383f2ec3a68de265693e30b2c

Red Hat Enterprise Linux for Scientific Computing 7

SRPM

kernel-3.10.0-1160.71.1.el7.src.rpm

SHA-256: 37020eb55c26d2d476c5acdf813f755bcdde8d1540af5d2410f0bb68ebb4d65b

x86_64

bpftool-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 5df2f1bf9f6a4bf95fbb72d589ca040a1c45f11deabe9e045debccdb990c4d0d

bpftool-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: bef30bfcb93886f76e17858300e2112135843f402eb349d9264630e24aa9a522

bpftool-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: bef30bfcb93886f76e17858300e2112135843f402eb349d9264630e24aa9a522

kernel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 616bba6870435f5e432901eff5fb886aa2c3422103622c1cc9e9e38dc4a1d99c

kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 8ca063d57675719f54b675041ad63e0fd8d4012c04a5e0bed926b0f29806e758

kernel-debug-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: a13f437acd4237be9c0c39f7b3fe71ccfe25b0f8b747d0d71c892d6c97c24d92

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: dc83cdc5537a59f91f9ab3f9d720d0c6931462d7d97fea1c61a8f227db43366d

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: dc83cdc5537a59f91f9ab3f9d720d0c6931462d7d97fea1c61a8f227db43366d

kernel-debug-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 79865b52e229ec22278978c511e98108ff3ef18b9308d6f66bfa372eb1299ba9

kernel-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 4805ee612e84e131887b27292672975de80db0130b4d0a9365ad457112bf8054

kernel-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 4805ee612e84e131887b27292672975de80db0130b4d0a9365ad457112bf8054

kernel-debuginfo-common-x86_64-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7d23c57b26f55491917d3b5be61662647a571ab54d5b4647ab99f6ae84224f4c

kernel-debuginfo-common-x86_64-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7d23c57b26f55491917d3b5be61662647a571ab54d5b4647ab99f6ae84224f4c

kernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 79eaae7e725fe3cbb14c6029adaf96cf49400c4b7c2b134f12a3ac0b6e017995

kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 492e0ea85cd4a112f450b74e0da5e385b00aef992f78c8f8093672edb437fe7f

kernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 71e2db5d918b71b891aaf1fc5bda40c4e2490010010544a0914c393bd94bfa0b

kernel-tools-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 1c8660c866653f9262c1fce1f724edfc9cf5f713035e5240a0cdd09a8859d6ac

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: e054c06c83d46325e9331e6aa20e879a4d3ef501bde92bc73c22a522163be380

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: e054c06c83d46325e9331e6aa20e879a4d3ef501bde92bc73c22a522163be380

kernel-tools-libs-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 1fdc1b28c3971fd78a1c24a17a76d3244410c21aefde0cf0adef476492736edd

kernel-tools-libs-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 557b4c6a5a892a1e63f599ba27cba5db4469f940f61a7c1db09c7e910e48d708

perf-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 88952335dd5a75512a81e0d49d4cf538aff406290c2d1e3b66e7c2c2967b0422

perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 66c54dc4f210680642433a0f4401b5b4bcfdaa5eec518d66dae847777ba4f1c1

perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 66c54dc4f210680642433a0f4401b5b4bcfdaa5eec518d66dae847777ba4f1c1

python-perf-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 53a3f7a590aa55d53016547ad73ae00545c1b4bc6de9f442bb15244d61831675

python-perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7ff7cbf1ae4a91ee36d2cf2ebfcd3905479d7c577266f7fa9ee76332726e81ae

python-perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 7ff7cbf1ae4a91ee36d2cf2ebfcd3905479d7c577266f7fa9ee76332726e81ae

Red Hat Enterprise Linux for Power, little endian 7

SRPM

kernel-3.10.0-1160.71.1.el7.src.rpm

SHA-256: 37020eb55c26d2d476c5acdf813f755bcdde8d1540af5d2410f0bb68ebb4d65b

ppc64le

bpftool-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 986bda4ddb82034d37300457b3779e3bee572f9f4cab227d8391558b88b9d0df

bpftool-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 1c5f31e165194832a4ef61ebe895b6717171a803dcafaa8080d97eaf1352a6da

bpftool-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 1c5f31e165194832a4ef61ebe895b6717171a803dcafaa8080d97eaf1352a6da

kernel-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 74f4506ee37e18c7f07f597ada8358dde55d108aa825b48a3ccd8ea73b1759d9

kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 8ca063d57675719f54b675041ad63e0fd8d4012c04a5e0bed926b0f29806e758

kernel-bootwrapper-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 7d37c562c76e3bfc4791cb33058f1c5c81d175a9bcf8f747ff270fea9b4e017a

kernel-debug-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 7513398cbb6cb1ce1ccb5b929100f84a187e17e54a67d7361c57933f24553710

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: b49e408d0a14f089d9da118cb373890100e015aac72501c4388ff92bc668d83e

kernel-debug-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: b49e408d0a14f089d9da118cb373890100e015aac72501c4388ff92bc668d83e

kernel-debug-devel-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: fb4b731d2ac93371c0c979af33bc1fd5187aebc8ab464d03d758617627fc6bd9

kernel-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 8b619e5988ba9ef229355f051d0eaa1890e86825d38c1dd64ec5df6e9756e838

kernel-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 8b619e5988ba9ef229355f051d0eaa1890e86825d38c1dd64ec5df6e9756e838

kernel-debuginfo-common-ppc64le-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: e3280d8690fef7a172591b87cdbee5cc18db731ab9da5896d9f079362e09be64

kernel-debuginfo-common-ppc64le-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: e3280d8690fef7a172591b87cdbee5cc18db731ab9da5896d9f079362e09be64

kernel-devel-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 5123768198f3a8f54577d5d6c08ae8a1122e1301f8cd0c90783a416c041e77c8

kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm

SHA-256: 492e0ea85cd4a112f450b74e0da5e385b00aef992f78c8f8093672edb437fe7f

kernel-headers-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: b70b9535c26687b82ef6c36b8195024ebea5baef091d0f8bbb8447edfe5e2573

kernel-tools-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: e54ef8383f6b2991c3e9151d927ce0a6cb10a6bc44314465bb4ebbd2097d9add

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 8639f6b1345afd51a89661de5dc821322801cabdc184451e188aa4deadea1035

kernel-tools-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 8639f6b1345afd51a89661de5dc821322801cabdc184451e188aa4deadea1035

kernel-tools-libs-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: be652995552611f3bf49580b526a081d2298924d7aaa81b3459a9f8b332dd270

kernel-tools-libs-devel-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 30c52fb0ba5ffb01acf62c030d2eea0097418a0ec0690cf7f37b04d1022fffc5

perf-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: e1718fea9782de079462883f7aeb8448b299ffbba44ffd120263767f6b51766e

perf-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 8f6b5b4e034f64f838cba83e6bdab5625714fe865dfd3f00e3e3a48ac6fedc1e

perf-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 8f6b5b4e034f64f838cba83e6bdab5625714fe865dfd3f00e3e3a48ac6fedc1e

python-perf-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 691756b609e9e59a167ff78223150a8cb76203d7b0bc3dadd776acb409bffea4

python-perf-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 6dd19739f93102bde8a11022196966d04f750efe3b6d1c5e1ea93b7355d55a62

python-perf-debuginfo-3.10.0-1160.71.1.el7.ppc64le.rpm

SHA-256: 6dd19739f93102bde8a11022196966d04f750efe3b6d1c5e1ea93b7355d55a62

Red Hat Virtualization Host 4 for RHEL 7

SRPM

x86_64

kernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 79eaae7e725fe3cbb14c6029adaf96cf49400c4b7c2b134f12a3ac0b6e017995

kernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 71e2db5d918b71b891aaf1fc5bda40c4e2490010010544a0914c393bd94bfa0b

perf-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 88952335dd5a75512a81e0d49d4cf538aff406290c2d1e3b66e7c2c2967b0422

python-perf-3.10.0-1160.71.1.el7.x86_64.rpm

SHA-256: 53a3f7a590aa55d53016547ad73ae00545c1b4bc6de9f442bb15244d61831675

Related news

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Ubuntu Security Notice USN-5660-1

Ubuntu Security Notice 5660-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5647-1

Ubuntu Security Notice 5647-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5630-1

Ubuntu Security Notice 5630-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5616-1

Ubuntu Security Notice 5616-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Red Hat Security Advisory 2022-6432-01

Red Hat Security Advisory 2022-6432-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:6432: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

Ubuntu Security Notice USN-5599-1

Ubuntu Security Notice 5599-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Red Hat Security Advisory 2022-6271-01

Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6053-01

Red Hat Security Advisory 2022-6053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.56.

Ubuntu Security Notice USN-5560-2

Ubuntu Security Notice 5560-2 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5560-1

Ubuntu Security Notice 5560-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Red Hat Security Advisory 2022-5070-01

Red Hat Security Advisory 2022-5070-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include denial of service, out of bounds read, and traversal vulnerabilities.

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

RHSA-2022:5879: Red Hat Security Advisory: OpenShift Container Platform 4.9.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.9.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2403: openshift: oauth-serving-cert configmap contains cluster certificate private key

Red Hat Security Advisory 2022-5806-01

Red Hat Security Advisory 2022-5806-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:5806: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

Red Hat Security Advisory 2022-5564-01

Red Hat Security Advisory 2022-5564-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:5633: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...

RHSA-2022:5636: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5564: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

RHSA-2022:5565: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

Red Hat Security Advisory 2022-5439-01

Red Hat Security Advisory 2022-5439-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5476-01

Red Hat Security Advisory 2022-5476-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5439: Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.23

An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-25032: zlib: A flaw found in zlib when compressing (not decompressing) certain inputs * CVE-2022-1271: gzip: arbitrary-file-write vulnerability * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2...

RHSA-2022:5249: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overf...

Red Hat Security Advisory 2022-5232-01

Red Hat Security Advisory 2022-5232-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5216-01

Red Hat Security Advisory 2022-5216-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5220-01

Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5214-01

Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5236-01

Red Hat Security Advisory 2022-5236-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5220: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to priv...

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5236: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

Red Hat Security Advisory 2022-5157-01

Red Hat Security Advisory 2022-5157-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:5157: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

Kernel Live Patch Security Notice LSN-0087-1

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5471-1

Ubuntu Security Notice 5471-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5469-1

Ubuntu Security Notice 5469-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5468-1

Ubuntu Security Notice 5468-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5465-1

Ubuntu Security Notice 5465-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

CVE-2022-1966

A use-after-free vulnerability was found in the Linux kernel's Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.