Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:0944: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-4378: A stack overflow flaw was found in the Linux kernel’s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Red Hat Security Data
#vulnerability#linux#red_hat#sap

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64
  • Red Hat Enterprise Linux Server - TUS 7.7 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64

Fixes

  • BZ - 2152548 - CVE-2022-4378 kernel: stack overflow in do_proc_dointvec and proc_skip_spaces

Red Hat Enterprise Linux Server - AUS 7.7

SRPM

kernel-3.10.0-1062.71.1.el7.src.rpm

SHA-256: 8b06915fbce831efabb5876a0c996b11a12da68e6cd714d1bae29f47af1f5300

x86_64

bpftool-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: a0bc457d39ddb0fbc8558f2497b9e80f501682bf357c0893d92955cc2c78bcf3

bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9

bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9

kernel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: d9e337e2d21a7eb86c9f5be92e7b93049fe00d6ed16c34ad6f9258c39565744a

kernel-abi-whitelists-3.10.0-1062.71.1.el7.noarch.rpm

SHA-256: 30bc1363972b6617596836c0bcc239a31c150b11273d1e68d6611e25adfe18b2

kernel-debug-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: c5eee5c6f8d9509cebd94117f1d40090f8b2175a52bd21a4601910d0d35edcd3

kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2

kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2

kernel-debug-devel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 9894f39843aac824b888580b3a7abf741549029de6e8d2b18ed781e0a1512d5c

kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace

kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace

kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9

kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9

kernel-devel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: f57d234a457c1268e91cae3aaa76ee61b78f6ddd5e7d9ba12d7f315b774349e7

kernel-doc-3.10.0-1062.71.1.el7.noarch.rpm

SHA-256: 81d17e1df7a02d8ddec5e878265ab400e1eefc5f9270284d1dedc2a33757ee54

kernel-headers-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: badabd4b20d2af2b9c273436bfdbd7712a5dc397f5e278b1352e89761d54beab

kernel-tools-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 080640a16700c776c6a987ed07b4f636736961917917fe1de5f389561e4149d0

kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5

kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5

kernel-tools-libs-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: ddb0b2cef506c8e67415ce1d94374f5313ca7a4d98c1865aae8ed8390d985d8d

kernel-tools-libs-devel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 9048e5a9e72978da226daffbd8094f17f0372ba2aec61ed3735a164f54f7aae4

perf-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 91d82ff9558404363effbb9e85e106438c23f008042cc0c4c668823244d6ae05

perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041

perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041

python-perf-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 02b80b8ceb5fa7a017706484ef80d23df323b0dc7c446e4c9bb351c5f06fe494

python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa

python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa

Red Hat Enterprise Linux Server - TUS 7.7

SRPM

kernel-3.10.0-1062.71.1.el7.src.rpm

SHA-256: 8b06915fbce831efabb5876a0c996b11a12da68e6cd714d1bae29f47af1f5300

x86_64

bpftool-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: a0bc457d39ddb0fbc8558f2497b9e80f501682bf357c0893d92955cc2c78bcf3

bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9

bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9

kernel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: d9e337e2d21a7eb86c9f5be92e7b93049fe00d6ed16c34ad6f9258c39565744a

kernel-abi-whitelists-3.10.0-1062.71.1.el7.noarch.rpm

SHA-256: 30bc1363972b6617596836c0bcc239a31c150b11273d1e68d6611e25adfe18b2

kernel-debug-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: c5eee5c6f8d9509cebd94117f1d40090f8b2175a52bd21a4601910d0d35edcd3

kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2

kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2

kernel-debug-devel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 9894f39843aac824b888580b3a7abf741549029de6e8d2b18ed781e0a1512d5c

kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace

kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace

kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9

kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9

kernel-devel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: f57d234a457c1268e91cae3aaa76ee61b78f6ddd5e7d9ba12d7f315b774349e7

kernel-doc-3.10.0-1062.71.1.el7.noarch.rpm

SHA-256: 81d17e1df7a02d8ddec5e878265ab400e1eefc5f9270284d1dedc2a33757ee54

kernel-headers-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: badabd4b20d2af2b9c273436bfdbd7712a5dc397f5e278b1352e89761d54beab

kernel-tools-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 080640a16700c776c6a987ed07b4f636736961917917fe1de5f389561e4149d0

kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5

kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5

kernel-tools-libs-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: ddb0b2cef506c8e67415ce1d94374f5313ca7a4d98c1865aae8ed8390d985d8d

kernel-tools-libs-devel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 9048e5a9e72978da226daffbd8094f17f0372ba2aec61ed3735a164f54f7aae4

perf-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 91d82ff9558404363effbb9e85e106438c23f008042cc0c4c668823244d6ae05

perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041

perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041

python-perf-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 02b80b8ceb5fa7a017706484ef80d23df323b0dc7c446e4c9bb351c5f06fe494

python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa

python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.71.1.el7.src.rpm

SHA-256: 8b06915fbce831efabb5876a0c996b11a12da68e6cd714d1bae29f47af1f5300

ppc64le

bpftool-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 659cd0fa41c6d590e30419b7fba1d8b6d2ec8892c77697eb6f5ed9cc36bc35cd

bpftool-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 17dee49622829637ef946446f8e3414d5ee699813f6604bf953f5a2c839c7b53

bpftool-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 17dee49622829637ef946446f8e3414d5ee699813f6604bf953f5a2c839c7b53

kernel-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: e68eb46b730f1fce7f8b0eaf37ff3ea4704f798a37b649a64ee92d8e1ff0f476

kernel-abi-whitelists-3.10.0-1062.71.1.el7.noarch.rpm

SHA-256: 30bc1363972b6617596836c0bcc239a31c150b11273d1e68d6611e25adfe18b2

kernel-bootwrapper-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 4f6e12fdbc5cf9555bc054a1ba240fb35a3fbf7adaf0d09bd554f75bcdade55c

kernel-debug-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 51c711276c9b4f3d98105a12843f311590971598b9373203784526f7dd4de9dc

kernel-debug-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: dfa92ab0bf0dabbe93c3f177efdecdaac8f9e58f4d7ad6b588c1f0dbe0e3d9aa

kernel-debug-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: dfa92ab0bf0dabbe93c3f177efdecdaac8f9e58f4d7ad6b588c1f0dbe0e3d9aa

kernel-debug-devel-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 5b0b820ab2a92a63b005ce2d95d0a398e46e03c15999ce6453274354f43c4886

kernel-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 3fbabdc52ca42c75bdecdee0711b1e7da8ea88efc7978db3e2a7ba26b8b26075

kernel-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 3fbabdc52ca42c75bdecdee0711b1e7da8ea88efc7978db3e2a7ba26b8b26075

kernel-debuginfo-common-ppc64le-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: ac549072c4027ca36063dece63bf66b16c6910b8aa39f7527e4be10cc2a56396

kernel-debuginfo-common-ppc64le-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: ac549072c4027ca36063dece63bf66b16c6910b8aa39f7527e4be10cc2a56396

kernel-devel-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: f93ecbaf2e6e511c0453b56dd5cdd2e89b06e0d7158e62ebe2c3a65670112512

kernel-doc-3.10.0-1062.71.1.el7.noarch.rpm

SHA-256: 81d17e1df7a02d8ddec5e878265ab400e1eefc5f9270284d1dedc2a33757ee54

kernel-headers-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: efaa6ddc36e24251fc2bf2319478c594ef77f2db1ef110d6cc532b31263f1f43

kernel-tools-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 342f65a14c1b6fd285acc0d57d8ccf5da0cbd3ebc09cb14887d023bede01ebb9

kernel-tools-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: be00aca0aed1b7288752a81e934f7c6850b393102e0dedaeb81a3885f2af073c

kernel-tools-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: be00aca0aed1b7288752a81e934f7c6850b393102e0dedaeb81a3885f2af073c

kernel-tools-libs-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 6b3083d5c2ea77b64c6586909aa9be942b9870c92a65cd15f012577915612512

kernel-tools-libs-devel-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 2777497449b6e34640f750f1d5360b579be6a565e5d57d47a4180d51e426c49b

perf-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 762a32a3eff4b537198c062af4740d2715ecca4f970e321cc378d6847dab8c0a

perf-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 0dcddc541b7c2cd4d836bd123a2d7f5bdf943377943e19825bffbc7c0e1c600a

perf-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 0dcddc541b7c2cd4d836bd123a2d7f5bdf943377943e19825bffbc7c0e1c600a

python-perf-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 9ccc8cdade9c28fb52a940a774e557a81342172b3f8e64d06d0f64bdf72b2017

python-perf-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 5f6616499d04b5dc749a719eacce7305402b6e7aced024fe7fd33e30a706dc02

python-perf-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm

SHA-256: 5f6616499d04b5dc749a719eacce7305402b6e7aced024fe7fd33e30a706dc02

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7

SRPM

kernel-3.10.0-1062.71.1.el7.src.rpm

SHA-256: 8b06915fbce831efabb5876a0c996b11a12da68e6cd714d1bae29f47af1f5300

x86_64

bpftool-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: a0bc457d39ddb0fbc8558f2497b9e80f501682bf357c0893d92955cc2c78bcf3

bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9

bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9

kernel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: d9e337e2d21a7eb86c9f5be92e7b93049fe00d6ed16c34ad6f9258c39565744a

kernel-abi-whitelists-3.10.0-1062.71.1.el7.noarch.rpm

SHA-256: 30bc1363972b6617596836c0bcc239a31c150b11273d1e68d6611e25adfe18b2

kernel-debug-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: c5eee5c6f8d9509cebd94117f1d40090f8b2175a52bd21a4601910d0d35edcd3

kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2

kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2

kernel-debug-devel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 9894f39843aac824b888580b3a7abf741549029de6e8d2b18ed781e0a1512d5c

kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace

kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace

kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9

kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9

kernel-devel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: f57d234a457c1268e91cae3aaa76ee61b78f6ddd5e7d9ba12d7f315b774349e7

kernel-doc-3.10.0-1062.71.1.el7.noarch.rpm

SHA-256: 81d17e1df7a02d8ddec5e878265ab400e1eefc5f9270284d1dedc2a33757ee54

kernel-headers-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: badabd4b20d2af2b9c273436bfdbd7712a5dc397f5e278b1352e89761d54beab

kernel-tools-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 080640a16700c776c6a987ed07b4f636736961917917fe1de5f389561e4149d0

kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5

kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5

kernel-tools-libs-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: ddb0b2cef506c8e67415ce1d94374f5313ca7a4d98c1865aae8ed8390d985d8d

kernel-tools-libs-devel-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 9048e5a9e72978da226daffbd8094f17f0372ba2aec61ed3735a164f54f7aae4

perf-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 91d82ff9558404363effbb9e85e106438c23f008042cc0c4c668823244d6ae05

perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041

perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041

python-perf-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: 02b80b8ceb5fa7a017706484ef80d23df323b0dc7c446e4c9bb351c5f06fe494

python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa

python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm

SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa

Related news

CVE-2023-1476

A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.

Red Hat Security Advisory 2023-3491-01

Red Hat Security Advisory 2023-3491-01 - An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-3388-01

Red Hat Security Advisory 2023-3388-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass and use-after-free vulnerabilities.

RHSA-2023:1953: Red Hat Security Advisory: Logging Subsystem 5.6.5 - Red Hat OpenShift security update

Logging Subsystem 5.6.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-27539: A denial of service vulnerability was found in rubygem-rack in how it parses headers. A carefully crafted input can cause header parsing to take an unexpected amount of time, possibly resulting in a denial of service. * CVE-2023-28120: A Cross-Site-Scripting vulnerability was found in rubygem ActiveSupport. If the new bytesplice method is called on a SafeBuffer with untrus...

Red Hat Security Advisory 2023-1659-01

Red Hat Security Advisory 2023-1659-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

RHSA-2023:1584: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...

RHSA-2023:1392: Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update

Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled docume...

Red Hat Security Advisory 2023-1251-01

Red Hat Security Advisory 2023-1251-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-1203-01

Red Hat Security Advisory 2023-1203-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.

RHSA-2023:1221: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was found ...

Red Hat Security Advisory 2023-1109-01

Red Hat Security Advisory 2023-1109-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.

Red Hat Security Advisory 2023-1091-01

Red Hat Security Advisory 2023-1091-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

RHSA-2023:1110: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

RHSA-2023:1092: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2022-42703: A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c ...

Ubuntu Security Notice USN-5920-1

Ubuntu Security Notice 5920-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5919-1

Ubuntu Security Notice 5919-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.

Red Hat Security Advisory 2023-1008-01

Red Hat Security Advisory 2023-1008-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-0945-01

Red Hat Security Advisory 2023-0945-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

RHSA-2023:0951: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetoo...

RHSA-2023:0945: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Ubuntu Security Notice USN-5883-1

Ubuntu Security Notice 5883-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-0856-01

Red Hat Security Advisory 2023-0856-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-0858-01

Red Hat Security Advisory 2023-0858-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

RHSA-2023:0856: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in ho...

Ubuntu Security Notice USN-5877-1

Ubuntu Security Notice 5877-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5860-1

Ubuntu Security Notice 5860-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5832-1

Ubuntu Security Notice 5832-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5809-1

Ubuntu Security Notice 5809-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5803-1

Ubuntu Security Notice 5803-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamas Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.