Headline
RHSA-2023:0944: Red Hat Security Advisory: kernel security update
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-4378: A stack overflow flaw was found in the Linux kernel’s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Synopsis
Important: kernel security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
- Red Hat Enterprise Linux Server - TUS 7.7 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64
Fixes
- BZ - 2152548 - CVE-2022-4378 kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
Red Hat Enterprise Linux Server - AUS 7.7
SRPM
kernel-3.10.0-1062.71.1.el7.src.rpm
SHA-256: 8b06915fbce831efabb5876a0c996b11a12da68e6cd714d1bae29f47af1f5300
x86_64
bpftool-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: a0bc457d39ddb0fbc8558f2497b9e80f501682bf357c0893d92955cc2c78bcf3
bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9
bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9
kernel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: d9e337e2d21a7eb86c9f5be92e7b93049fe00d6ed16c34ad6f9258c39565744a
kernel-abi-whitelists-3.10.0-1062.71.1.el7.noarch.rpm
SHA-256: 30bc1363972b6617596836c0bcc239a31c150b11273d1e68d6611e25adfe18b2
kernel-debug-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: c5eee5c6f8d9509cebd94117f1d40090f8b2175a52bd21a4601910d0d35edcd3
kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2
kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2
kernel-debug-devel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 9894f39843aac824b888580b3a7abf741549029de6e8d2b18ed781e0a1512d5c
kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace
kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace
kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9
kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9
kernel-devel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: f57d234a457c1268e91cae3aaa76ee61b78f6ddd5e7d9ba12d7f315b774349e7
kernel-doc-3.10.0-1062.71.1.el7.noarch.rpm
SHA-256: 81d17e1df7a02d8ddec5e878265ab400e1eefc5f9270284d1dedc2a33757ee54
kernel-headers-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: badabd4b20d2af2b9c273436bfdbd7712a5dc397f5e278b1352e89761d54beab
kernel-tools-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 080640a16700c776c6a987ed07b4f636736961917917fe1de5f389561e4149d0
kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5
kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5
kernel-tools-libs-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: ddb0b2cef506c8e67415ce1d94374f5313ca7a4d98c1865aae8ed8390d985d8d
kernel-tools-libs-devel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 9048e5a9e72978da226daffbd8094f17f0372ba2aec61ed3735a164f54f7aae4
perf-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 91d82ff9558404363effbb9e85e106438c23f008042cc0c4c668823244d6ae05
perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041
perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041
python-perf-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 02b80b8ceb5fa7a017706484ef80d23df323b0dc7c446e4c9bb351c5f06fe494
python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa
python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa
Red Hat Enterprise Linux Server - TUS 7.7
SRPM
kernel-3.10.0-1062.71.1.el7.src.rpm
SHA-256: 8b06915fbce831efabb5876a0c996b11a12da68e6cd714d1bae29f47af1f5300
x86_64
bpftool-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: a0bc457d39ddb0fbc8558f2497b9e80f501682bf357c0893d92955cc2c78bcf3
bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9
bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9
kernel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: d9e337e2d21a7eb86c9f5be92e7b93049fe00d6ed16c34ad6f9258c39565744a
kernel-abi-whitelists-3.10.0-1062.71.1.el7.noarch.rpm
SHA-256: 30bc1363972b6617596836c0bcc239a31c150b11273d1e68d6611e25adfe18b2
kernel-debug-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: c5eee5c6f8d9509cebd94117f1d40090f8b2175a52bd21a4601910d0d35edcd3
kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2
kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2
kernel-debug-devel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 9894f39843aac824b888580b3a7abf741549029de6e8d2b18ed781e0a1512d5c
kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace
kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace
kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9
kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9
kernel-devel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: f57d234a457c1268e91cae3aaa76ee61b78f6ddd5e7d9ba12d7f315b774349e7
kernel-doc-3.10.0-1062.71.1.el7.noarch.rpm
SHA-256: 81d17e1df7a02d8ddec5e878265ab400e1eefc5f9270284d1dedc2a33757ee54
kernel-headers-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: badabd4b20d2af2b9c273436bfdbd7712a5dc397f5e278b1352e89761d54beab
kernel-tools-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 080640a16700c776c6a987ed07b4f636736961917917fe1de5f389561e4149d0
kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5
kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5
kernel-tools-libs-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: ddb0b2cef506c8e67415ce1d94374f5313ca7a4d98c1865aae8ed8390d985d8d
kernel-tools-libs-devel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 9048e5a9e72978da226daffbd8094f17f0372ba2aec61ed3735a164f54f7aae4
perf-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 91d82ff9558404363effbb9e85e106438c23f008042cc0c4c668823244d6ae05
perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041
perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041
python-perf-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 02b80b8ceb5fa7a017706484ef80d23df323b0dc7c446e4c9bb351c5f06fe494
python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa
python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7
SRPM
kernel-3.10.0-1062.71.1.el7.src.rpm
SHA-256: 8b06915fbce831efabb5876a0c996b11a12da68e6cd714d1bae29f47af1f5300
ppc64le
bpftool-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 659cd0fa41c6d590e30419b7fba1d8b6d2ec8892c77697eb6f5ed9cc36bc35cd
bpftool-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 17dee49622829637ef946446f8e3414d5ee699813f6604bf953f5a2c839c7b53
bpftool-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 17dee49622829637ef946446f8e3414d5ee699813f6604bf953f5a2c839c7b53
kernel-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: e68eb46b730f1fce7f8b0eaf37ff3ea4704f798a37b649a64ee92d8e1ff0f476
kernel-abi-whitelists-3.10.0-1062.71.1.el7.noarch.rpm
SHA-256: 30bc1363972b6617596836c0bcc239a31c150b11273d1e68d6611e25adfe18b2
kernel-bootwrapper-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 4f6e12fdbc5cf9555bc054a1ba240fb35a3fbf7adaf0d09bd554f75bcdade55c
kernel-debug-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 51c711276c9b4f3d98105a12843f311590971598b9373203784526f7dd4de9dc
kernel-debug-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: dfa92ab0bf0dabbe93c3f177efdecdaac8f9e58f4d7ad6b588c1f0dbe0e3d9aa
kernel-debug-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: dfa92ab0bf0dabbe93c3f177efdecdaac8f9e58f4d7ad6b588c1f0dbe0e3d9aa
kernel-debug-devel-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 5b0b820ab2a92a63b005ce2d95d0a398e46e03c15999ce6453274354f43c4886
kernel-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 3fbabdc52ca42c75bdecdee0711b1e7da8ea88efc7978db3e2a7ba26b8b26075
kernel-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 3fbabdc52ca42c75bdecdee0711b1e7da8ea88efc7978db3e2a7ba26b8b26075
kernel-debuginfo-common-ppc64le-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: ac549072c4027ca36063dece63bf66b16c6910b8aa39f7527e4be10cc2a56396
kernel-debuginfo-common-ppc64le-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: ac549072c4027ca36063dece63bf66b16c6910b8aa39f7527e4be10cc2a56396
kernel-devel-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: f93ecbaf2e6e511c0453b56dd5cdd2e89b06e0d7158e62ebe2c3a65670112512
kernel-doc-3.10.0-1062.71.1.el7.noarch.rpm
SHA-256: 81d17e1df7a02d8ddec5e878265ab400e1eefc5f9270284d1dedc2a33757ee54
kernel-headers-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: efaa6ddc36e24251fc2bf2319478c594ef77f2db1ef110d6cc532b31263f1f43
kernel-tools-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 342f65a14c1b6fd285acc0d57d8ccf5da0cbd3ebc09cb14887d023bede01ebb9
kernel-tools-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: be00aca0aed1b7288752a81e934f7c6850b393102e0dedaeb81a3885f2af073c
kernel-tools-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: be00aca0aed1b7288752a81e934f7c6850b393102e0dedaeb81a3885f2af073c
kernel-tools-libs-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 6b3083d5c2ea77b64c6586909aa9be942b9870c92a65cd15f012577915612512
kernel-tools-libs-devel-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 2777497449b6e34640f750f1d5360b579be6a565e5d57d47a4180d51e426c49b
perf-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 762a32a3eff4b537198c062af4740d2715ecca4f970e321cc378d6847dab8c0a
perf-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 0dcddc541b7c2cd4d836bd123a2d7f5bdf943377943e19825bffbc7c0e1c600a
perf-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 0dcddc541b7c2cd4d836bd123a2d7f5bdf943377943e19825bffbc7c0e1c600a
python-perf-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 9ccc8cdade9c28fb52a940a774e557a81342172b3f8e64d06d0f64bdf72b2017
python-perf-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 5f6616499d04b5dc749a719eacce7305402b6e7aced024fe7fd33e30a706dc02
python-perf-debuginfo-3.10.0-1062.71.1.el7.ppc64le.rpm
SHA-256: 5f6616499d04b5dc749a719eacce7305402b6e7aced024fe7fd33e30a706dc02
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7
SRPM
kernel-3.10.0-1062.71.1.el7.src.rpm
SHA-256: 8b06915fbce831efabb5876a0c996b11a12da68e6cd714d1bae29f47af1f5300
x86_64
bpftool-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: a0bc457d39ddb0fbc8558f2497b9e80f501682bf357c0893d92955cc2c78bcf3
bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9
bpftool-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: c72721a18a8de87789d00f2928f51dc7aafe08aa35d744200e28cb85a2ee9ce9
kernel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: d9e337e2d21a7eb86c9f5be92e7b93049fe00d6ed16c34ad6f9258c39565744a
kernel-abi-whitelists-3.10.0-1062.71.1.el7.noarch.rpm
SHA-256: 30bc1363972b6617596836c0bcc239a31c150b11273d1e68d6611e25adfe18b2
kernel-debug-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: c5eee5c6f8d9509cebd94117f1d40090f8b2175a52bd21a4601910d0d35edcd3
kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2
kernel-debug-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 685ab2cd385790166d3fa4772dfc87c4c9a316c0f1ea408647788b64d7bf30d2
kernel-debug-devel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 9894f39843aac824b888580b3a7abf741549029de6e8d2b18ed781e0a1512d5c
kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace
kernel-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: dd4d05521d5809aace35864b7057da4bcfcb11b015d651679d58bba73722cace
kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9
kernel-debuginfo-common-x86_64-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: cc39b74d2740de51e39de0120613ae3b2e492bbe6cadaf49be4ba1f2a4dd2eb9
kernel-devel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: f57d234a457c1268e91cae3aaa76ee61b78f6ddd5e7d9ba12d7f315b774349e7
kernel-doc-3.10.0-1062.71.1.el7.noarch.rpm
SHA-256: 81d17e1df7a02d8ddec5e878265ab400e1eefc5f9270284d1dedc2a33757ee54
kernel-headers-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: badabd4b20d2af2b9c273436bfdbd7712a5dc397f5e278b1352e89761d54beab
kernel-tools-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 080640a16700c776c6a987ed07b4f636736961917917fe1de5f389561e4149d0
kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5
kernel-tools-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: deee4f7b2e23bb54f3482dc1205c942171261a5352b8e188bcccbfd0c07f2fb5
kernel-tools-libs-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: ddb0b2cef506c8e67415ce1d94374f5313ca7a4d98c1865aae8ed8390d985d8d
kernel-tools-libs-devel-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 9048e5a9e72978da226daffbd8094f17f0372ba2aec61ed3735a164f54f7aae4
perf-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 91d82ff9558404363effbb9e85e106438c23f008042cc0c4c668823244d6ae05
perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041
perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 034fc12fdc4a8856959429f45eed235bc468c99db3270ed855e21e6d02234041
python-perf-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: 02b80b8ceb5fa7a017706484ef80d23df323b0dc7c446e4c9bb351c5f06fe494
python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa
python-perf-debuginfo-3.10.0-1062.71.1.el7.x86_64.rpm
SHA-256: a644f8d05934ccfdca804fd717de986b84af8b9a2ac304f70e3f35b8ae4d69fa
Related news
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
Red Hat Security Advisory 2023-3491-01 - An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-3388-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass and use-after-free vulnerabilities.
Logging Subsystem 5.6.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-27539: A denial of service vulnerability was found in rubygem-rack in how it parses headers. A carefully crafted input can cause header parsing to take an unexpected amount of time, possibly resulting in a denial of service. * CVE-2023-28120: A Cross-Site-Scripting vulnerability was found in rubygem ActiveSupport. If the new bytesplice method is called on a SafeBuffer with untrus...
Red Hat Security Advisory 2023-1659-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...
Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled docume...
Red Hat Security Advisory 2023-1251-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1203-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was found ...
Red Hat Security Advisory 2023-1109-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
Red Hat Security Advisory 2023-1091-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2022-42703: A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c ...
Ubuntu Security Notice 5920-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5919-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.
Red Hat Security Advisory 2023-1008-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-0945-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetoo...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Ubuntu Security Notice 5883-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2023-0856-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-0858-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in ho...
Ubuntu Security Notice 5877-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5860-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5832-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5809-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5803-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamas Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.