RLSA-2022:0825 --- bpftoolID: oval:org.secpod.oval:def:4501029 | Date: (C)2023-05-16 (M)2024-04-17 |
Class: PATCH | Family: unix |
The kernel packages contain the Linux kernel, the core of any Linux operating system. The following packages have been upgraded to a later upstream version: kernel . Security Fix: * kernel: improper initialization of the "flags" member of the new pipe_buffer * kernel: Use After Free in unix_gc which could result in a local privilege escalation * kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout * kernel: possible privileges escalation due to missing TLB flush * kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS * kernel: cgroups v1 release_agent feature may allow privilege escalation * kernel: missing check in ioctl allows kernel memory read/write * kernel: failing usercopy allows for use-after-free exploitation For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * Intel QAT Kernel power up fix * Rocky Linux8.4 seeing scsi_dma_map failed with mpt3sas driver and affecting performance * [Lenovo 8.4 bug] audio_HDMI certification failed on Rocky Linux 8.4GA * [Rocky Linux-8.5][4.18.0-323.el8.ppc64le][POWER8/9/10] security_flavor mode is not set back to zero post online migration * iommu/amd: Fix unable to handle page fault due to AVIC * [Lenovo 8.4 bug]The VGA display shows no signal when install Rocky Linux8.4 in the legacy BIOS mode. * Double free of kmalloc-64 cache struct ib_port-
Product: |
bpftool |
kernel |
perf |
python3-perf |