[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2022:7318-01 -- Redhat kernel, perf, bpftool, python3-perf

ID: oval:org.secpod.oval:def:507258Date: (C)2022-11-21   (M)2024-04-17
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * posix cpu timer use-after-free may lead to local privilege escalation * Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * kernel crash after reboot of T14/G2 AMD laptop * execve exit tracepoint not called * Matrox black screen on VGA output on some systems. * The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it * watchdog BUG: soft lockup - CPU#30 stuck for 34s! [swapper/30:0] * Update cifs to 5.16 * Bad page state in process qemu-kvm pfn:68a74600 * vfio zero page mappings fail after 2M instances * The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it Enhancement: * Need to enable hpilo to support new HPE RL300 Gen11 for ARM

Platform:
Red Hat Enterprise Linux 9
Product:
kernel
perf
bpftool
python3-perf
Reference:
RHSA-2022:7318-01
CVE-2022-2585
CVE-2022-30594
CVE    2
CVE-2022-30594
CVE-2022-2585
CPE    5
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
cpe:/a:bpf:bpftool
cpe:/a:python-perf:python3-perf
...

© SecPod Technologies