[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2023:1470-01 -- Redhat kernel, perf, bpftool, python3-perf

ID: oval:org.secpod.oval:def:507586Date: (C)2023-04-06   (M)2024-04-25
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: tun: avoid double free in tun_free_netdev * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * RHEL9.0 - zfcp: fix missing auto port scan and thus missing target ports * Cgroups_v2, when creating new cgroup/container, resets the cpu affinity masks for all usr processes on the system. * RHEL9.0 - boot: Add secure boot trailer * kernel-rt-debug: WARNING: possible circular locking dependency detected * Support cpuset.sched_load_balance by changing default CPUset directory structure * RHEL9.0 - s390/kexec: fix ipl report address for kdump * libgpiod doesn"t seem to work with Interphase gpiochip * Azure RHEL9 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM Enhancement: * IBM 9.2 FEAT: Upgrade the QETH driver to latest from upstream, e.g. kernel 6.0 * Intel 9.2 FEAT SPR CPU: AMX: Improve the init_fpstate setup code

Platform:
Red Hat Enterprise Linux 9
Product:
kernel
perf
bpftool
python3-perf
Reference:
RHSA-2023:1470-01
CVE-2022-4269
CVE-2022-4744
CVE-2023-0266
CVE    3
CVE-2023-0266
CVE-2022-4269
CVE-2022-4744
CPE    5
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
cpe:/a:bpf:bpftool
cpe:/a:python-perf:python3-perf
...

© SecPod Technologies