[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2022:1988-01 -- Redhat kernel, bpftool, perf, python3-perf

ID: oval:org.secpod.oval:def:506895Date: (C)2022-06-01   (M)2024-04-17
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: fget: check that the fd still exists after getting a ref to it * kernel: avoid cyclic entity chains due to malformed USB descriptors * kernel: speculation on incompletely validated data on IBM Power9 * kernel: integer overflow in k_ascii in drivers/tty/vt/keyboard.c * kernel: out-of-bounds read in bpf_skb_change_head of filter.c due to a use-after-free * kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP * kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts * kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c * kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd * kernel: possible use-after-free in bluetooth module * kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks * kernel: DoS in ccp_run_aes_gcm_cmd function * kernel: sctp: Invalid chunks may be used to remotely remove existing associations * kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients * kernel: possible leak or coruption of data residing on hugetlbfs * kernel: Buffer overwrite in decode_nfs_fh function * kernel: cgroup: Use open-time creds and namespace for migration perm checks * kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies * kernel: arm: SIGPAGE information disclosure vulnerability * kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation * kernel: use-after-free in hso_free_net_device in drivers/net/usb/hso.c * kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist in kernel/bpf/stackmap.c leads to out-of-bounds write * kernel: Heap buffer overflow in firedtv driver * kernel: ppc: kvm: allows a malicious KVM guest to crash the host * kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c * kernel: mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device * kernel: use-after-free in the TEE subsystem * kernel: information leak in the IPv6 implementation * kernel: information leak in the IPv4 implementation * hw: cpu: intel: Branch History Injection * hw: cpu: intel: Intra-Mode BTI * kernel: Local denial of service in bond_ipsec_add_sa * kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c * kernel: FUSE allows UAF reads of write buffers, allowing theft of /etc/shadow hashes * kernel: use-after-free in nouveau kernel module For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.

Platform:
Red Hat Enterprise Linux 8
Product:
kernel
bpftool
perf
python3-perf
Reference:
RHSA-2022:1988-01
CVE-2020-0404
CVE-2020-4788
CVE-2020-13974
CVE-2020-27820
CVE-2021-0941
CVE-2021-3612
CVE-2021-3669
CVE-2021-3743
CVE-2021-3744
CVE-2021-3752
CVE-2021-3759
CVE-2021-3764
CVE-2021-3772
CVE-2021-3773
CVE-2021-4002
CVE-2021-4037
CVE-2021-4083
CVE-2021-4157
CVE-2021-4197
CVE-2021-4203
CVE-2021-20322
CVE-2021-21781
CVE-2021-26401
CVE-2021-29154
CVE-2021-37159
CVE-2021-41864
CVE-2021-42739
CVE-2021-43056
CVE-2021-43389
CVE-2021-43976
CVE-2021-44733
CVE-2021-45485
CVE-2021-45486
CVE-2022-0001
CVE-2022-0002
CVE-2022-0286
CVE-2022-0322
CVE-2022-1011
CVE-2021-4093
CVE    39
CVE-2021-0941
CVE-2021-21781
CVE-2021-3773
CVE-2021-43056
...

© SecPod Technologies