[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2023:1091-01 -- Redhat kernel, bpftool, perf, python-perf

ID: oval:org.secpod.oval:def:507568Date: (C)2023-03-13   (M)2024-05-22
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces * kernel: use-after-free related to leaf anon_vma double reuse For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * Regression - SAS3416 card works on RHEL 7.7 and below, does not work on RHEL 7.8 or 7.9 * use-after-free in sctp_do_8_2_transport_strike * RHEL7.9 - [Regression] Kernel test failed during CPU polarization test - lscpu, chcpu - LPAR * RHEL 7, block: Crash in blk_mq_rq_timed_out when dereferencing NULL request pointer * qla2xxx: Qlogic double completion races during error handling are still not fixed and this will also be a RHEL8+ exposure * kernel 3.10.0-1160.80.1.el7.x86_64 on Xeon E55xx crashes upon KVM startup * Guest"s time jumped forward by 12 minutes _after_ live-migration completes * RHEL7: target crashes if a malicious initiator sends a logout immediately after a login command.

Platform:
Red Hat Enterprise Linux 7
Product:
kernel
bpftool
perf
python-perf
Reference:
RHSA-2023:1091-01
CVE-2022-4378
CVE-2022-42703
CVE    2
CVE-2022-42703
CVE-2022-4378

© SecPod Technologies