RHSA-2022:7318-01 -- Redhat kernel, perf, bpftool, python3-perfID: oval:org.secpod.oval:def:507258 | Date: (C)2022-11-21 (M)2024-04-17 |
Class: PATCH | Family: unix |
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * posix cpu timer use-after-free may lead to local privilege escalation * Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * kernel crash after reboot of T14/G2 AMD laptop * execve exit tracepoint not called * Matrox black screen on VGA output on some systems. * The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it * watchdog BUG: soft lockup - CPU#30 stuck for 34s! [swapper/30:0] * Update cifs to 5.16 * Bad page state in process qemu-kvm pfn:68a74600 * vfio zero page mappings fail after 2M instances * The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it Enhancement: * Need to enable hpilo to support new HPE RL300 Gen11 for ARM
Platform: |
Red Hat Enterprise Linux 9 |
Product: |
kernel |
perf |
bpftool |
python3-perf |