RHSA-2022:5249-01 -- Redhat kernel, perf, bpftool, python3-perfID: oval:org.secpod.oval:def:507024 | Date: (C)2022-07-12 (M)2024-05-22 |
Class: PATCH | Family: unix |
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * kernel: race condition in perf_event_open leads to privilege escalation * kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * kernel: buffer overflow in IPsec ESP transformation code For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * make SHA512_arch algos and CRYPTO_USER built-ins * SR-IOV performance greater than 50% degradation * fix data corruption caused by dm-integrity * SCTP client-side peeloff issues [rhel-9] * TCP connection fails in a asymmetric routing situation * Fails to boot Multiple RT VMs each with multiple vCPUs * spec: Fix separate tools build * call traces related to eeh_pseries observed and vmcore is not captured, when kdump is triggered * Mark ThunderX NIC driver as unmaintained
Platform: |
Red Hat Enterprise Linux 9 |
Product: |
kernel |
perf |
bpftool |
python3-perf |