First published: Wed Sep 28 2022(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> Posix ACL object is leaked in several places upon setattr and fsetxattr syscalls (BZ#2106586)</li> <li> netfilter: backports from upstream (BZ#2120634)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/bpftool | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/bpftool-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-abi-whitelists | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-debug | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-debug-devel | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-devel | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-doc | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-headers | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-tools | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-tools-libs | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/perf | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/perf-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/python-perf | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/bpftool | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/bpftool-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-bootwrapper | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-debug | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-debug-devel | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-debuginfo-common-ppc64le | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-devel | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-headers | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-tools | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-tools-libs | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/perf | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/perf-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/python-perf | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-1062.70.1.el7 | 3.10.0-1062.70.1.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:6741 is classified as important due to a race condition vulnerability that can lead to privilege escalation.
To fix RHSA-2022:6741, you should update the kernel packages to version 3.10.0-1062.70.1.el7 or later as provided by Red Hat.
CVE-2022-1729 is the identifier for the vulnerability addressed in RHSA-2022:6741, which describes the race condition in perf_event_open.
Affected packages include kernel, kernel-debug, bpftool, and several others specified in the advisory for the affected versions.
There is no specific workaround documented for RHSA-2022:6741; the recommended action is to apply the security update.