First published: Tue Jul 11 2023(Updated: )
Important: kernel security and bug fix update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/bpftool | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/bpftool-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-abi-whitelists | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-debug | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-debug-devel | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-devel | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-doc | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-headers | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-tools | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-tools-libs | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/perf | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/perf-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/python-perf | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/bpftool | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/bpftool-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-bootwrapper | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-debug | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-debug-devel | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-debuginfo-common-ppc64le | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-devel | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-headers | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-tools | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-tools-libs | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/perf | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/perf-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/python-perf | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-1062.76.1.el7 | 3.10.0-1062.76.1.el7 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for SAP Solutions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:4022 is classified as important.
To fix RHSA-2023:4022, update the kernel package to version 3.10.0-1062.76.1.el7 or later.
RHSA-2023:4022 addresses a use-after-free vulnerability in the cls_route filter implementation that may lead to privilege escalation (CVE-2022-2588).
RHSA-2023:4022 affects various versions of the Red Hat Enterprise Linux Server across different architectures.
Yes, the fix for RHSA-2023:4022 is available in the Red Hat repositories.