[RHSA-2022:0232] kpatch-patch security update
Severity
Important
Affected Packages
12
CVEs
2
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
kernel: fs_context: heap overflow in legacy parameter handling (CVE-2022-0185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1?arch=x86_64&distro=redhat-8.5 | < 1-1.el8_5 |
pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1?arch=ppc64le&distro=redhat-8.5 | < 1-1.el8_5 |
pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1?arch=x86_64&distro=redhat-8.5 | < 1-1.el8_5 |
pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1?arch=ppc64le&distro=redhat-8.5 | < 1-1.el8_5 |
pkg:rpm/redhat/kpatch-patch-4_18_0-348?arch=x86_64&distro=redhat-8 | < 1-2.el8 |
pkg:rpm/redhat/kpatch-patch-4_18_0-348?arch=ppc64le&distro=redhat-8 | < 1-2.el8 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.5 | < 4.18.0-348.2.1.el8_5 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.5 | < 4.18.0-348.7.1.el8_5 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 | < 4.18.0-348.el8 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.5 | < 4.18.0-348.2.1.el8_5 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.5 | < 4.18.0-348.7.1.el8_5 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 | < 4.18.0-348.el8 |
- ID
- RHSA-2022:0232
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:0232
- Published
-
2022-01-24T00:00:00
(2 years ago) - Modified
-
2022-01-24T00:00:00
(2 years ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1563
- ALAS-2023-1688
- ALAS2-2022-1749
- ALSA-2022:0188
- CISA-2024:0821
- DSA-5050-1
- DSA-5096-1
- ELSA-2022-0188
- ELSA-2022-0620
- ELSA-2022-9010
- ELSA-2022-9011
- ELSA-2022-9012
- ELSA-2022-9013
- ELSA-2022-9014
- ELSA-2022-9028
- ELSA-2022-9029
- ELSA-2022-9088
- ELSA-2022-9147
- ELSA-2022-9148
- ELSA-2022-9781
- FEDORA-2022-6352c313b7
- FEDORA-2022-6d4082d590
- MS:CVE-2021-4155
- MS:CVE-2022-0185
- openSUSE-SU-2022:0169-1
- openSUSE-SU-2022:0198-1
- RHSA-2022:0176
- RHSA-2022:0188
- RHSA-2022:0592
- RHSA-2022:0620
- RHSA-2022:0622
- RLSA-2022:176
- SSA:2022-031-01
- SUSE-SU-2022:0169-1
- SUSE-SU-2022:0197-1
- SUSE-SU-2022:0198-1
- SUSE-SU-2022:0238-1
- SUSE-SU-2022:0239-1
- SUSE-SU-2022:0241-1
- SUSE-SU-2022:0254-1
- SUSE-SU-2022:0257-1
- SUSE-SU-2022:0262-1
- SUSE-SU-2022:0270-1
- SUSE-SU-2022:0288-1
- SUSE-SU-2022:0289-1
- SUSE-SU-2022:0291-1
- SUSE-SU-2022:0292-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0295-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3809-1
- USN-5240-1
- USN-5278-1
- USN-5294-1
- USN-5294-2
- USN-5295-1
- USN-5295-2
- USN-5297-1
- USN-5298-1
- USN-5362-1
- USN-5884-1
- USN-5926-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2034813 | https://bugzilla.redhat.com/2034813 | |
Bugzilla | 2040358 | https://bugzilla.redhat.com/2040358 | |
RHSA | RHSA-2022:0232 | https://access.redhat.com/errata/RHSA-2022:0232 | |
CVE | CVE-2021-4155 | https://access.redhat.com/security/cve/CVE-2021-4155 | |
CVE | CVE-2022-0185 | https://access.redhat.com/security/cve/CVE-2022-0185 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1?arch=x86_64&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_7_1 | < 1-1.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1?arch=ppc64le&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_7_1 | < 1-1.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1?arch=x86_64&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_2_1 | < 1-1.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1?arch=ppc64le&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_2_1 | < 1-1.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348?arch=x86_64&distro=redhat-8 | redhat | kpatch-patch-4_18_0-348 | < 1-2.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348?arch=ppc64le&distro=redhat-8 | redhat | kpatch-patch-4_18_0-348 | < 1-2.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.2.1.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.7.1.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 | redhat | kernel | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.2.1.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.7.1.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 | redhat | kernel | < 4.18.0-348.el8 | redhat-8 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |