[RHSA-2022:0849] kpatch-patch security update
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout (CVE-2021-4154)
kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)
kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)
kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2022:0849
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:0849
- Published
-
2022-03-14T00:00:00
(2 years ago) - Modified
-
2022-03-14T00:00:00
(2 years ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1563
- ALAS-2022-1571
- ALAS2-2022-1749
- ALAS2-2022-1761
- ALSA-2022:0825
- ASB-A-196926917
- ASB-A-218836280
- CISA-2022:0523
- DSA-5092-1
- DSA-5095-1
- DSA-5096-1
- ELSA-2022-0620
- ELSA-2022-0825
- ELSA-2022-4642
- ELSA-2022-9010
- ELSA-2022-9011
- ELSA-2022-9012
- ELSA-2022-9013
- ELSA-2022-9014
- ELSA-2022-9141
- ELSA-2022-9142
- ELSA-2022-9147
- ELSA-2022-9148
- ELSA-2022-9179
- ELSA-2022-9180
- ELSA-2022-9244
- ELSA-2022-9245
- ELSA-2022-9260
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9348
- ELSA-2022-9667
- ELSA-2022-9781
- FEDORA-2022-48acd4718d
- FEDORA-2022-6f887c7be7
- FEDORA-2022-a39015bec2
- FEDORA-2022-df17aabb12
- MS:CVE-2021-4154
- MS:CVE-2022-0330
- MS:CVE-2022-0435
- MS:CVE-2022-0492
- openSUSE-SU-2022:0363-1
- openSUSE-SU-2022:0366-1
- openSUSE-SU-2022:0370-1
- openSUSE-SU-2022:0755-1
- openSUSE-SU-2022:0760-1
- openSUSE-SU-2022:0768-1
- openSUSE-SU-2022:1037-1
- openSUSE-SU-2022:1039-1
- RHSA-2022:0592
- RHSA-2022:0620
- RHSA-2022:0622
- RHSA-2022:0819
- RHSA-2022:0825
- RHSA-2022:4642
- RHSA-2022:4644
- RHSA-2022:4655
- RLSA-2022:819
- SSA:2022-031-01
- SSA:2022-067-01
- SUSE-SU-2022:0068-1
- SUSE-SU-2022:0080-1
- SUSE-SU-2022:0090-1
- SUSE-SU-2022:0241-1
- SUSE-SU-2022:0254-1
- SUSE-SU-2022:0257-1
- SUSE-SU-2022:0291-1
- SUSE-SU-2022:0292-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0295-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0363-1
- SUSE-SU-2022:0364-1
- SUSE-SU-2022:0365-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0370-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0372-1
- SUSE-SU-2022:0418-1
- SUSE-SU-2022:0429-1
- SUSE-SU-2022:0436-1
- SUSE-SU-2022:0463-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:0543-1
- SUSE-SU-2022:0544-1
- SUSE-SU-2022:0555-1
- SUSE-SU-2022:0615-1
- SUSE-SU-2022:0619-1
- SUSE-SU-2022:0647-1
- SUSE-SU-2022:0660-1
- SUSE-SU-2022:0667-1
- SUSE-SU-2022:0668-1
- SUSE-SU-2022:0755-1
- SUSE-SU-2022:0756-1
- SUSE-SU-2022:0757-1
- SUSE-SU-2022:0759-1
- SUSE-SU-2022:0760-1
- SUSE-SU-2022:0761-1
- SUSE-SU-2022:0762-1
- SUSE-SU-2022:0765-1
- SUSE-SU-2022:0766-1
- SUSE-SU-2022:0767-1
- SUSE-SU-2022:0768-1
- SUSE-SU-2022:0978-1
- SUSE-SU-2022:0984-1
- SUSE-SU-2022:0991-1
- SUSE-SU-2022:0996-1
- SUSE-SU-2022:0998-1
- SUSE-SU-2022:1012-1
- SUSE-SU-2022:1034-1
- SUSE-SU-2022:1035-1
- SUSE-SU-2022:1036-1
- SUSE-SU-2022:1037-1
- SUSE-SU-2022:1038-1
- SUSE-SU-2022:1039-1
- SUSE-SU-2022:1172-1
- SUSE-SU-2022:1189-1
- SUSE-SU-2022:1193-1
- SUSE-SU-2022:1194-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1212-1
- SUSE-SU-2022:1223-1
- SUSE-SU-2022:1242-1
- SUSE-SU-2022:1246-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1278-1
- SUSE-SU-2022:1569-1
- SUSE-SU-2022:1575-1
- SUSE-SU-2022:1580-1
- SUSE-SU-2022:1589-1
- SUSE-SU-2022:1591-1
- SUSE-SU-2022:1593-1
- SUSE-SU-2022:1605-1
- SUSE-SU-2022:1637-1
- SUSE-SU-2022:1640-1
- SUSE-SU-2022:1669-1
- SUSE-SU-2022:1676-1
- SUSE-SU-2022:1687-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2362-1
- SUSE-SU-2024:2365-1
- SUSE-SU-2024:2561-1
- USN-5278-1
- USN-5294-1
- USN-5294-2
- USN-5295-1
- USN-5295-2
- USN-5297-1
- USN-5298-1
- USN-5302-1
- USN-5337-1
- USN-5338-1
- USN-5339-1
- USN-5343-1
- USN-5361-1
- USN-5362-1
- USN-5368-1
- USN-5377-1
- USN-5505-1
- USN-5513-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2031930 | https://bugzilla.redhat.com/2031930 | |
Bugzilla | 2034514 | https://bugzilla.redhat.com/2034514 | |
Bugzilla | 2042404 | https://bugzilla.redhat.com/2042404 | |
Bugzilla | 2044809 | https://bugzilla.redhat.com/2044809 | |
Bugzilla | 2048738 | https://bugzilla.redhat.com/2048738 | |
Bugzilla | 2051505 | https://bugzilla.redhat.com/2051505 | |
RHSA | RHSA-2022:0849 | https://access.redhat.com/errata/RHSA-2022:0849 | |
CVE | CVE-2021-0920 | https://access.redhat.com/security/cve/CVE-2021-0920 | |
CVE | CVE-2021-4154 | https://access.redhat.com/security/cve/CVE-2021-4154 | |
CVE | CVE-2022-0330 | https://access.redhat.com/security/cve/CVE-2022-0330 | |
CVE | CVE-2022-0435 | https://access.redhat.com/security/cve/CVE-2022-0435 | |
CVE | CVE-2022-0492 | https://access.redhat.com/security/cve/CVE-2022-0492 | |
CVE | CVE-2022-22942 | https://access.redhat.com/security/cve/CVE-2022-22942 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1?arch=x86_64&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_7_1 | < 1-2.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1?arch=ppc64le&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_7_1 | < 1-2.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1?arch=x86_64&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_2_1 | < 1-2.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1?arch=ppc64le&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_2_1 | < 1-2.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2?arch=x86_64&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_12_2 | < 1-1.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2?arch=ppc64le&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_12_2 | < 1-1.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348?arch=x86_64&distro=redhat-8 | redhat | kpatch-patch-4_18_0-348 | < 1-3.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348?arch=ppc64le&distro=redhat-8 | redhat | kpatch-patch-4_18_0-348 | < 1-3.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.2.1.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.7.1.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.12.2.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 | redhat | kernel | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.2.1.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.7.1.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.12.2.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 | redhat | kernel | < 4.18.0-348.el8 | redhat-8 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |