[RHSA-2022:1535] kpatch-patch security update
Severity
Important
Affected Packages
20
CVEs
2
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
kernel: use-after-free in RDMA listen() (CVE-2021-4028)
kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2022:1535
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:1535
- Published
-
2022-04-26T00:00:00
(2 years ago) - Modified
-
2022-04-26T00:00:00
(2 years ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALSA-2022:1550
- DSA-5095-1
- ELSA-2022-1198
- ELSA-2022-1550
- ELSA-2022-9181
- ELSA-2022-9182
- ELSA-2022-9244
- ELSA-2022-9245
- openSUSE-SU-2022:1037-1
- openSUSE-SU-2022:1039-1
- RHSA-2022:1185
- RHSA-2022:1198
- RHSA-2022:1199
- RHSA-2022:1550
- RHSA-2022:1555
- RLSA-2022:1550
- SSA:2022-067-01
- SUSE-SU-2022:0257-1
- SUSE-SU-2022:0270-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0295-1
- SUSE-SU-2022:0978-1
- SUSE-SU-2022:0984-1
- SUSE-SU-2022:0998-1
- SUSE-SU-2022:1034-1
- SUSE-SU-2022:1037-1
- SUSE-SU-2022:1038-1
- SUSE-SU-2022:1039-1
- USN-5317-1
- USN-5318-1
- USN-5362-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2027201 | https://bugzilla.redhat.com/2027201 | |
Bugzilla | 2056830 | https://bugzilla.redhat.com/2056830 | |
RHSA | RHSA-2022:1535 | https://access.redhat.com/errata/RHSA-2022:1535 | |
CVE | CVE-2021-4028 | https://access.redhat.com/security/cve/CVE-2021-4028 | |
CVE | CVE-2022-25636 | https://access.redhat.com/security/cve/CVE-2022-25636 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1?arch=x86_64&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_7_1 | < 1-3.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_7_1?arch=ppc64le&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_7_1 | < 1-3.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1?arch=x86_64&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_2_1 | < 1-3.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_2_1?arch=ppc64le&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_2_1 | < 1-3.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1?arch=x86_64&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_20_1 | < 1-1.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_20_1?arch=ppc64le&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_20_1 | < 1-1.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2?arch=x86_64&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_12_2 | < 1-2.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348_12_2?arch=ppc64le&distro=redhat-8.5 | redhat | kpatch-patch-4_18_0-348_12_2 | < 1-2.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348?arch=x86_64&distro=redhat-8 | redhat | kpatch-patch-4_18_0-348 | < 1-4.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-348?arch=ppc64le&distro=redhat-8 | redhat | kpatch-patch-4_18_0-348 | < 1-4.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.2.1.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.7.1.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.12.2.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.20.1.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 | redhat | kernel | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.2.1.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.7.1.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.12.2.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.5 | redhat | kernel | < 4.18.0-348.20.1.el8_5 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 | redhat | kernel | < 4.18.0-348.el8 | redhat-8 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |