[RHSA-2022:5219] kpatch-patch security update
Severity
Important
Affected Packages
4
CVEs
1
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/kpatch-patch-4_18_0-372_9_1?arch=x86_64&distro=redhat-8 | < 1-1.el8 |
pkg:rpm/redhat/kpatch-patch-4_18_0-372_9_1?arch=ppc64le&distro=redhat-8 | < 1-1.el8 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 | < 4.18.0-372.9.1.el8 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 | < 4.18.0-372.9.1.el8 |
- ID
- RHSA-2022:5219
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:5219
- Published
-
2022-06-28T00:00:00
(2 years ago) - Modified
-
2022-06-28T00:00:00
(2 years ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1581
- ALAS2-2022-1774
- ALSA-2022:5249
- ALSA-2022:5316
- DSA-5127-1
- DSA-5173-1
- ELSA-2022-5249
- ELSA-2022-5316
- ELSA-2022-9365
- ELSA-2022-9366
- ELSA-2022-9367
- ELSA-2022-9368
- MS:CVE-2022-27666
- RHSA-2022:5214
- RHSA-2022:5249
- RHSA-2022:5267
- RHSA-2022:5316
- RHSA-2022:5344
- RLSA-2022:5316
- SSA:2022-129-01
- SUSE-SU-2022:1163-1
- SUSE-SU-2022:1172-1
- SUSE-SU-2022:1182-1
- SUSE-SU-2022:1183-1
- SUSE-SU-2022:1189-1
- SUSE-SU-2022:1192-1
- SUSE-SU-2022:1193-1
- SUSE-SU-2022:1194-1
- SUSE-SU-2022:1196-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1212-1
- SUSE-SU-2022:1215-1
- SUSE-SU-2022:1223-1
- SUSE-SU-2022:1224-1
- SUSE-SU-2022:1230-1
- SUSE-SU-2022:1242-1
- SUSE-SU-2022:1246-1
- SUSE-SU-2022:1248-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1261-1
- SUSE-SU-2022:1266-1
- SUSE-SU-2022:1267-1
- SUSE-SU-2022:1268-1
- SUSE-SU-2022:1269-1
- SUSE-SU-2022:1278-1
- SUSE-SU-2022:1303-1
- SUSE-SU-2022:1402-1
- SUSE-SU-2022:1407-1
- USN-5353-1
- USN-5357-1
- USN-5357-2
- USN-5358-1
- USN-5358-2
- USN-5368-1
- USN-5377-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2061633 | https://bugzilla.redhat.com/2061633 | |
RHSA | RHSA-2022:5219 | https://access.redhat.com/errata/RHSA-2022:5219 | |
CVE | CVE-2022-27666 | https://access.redhat.com/security/cve/CVE-2022-27666 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-372_9_1?arch=x86_64&distro=redhat-8 | redhat | kpatch-patch-4_18_0-372_9_1 | < 1-1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-372_9_1?arch=ppc64le&distro=redhat-8 | redhat | kpatch-patch-4_18_0-372_9_1 | < 1-1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 | redhat | kernel | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 | redhat | kernel | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |