[RHSA-2022:5219] kpatch-patch security update

Severity Important
Affected Packages 4
CVEs 1

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/kpatch-patch-4_18_0-372_9_1?arch=x86_64&distro=redhat-8 redhat kpatch-patch-4_18_0-372_9_1 < 1-1.el8 redhat-8 x86_64
Affected pkg:rpm/redhat/kpatch-patch-4_18_0-372_9_1?arch=ppc64le&distro=redhat-8 redhat kpatch-patch-4_18_0-372_9_1 < 1-1.el8 redhat-8 ppc64le
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 redhat kernel < 4.18.0-372.9.1.el8 redhat-8 x86_64
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 redhat kernel < 4.18.0-372.9.1.el8 redhat-8 ppc64le
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...