[RHSA-2022:7344] kpatch-patch security update
Severity
Important
Affected Packages
16
CVEs
1
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2022:7344
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:7344
- Published
-
2022-11-02T00:00:00
(22 months ago) - Modified
-
2022-11-02T00:00:00
(22 months ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1636
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALSA-2022:7110
- DSA-5207-1
- ELSA-2022-7110
- ELSA-2022-7337
- ELSA-2022-9689
- ELSA-2022-9690
- ELSA-2022-9691
- ELSA-2022-9692
- ELSA-2022-9693
- ELSA-2022-9694
- ELSA-2022-9699
- ELSA-2022-9709
- ELSA-2022-9710
- ELSA-2022-9761
- ELSA-2022-9787
- ELSA-2022-9788
- ELSA-2022-9827
- ELSA-2022-9830
- FEDORA-2022-484e226872
- FEDORA-2022-9bbb1d9b7b
- RHSA-2022:7110
- RHSA-2022:7134
- RHSA-2022:7137
- RHSA-2022:7337
- RHSA-2022:7338
- RLSA-2022:7110
- SSA:2022-237-02
- SUSE-SU-2022:3263-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3265-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3282-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3294-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:4024-1
- SUSE-SU-2022:4027-1
- SUSE-SU-2022:4030-1
- SUSE-SU-2022:4033-1
- SUSE-SU-2022:4034-1
- SUSE-SU-2022:4035-1
- SUSE-SU-2022:4039-1
- SUSE-SU-2022:4100-1
- SUSE-SU-2022:4112-1
- SUSE-SU-2022:4113-1
- SUSE-SU-2022:4129-1
- SUSE-SU-2022:4617-1
- USN-5557-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5564-1
- USN-5565-1
- USN-5566-1
- USN-5567-1
- USN-5582-1
- USN-5588-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2114849 | https://bugzilla.redhat.com/2114849 | |
RHSA | RHSA-2022:7344 | https://access.redhat.com/errata/RHSA-2022:7344 | |
CVE | CVE-2022-2588 | https://access.redhat.com/security/cve/CVE-2022-2588 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_76_1?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_76_1 | < 1-1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_76_1?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_76_1 | < 1-1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_71_1?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_71_1 | < 1-1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_71_1?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_71_1 | < 1-1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_66_1?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_66_1 | < 1-2.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_66_1?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_66_1 | < 1-2.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_62_1?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_62_1 | < 1-3.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_62_1?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_62_1 | < 1-3.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.62.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.66.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.71.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.76.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.62.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.66.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.71.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.76.1.el7 | redhat-7 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |