Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:4924: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Red Hat Security Data
#vulnerability#linux#red_hat#buffer_overflow#sap

Issued:

2022-06-07

Updated:

2022-06-07

RHSA-2022:4924 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • RH8.6 - slub corruption during LPM of hnv interface (BZ#2081253)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 2061633 - CVE-2022-27666 kernel: buffer overflow in IPsec ESP transformation code

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM

kernel-4.18.0-147.67.1.el8_1.src.rpm

SHA-256: fffba72b8ced8c8960844e9c499e9f42453d78ec38804ebc40be074aa6d7705b

ppc64le

bpftool-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 3f97ea22e72c62be9dbcd37955b239aa6f6da5527ca2a794cd8d035845c06288

bpftool-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 632dd4bc1f248706bea11cf8ce08a5a2ac1ba57f56616604d5df7559d00226a2

kernel-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: dce513cf22df7d0e9e06feb74f5aa51fc1e5db4af2754929bc0aff735260c918

kernel-abi-whitelists-4.18.0-147.67.1.el8_1.noarch.rpm

SHA-256: 7899306190f6c5c2f27c1f8629793e5246f4b4f4b0e25e994c819cd9cbd5f27e

kernel-core-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 29c7d70796098626548832149ab931fde63fcf41a74808fd72dc25ebe8581803

kernel-cross-headers-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: a4b1ae958c03489a04be55d463135ac1f79051c6d5bff6ca2440406d6bf3aadf

kernel-debug-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: ebde14fb7e65b4d674593ae52ee946536ead9feddd5de3696bb3f0b154ea1cf9

kernel-debug-core-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 266c86772d9a92ad27a94118e588313ae9a40fbde3a7cb29a41cc9bf6a316f72

kernel-debug-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 47343f5e624bcc50af7538bc575da9843ec0b0bf0cbc83b57de55f5dea76ff6b

kernel-debug-devel-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: d36a46b990c0a403e135816933e8734fddcb11a8dd0aaba73f5b9c41b4a54646

kernel-debug-modules-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 562963ceec4ddd95d5e11795aa3a5ed035419fc3f03e25467dc7735d98ec2f23

kernel-debug-modules-extra-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 7fe903938099d63515e37d9581278dcae4d0d9487e03013cf74e89dd22d7bff3

kernel-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: a4ba71f8b620929eb67f4678e3afb792c1745755538923dbc2059a1c7085c8e7

kernel-debuginfo-common-ppc64le-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: eee4f09acc888fdc87bf89723db39029b96ab9c5d398a552d42e12058a2e98a7

kernel-devel-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 0710da219123da773d9ec807a1a0191d3e0c2d02213b36197b64d510a896e4c7

kernel-doc-4.18.0-147.67.1.el8_1.noarch.rpm

SHA-256: 4629deee5eed23bd79ceb523eff10120d60714bf87221ec4af4e2f510a3b236b

kernel-headers-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: e8d0675b89f5db7402c38e3320fec79032e8c213960ed7a71e740410528910e9

kernel-modules-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 6acfebae3ba672f4db94ff5914cb2bc52bc96cd7da2c03c1977b2b788262d17d

kernel-modules-extra-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 7a9dc81d9a756c91abfb58f9318269ae475059a2bed9559adda8dc3cbfcf734e

kernel-tools-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 62a6dde39e50f25eb414536133caa514b64906ed16ac7761f9d2571aa55b3076

kernel-tools-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: fe09d379953c65de8f6b8be11c2d1a54855640062786aee41445c5cbbcd41fb6

kernel-tools-libs-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 1c96f13d31edd8808e948be0c4e5df3a53ad25316b640617223b586fedadbe8b

perf-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 48c24bf914e33221fd79ec43bcb613b860caa76a8aacc7a9f77141fd9dec6e8e

perf-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: 3a4c17ed8de209e6b114714a02da6629ffd0519e13e6e5c132360aa05f96b5ab

python3-perf-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: a9998c7309298ea1628565f8eae2ebe38257af920a429f8224b6104532fae15c

python3-perf-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm

SHA-256: b9f5dfeec58774a9afee4744608e5f6e051bc0fe39ed326c87c3cbf073ab5f13

Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.1

SRPM

kernel-4.18.0-147.67.1.el8_1.src.rpm

SHA-256: fffba72b8ced8c8960844e9c499e9f42453d78ec38804ebc40be074aa6d7705b

x86_64

bpftool-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: e8efcf20f0e8748a22228022172ea2883e2579d7f8ecb2334d47e9523ef0f113

bpftool-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 2690f2b7d999494716625f3dda162973b2689096afb875a9cbef888f3da738c4

kernel-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 7b22e812b3450225a9a86e35cfb3147dce3166a6adc602adbcdbfdb6bf1222fd

kernel-abi-whitelists-4.18.0-147.67.1.el8_1.noarch.rpm

SHA-256: 7899306190f6c5c2f27c1f8629793e5246f4b4f4b0e25e994c819cd9cbd5f27e

kernel-core-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 8cc4f850d5735f359b1eb5593883d5a901fde59df58db85bd2485b2bfd62e2e8

kernel-cross-headers-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: fc1762bd027db6cd2f42c3b96d9aa737b0ce0285e4f4cf3a31ace678fb26e2b0

kernel-debug-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 697242b6d632e8bcbc1b48ee0d75d19d46c861141c812194d711d075d984e693

kernel-debug-core-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 7ffa83ba2f85a509b2b30ad91c8993237ac244b4abd53accc78fdb5ffe9f35b5

kernel-debug-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 27ae2afb460de3f58c99ed8591637a62d542cd49f5c25a1b51f469b42aa04497

kernel-debug-devel-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: f4673dc62efa606a0a6fdbee05cad7bf9113f10c3b211b7ac855e2d0460ce709

kernel-debug-modules-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 0e777f61572a606a5132502125233972498fb60c96e93737946bf0aeb26b1347

kernel-debug-modules-extra-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: e6f1259041ccbb3809c9f1b7800cfee01c8fbcf2d0e37e6b15ae410eb9865d17

kernel-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 3ea65518bb2e2fc2250a784a28ce7ffad91b6b0f0fa43bebc346ff2759aefd27

kernel-debuginfo-common-x86_64-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: e3aeb28ec2c355fd6c22bcd3b8af9ded37c3ee1c48cfec330500cb23789fbadc

kernel-devel-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: c36b81690201a8a0b7348910ae8c9c3f59721450b0d6fd9eacc2cc373bb9af32

kernel-doc-4.18.0-147.67.1.el8_1.noarch.rpm

SHA-256: 4629deee5eed23bd79ceb523eff10120d60714bf87221ec4af4e2f510a3b236b

kernel-headers-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 936f8a799ca182324fe7dd285fc0355b9ec91f56efd8673d700149cb8d8a6a97

kernel-modules-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: d3316722820d1ff7d6099207e6d226898a4b84540a1b11426a1fe82edd37f616

kernel-modules-extra-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 3cbdd49722ae50d363acd5c530d4b918379db76b19964faa185f988c7454519a

kernel-tools-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 608954ce9d780f0c0d9c8024eaa23ccba707aee0785172b1b3b79d1b6136a12d

kernel-tools-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: c34ef009a859a0a8a87d51ae87f491821918c2a6e06bf5fc2015bb95e306fc03

kernel-tools-libs-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 451f8c85d2e0954932c98f354eaa7a254e22e972405e478b2434f76aebcbdfff

perf-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: 6448e1b0c778902350f14c3c9e7c3cc79688e329436ccf02fa0839e8133a84bb

perf-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: d299df28d83167a9e2f5bced53d4522a82edafa3fc5160c263fcea52b3544182

python3-perf-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: cd065e55594e8145007b9401d4f3b584c06a4bfa6235884ff59d86a73f63a792

python3-perf-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm

SHA-256: ddbb2dd1e2d70e28cb44371bac632cd4c6ba7b8f5331ad21ecaaa6f84fe66478

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Related news

CVE-2023-33953: Security Bulletins

gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering in the HPACK parser - Unbounded CPU consumption in the HPACK parser The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client. The unbounded memory buffering bugs: - The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb. - HPACK varints have an encoding quirk whereby an infinite number of 0’s can be added at the start of an integer. gRPC’s hpack parser needed to read all of them before concluding a parse. - gRPC’s metadata overflow check was performed per frame, so ...

CVE-2022-1941: Security Bulletins  |  Customer Care  |  Google Cloud

A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.

CVE-2022-38701: en/security-disclosure/2022/2022-09.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.

CVE-2022-20158: Pixel Update Bulletin—August 2022  |  Android Open Source Project

In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel

Red Hat Security Advisory 2022-5840-01

Red Hat Security Advisory 2022-5840-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.

Red Hat Security Advisory 2022-5556-01

Red Hat Security Advisory 2022-5556-01 - Logging Subsystem 5.4.3 has security updates. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2022:5678: Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.1]

An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code * CVE-2022-28733: grub2: Integer underflow in grub_net_recv_ip4_packets

Red Hat Security Advisory 2022-5249-01

Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5476: Red Hat Security Advisory: kpatch-patch security update

An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

RHSA-2022:5316: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-28915: kernel: out-of-bounds read in fbcon_get_font function * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

Red Hat Security Advisory 2022-5344-01

Red Hat Security Advisory 2022-5344-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-5220-01

Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5214-01

Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5344: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-28915: kernel: out-of-bounds read in fbcon_get_font function * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

RHSA-2022:5220: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to priv...

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

RHSA-2022:5214: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

Red Hat Security Advisory 2022-4942-01

Red Hat Security Advisory 2022-4942-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.

Red Hat Security Advisory 2022-4924-01

Red Hat Security Advisory 2022-4924-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.

Red Hat Security Advisory 2022-4835-01

Red Hat Security Advisory 2022-4835-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a buffer overflow vulnerability.

Red Hat Security Advisory 2022-4829-01

Red Hat Security Advisory 2022-4829-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.

Red Hat Security Advisory 2022-4809-01

Red Hat Security Advisory 2022-4809-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.

RHSA-2022:4835: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4037: kernel: security regression for CVE-2018-13405 * CVE-2021-20322: kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

RHSA-2022:4829: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4037: kernel: security regression for CVE-2018-13405 * CVE-2021-20322: kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

RHSA-2022:4809: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code