Headline
RHSA-2022:4924: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Issued:
2022-06-07
Updated:
2022-06-07
RHSA-2022:4924 - Security Advisory
- Overview
- Updated Packages
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- RH8.6 - slub corruption during LPM of hnv interface (BZ#2081253)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
- Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.1 x86_64
Fixes
- BZ - 2061633 - CVE-2022-27666 kernel: buffer overflow in IPsec ESP transformation code
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1
SRPM
kernel-4.18.0-147.67.1.el8_1.src.rpm
SHA-256: fffba72b8ced8c8960844e9c499e9f42453d78ec38804ebc40be074aa6d7705b
ppc64le
bpftool-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 3f97ea22e72c62be9dbcd37955b239aa6f6da5527ca2a794cd8d035845c06288
bpftool-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 632dd4bc1f248706bea11cf8ce08a5a2ac1ba57f56616604d5df7559d00226a2
kernel-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: dce513cf22df7d0e9e06feb74f5aa51fc1e5db4af2754929bc0aff735260c918
kernel-abi-whitelists-4.18.0-147.67.1.el8_1.noarch.rpm
SHA-256: 7899306190f6c5c2f27c1f8629793e5246f4b4f4b0e25e994c819cd9cbd5f27e
kernel-core-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 29c7d70796098626548832149ab931fde63fcf41a74808fd72dc25ebe8581803
kernel-cross-headers-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: a4b1ae958c03489a04be55d463135ac1f79051c6d5bff6ca2440406d6bf3aadf
kernel-debug-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: ebde14fb7e65b4d674593ae52ee946536ead9feddd5de3696bb3f0b154ea1cf9
kernel-debug-core-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 266c86772d9a92ad27a94118e588313ae9a40fbde3a7cb29a41cc9bf6a316f72
kernel-debug-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 47343f5e624bcc50af7538bc575da9843ec0b0bf0cbc83b57de55f5dea76ff6b
kernel-debug-devel-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: d36a46b990c0a403e135816933e8734fddcb11a8dd0aaba73f5b9c41b4a54646
kernel-debug-modules-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 562963ceec4ddd95d5e11795aa3a5ed035419fc3f03e25467dc7735d98ec2f23
kernel-debug-modules-extra-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 7fe903938099d63515e37d9581278dcae4d0d9487e03013cf74e89dd22d7bff3
kernel-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: a4ba71f8b620929eb67f4678e3afb792c1745755538923dbc2059a1c7085c8e7
kernel-debuginfo-common-ppc64le-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: eee4f09acc888fdc87bf89723db39029b96ab9c5d398a552d42e12058a2e98a7
kernel-devel-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 0710da219123da773d9ec807a1a0191d3e0c2d02213b36197b64d510a896e4c7
kernel-doc-4.18.0-147.67.1.el8_1.noarch.rpm
SHA-256: 4629deee5eed23bd79ceb523eff10120d60714bf87221ec4af4e2f510a3b236b
kernel-headers-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: e8d0675b89f5db7402c38e3320fec79032e8c213960ed7a71e740410528910e9
kernel-modules-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 6acfebae3ba672f4db94ff5914cb2bc52bc96cd7da2c03c1977b2b788262d17d
kernel-modules-extra-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 7a9dc81d9a756c91abfb58f9318269ae475059a2bed9559adda8dc3cbfcf734e
kernel-tools-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 62a6dde39e50f25eb414536133caa514b64906ed16ac7761f9d2571aa55b3076
kernel-tools-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: fe09d379953c65de8f6b8be11c2d1a54855640062786aee41445c5cbbcd41fb6
kernel-tools-libs-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 1c96f13d31edd8808e948be0c4e5df3a53ad25316b640617223b586fedadbe8b
perf-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 48c24bf914e33221fd79ec43bcb613b860caa76a8aacc7a9f77141fd9dec6e8e
perf-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: 3a4c17ed8de209e6b114714a02da6629ffd0519e13e6e5c132360aa05f96b5ab
python3-perf-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: a9998c7309298ea1628565f8eae2ebe38257af920a429f8224b6104532fae15c
python3-perf-debuginfo-4.18.0-147.67.1.el8_1.ppc64le.rpm
SHA-256: b9f5dfeec58774a9afee4744608e5f6e051bc0fe39ed326c87c3cbf073ab5f13
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.1
SRPM
kernel-4.18.0-147.67.1.el8_1.src.rpm
SHA-256: fffba72b8ced8c8960844e9c499e9f42453d78ec38804ebc40be074aa6d7705b
x86_64
bpftool-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: e8efcf20f0e8748a22228022172ea2883e2579d7f8ecb2334d47e9523ef0f113
bpftool-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 2690f2b7d999494716625f3dda162973b2689096afb875a9cbef888f3da738c4
kernel-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 7b22e812b3450225a9a86e35cfb3147dce3166a6adc602adbcdbfdb6bf1222fd
kernel-abi-whitelists-4.18.0-147.67.1.el8_1.noarch.rpm
SHA-256: 7899306190f6c5c2f27c1f8629793e5246f4b4f4b0e25e994c819cd9cbd5f27e
kernel-core-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 8cc4f850d5735f359b1eb5593883d5a901fde59df58db85bd2485b2bfd62e2e8
kernel-cross-headers-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: fc1762bd027db6cd2f42c3b96d9aa737b0ce0285e4f4cf3a31ace678fb26e2b0
kernel-debug-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 697242b6d632e8bcbc1b48ee0d75d19d46c861141c812194d711d075d984e693
kernel-debug-core-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 7ffa83ba2f85a509b2b30ad91c8993237ac244b4abd53accc78fdb5ffe9f35b5
kernel-debug-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 27ae2afb460de3f58c99ed8591637a62d542cd49f5c25a1b51f469b42aa04497
kernel-debug-devel-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: f4673dc62efa606a0a6fdbee05cad7bf9113f10c3b211b7ac855e2d0460ce709
kernel-debug-modules-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 0e777f61572a606a5132502125233972498fb60c96e93737946bf0aeb26b1347
kernel-debug-modules-extra-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: e6f1259041ccbb3809c9f1b7800cfee01c8fbcf2d0e37e6b15ae410eb9865d17
kernel-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 3ea65518bb2e2fc2250a784a28ce7ffad91b6b0f0fa43bebc346ff2759aefd27
kernel-debuginfo-common-x86_64-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: e3aeb28ec2c355fd6c22bcd3b8af9ded37c3ee1c48cfec330500cb23789fbadc
kernel-devel-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: c36b81690201a8a0b7348910ae8c9c3f59721450b0d6fd9eacc2cc373bb9af32
kernel-doc-4.18.0-147.67.1.el8_1.noarch.rpm
SHA-256: 4629deee5eed23bd79ceb523eff10120d60714bf87221ec4af4e2f510a3b236b
kernel-headers-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 936f8a799ca182324fe7dd285fc0355b9ec91f56efd8673d700149cb8d8a6a97
kernel-modules-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: d3316722820d1ff7d6099207e6d226898a4b84540a1b11426a1fe82edd37f616
kernel-modules-extra-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 3cbdd49722ae50d363acd5c530d4b918379db76b19964faa185f988c7454519a
kernel-tools-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 608954ce9d780f0c0d9c8024eaa23ccba707aee0785172b1b3b79d1b6136a12d
kernel-tools-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: c34ef009a859a0a8a87d51ae87f491821918c2a6e06bf5fc2015bb95e306fc03
kernel-tools-libs-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 451f8c85d2e0954932c98f354eaa7a254e22e972405e478b2434f76aebcbdfff
perf-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: 6448e1b0c778902350f14c3c9e7c3cc79688e329436ccf02fa0839e8133a84bb
perf-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: d299df28d83167a9e2f5bced53d4522a82edafa3fc5160c263fcea52b3544182
python3-perf-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: cd065e55594e8145007b9401d4f3b584c06a4bfa6235884ff59d86a73f63a792
python3-perf-debuginfo-4.18.0-147.67.1.el8_1.x86_64.rpm
SHA-256: ddbb2dd1e2d70e28cb44371bac632cd4c6ba7b8f5331ad21ecaaa6f84fe66478
The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.
Related news
gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering in the HPACK parser - Unbounded CPU consumption in the HPACK parser The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client. The unbounded memory buffering bugs: - The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb. - HPACK varints have an encoding quirk whereby an infinite number of 0’s can be added at the start of an integer. gRPC’s hpack parser needed to read all of them before concluding a parse. - gRPC’s metadata overflow check was performed per frame, so ...
A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.
OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.
In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel
Red Hat Security Advisory 2022-5840-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Red Hat Security Advisory 2022-5556-01 - Logging Subsystem 5.4.3 has security updates. Issues addressed include denial of service and out of bounds read vulnerabilities.
An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code * CVE-2022-28733: grub2: Integer underflow in grub_net_recv_ip4_packets
Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-28915: kernel: out-of-bounds read in fbcon_get_font function * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Red Hat Security Advisory 2022-5344-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow and out of bounds read vulnerabilities.
Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-28915: kernel: out-of-bounds read in fbcon_get_font function * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to priv...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Red Hat Security Advisory 2022-4942-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4924-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4835-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4829-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4809-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4037: kernel: security regression for CVE-2018-13405 * CVE-2021-20322: kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4037: kernel: security regression for CVE-2018-13405 * CVE-2021-20322: kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code