First published: Tue Apr 26 2022(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/bpftool | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/bpftool-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-abi-whitelists | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-core | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-cross-headers | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug-core | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug-devel | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug-modules | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug-modules-extra | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debuginfo-common-ppc64le | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-devel | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-doc | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-headers | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-modules | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-modules-extra | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-tools | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-tools-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-tools-libs | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/perf | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/perf-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/python3-perf | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/python3-perf-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/bpftool | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/bpftool-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-core | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-cross-headers | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug-core | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug-devel | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug-modules | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debug-modules-extra | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-devel | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-headers | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-modules | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-modules-extra | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-tools | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-tools-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/kernel-tools-libs | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/perf | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/perf-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/python3-perf | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
redhat/python3-perf-debuginfo | <4.18.0-147.65.1.el8_1 | 4.18.0-147.65.1.el8_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:1589 is classified as moderate due to the potential for a denial of service from a remote stack overflow.
To fix RHSA-2022:1589, update your kernel packages to version 4.18.0-147.65.1.el8_1 or later.
RHSA-2022:1589 affects Linux kernel packages and associated tools on Red Hat Enterprise Linux 8.
CVE-2022-0435 refers to a vulnerability in the Linux kernel that allows for a remote stack overflow, potentially leading to a denial of service.
RHSA-2022:1589 is specifically applicable to systems using the affected kernel versions within the Red Hat Enterprise Linux 8 ecosystem.