First published: Fri Dec 02 2022(Updated: )
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.<br>Security Fix(es):<br><li> kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <4_18_0-305_49_1-1-4.el8_4 | 4_18_0-305_49_1-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_57_1-1-3.el8_4 | 4_18_0-305_57_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_62_1-1-3.el8_4 | 4_18_0-305_62_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_65_1-1-2.el8_4 | 4_18_0-305_65_1-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_71_1-1-1.el8_4 | 4_18_0-305_71_1-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_49_1-1-4.el8_4 | 4_18_0-305_49_1-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_49_1-debuginfo-1-4.el8_4 | 4_18_0-305_49_1-debuginfo-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_49_1-debugsource-1-4.el8_4 | 4_18_0-305_49_1-debugsource-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_57_1-1-3.el8_4 | 4_18_0-305_57_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_57_1-debuginfo-1-3.el8_4 | 4_18_0-305_57_1-debuginfo-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_57_1-debugsource-1-3.el8_4 | 4_18_0-305_57_1-debugsource-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_62_1-1-3.el8_4 | 4_18_0-305_62_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_62_1-debuginfo-1-3.el8_4 | 4_18_0-305_62_1-debuginfo-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_62_1-debugsource-1-3.el8_4 | 4_18_0-305_62_1-debugsource-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_65_1-1-2.el8_4 | 4_18_0-305_65_1-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_65_1-debuginfo-1-2.el8_4 | 4_18_0-305_65_1-debuginfo-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_65_1-debugsource-1-2.el8_4 | 4_18_0-305_65_1-debugsource-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_71_1-1-1.el8_4 | 4_18_0-305_71_1-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_71_1-debuginfo-1-1.el8_4 | 4_18_0-305_71_1-debuginfo-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_71_1-debugsource-1-1.el8_4 | 4_18_0-305_71_1-debugsource-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_49_1-1-4.el8_4 | 4_18_0-305_49_1-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_49_1-debuginfo-1-4.el8_4 | 4_18_0-305_49_1-debuginfo-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_49_1-debugsource-1-4.el8_4 | 4_18_0-305_49_1-debugsource-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_57_1-1-3.el8_4 | 4_18_0-305_57_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_57_1-debuginfo-1-3.el8_4 | 4_18_0-305_57_1-debuginfo-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_57_1-debugsource-1-3.el8_4 | 4_18_0-305_57_1-debugsource-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_62_1-1-3.el8_4 | 4_18_0-305_62_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_62_1-debuginfo-1-3.el8_4 | 4_18_0-305_62_1-debuginfo-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_62_1-debugsource-1-3.el8_4 | 4_18_0-305_62_1-debugsource-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_65_1-1-2.el8_4 | 4_18_0-305_65_1-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_65_1-debuginfo-1-2.el8_4 | 4_18_0-305_65_1-debuginfo-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_65_1-debugsource-1-2.el8_4 | 4_18_0-305_65_1-debugsource-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_71_1-1-1.el8_4 | 4_18_0-305_71_1-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_71_1-debuginfo-1-1.el8_4 | 4_18_0-305_71_1-debuginfo-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_71_1-debugsource-1-1.el8_4 | 4_18_0-305_71_1-debugsource-1-1.el8_4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:8768 is classified as important.
To fix RHSA-2022:8768, update the kpatch-patch package to a remedied version, such as 4_18_0-305_71_1-1-1.el8_4.
RHSA-2022:8768 addresses a vulnerability related to Open vSwitch, specifically an integer underflow that could lead to out-of-bounds writes.
You can verify if your system is affected by RHSA-2022:8768 by checking the installed version of the kpatch-patch package against the affected versions listed in the advisory.
RHSA-2022:8768 impacts systems running specific versions of the kpatch-patch package on Red Hat Enterprise Linux 8.