Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2022:5636 - Security Advisory
Issued:
2022-07-19
Updated:
2022-07-19

RHSA-2022:5636 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)
  • kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
  • kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Backport request of "genirq: use rcu in kstat_irqs_usr()" (BZ#2083311)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 2064604 - CVE-2022-1012 kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
  • BZ - 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation
  • BZ - 2092427 - CVE-2022-32250 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

CVEs

  • CVE-2022-1012
  • CVE-2022-1729
  • CVE-2022-32250

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM
kernel-4.18.0-147.70.1.el8_1.src.rpm SHA-256: b5fe903732a915cec6b18143c922296cba86b058136fde379cd1350e4ddf8910
ppc64le
bpftool-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 5148fd4298430340991482875c08b4f29ed7a9ab7f4f803ee979c54f4c89a6f7
bpftool-debuginfo-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 4d684bc2ff1a4c3a7b3fc2f9f984dc10b39d831820e3781fde6214873243f595
kernel-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 60bdb680cfd97b63f1708434ded0a1e72102663ac734792789934a68ab601745
kernel-abi-whitelists-4.18.0-147.70.1.el8_1.noarch.rpm SHA-256: d4186e2f930bacd97c69d0aabd4b499670f86c49fb6142a64d6000459e7f90fe
kernel-core-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 29db2b6ef0820e301c55819d55029836289ee3add66cf4718f91ca6e5ec7f05c
kernel-cross-headers-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 544f9e106f85f28cd57fce6019e2cb292d126ef655354984369ce9c69938d08b
kernel-debug-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 4d279b6dcbf584510c80be8ac68edbc082461a5e3f9f006ddbdbec9861e7e982
kernel-debug-core-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 0112e9651b16f4e266bddfa6773ddf61c01aedbad3cd90dbece57223de187b34
kernel-debug-debuginfo-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 2846f7fe2c538aa112dfb3b5fbf305f514e39e3bd7f65470ccdf63c743c255e8
kernel-debug-devel-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 24a1454ba8073be05c9c026dc4b4d622305cacfcd8dcb17c573537afa60e179f
kernel-debug-modules-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 2fc4aae549a74dff865d3f9d25c1f7f9a393224dc42f7f34a51fbc9487d03dc9
kernel-debug-modules-extra-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 6ffaa159f31b99e891943065ec039bae01ffcb401dd03d9efb90cb6700db828f
kernel-debuginfo-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: f4e2291e045a6035666858c94d4ca705c09361d7b43aef35749a5d7a932c064a
kernel-debuginfo-common-ppc64le-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 8918a6baa8568d9811982366f9e321ffc84d4dd676ab9daeaf7fec8fbc11f326
kernel-devel-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: dcab6e7aa25aa445ac0124fbb7d9ee47674591832e237a1e6ec46e8c60ca254a
kernel-doc-4.18.0-147.70.1.el8_1.noarch.rpm SHA-256: d81ab4ec5290f16b862ecfc0acc2ca2f856ad965d028c0128cafc562586a169c
kernel-headers-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 8e8664a9f9bca07834a568825c6c7d92b516382f9c7471e93a8b5ee2287645d9
kernel-modules-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 5af2a9a188c65b795293258dc7dbf92041e8d1d3012235caad1efe4f09b7f099
kernel-modules-extra-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 0b107236dbbdde7395246873ab31a8f778bb83e15a9159975980922b0fd12b0c
kernel-tools-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 5bbbd2c077152b91970bb161864d012ce16ac1ca1e0aef00f03af8836daca028
kernel-tools-debuginfo-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 86cbc19e12579b321af6a11807182b21a75b98c166866d0a2a934d5c0d3621ad
kernel-tools-libs-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: e4836a08e151644620679a112de43ce13647173365dfaebe09b8294d53712b45
perf-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 5d0cc236c324a8b6a36ae6ce6a39859ec81a2efd12560109e8d4936a86c4c496
perf-debuginfo-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: f640dcc554fb21945cae88e23baad103c8850db42b5b95b48d20b3e18d7fa3c9
python3-perf-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 09b87a0b438ba90ed3a7031ddcaa23e8ffdcb7f3fba7acbaa81a652d58ea419d
python3-perf-debuginfo-4.18.0-147.70.1.el8_1.ppc64le.rpm SHA-256: 30220bd2c4b92966e7729cd7779513613d06c65d2934d69b124816ebc221ef99

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM
kernel-4.18.0-147.70.1.el8_1.src.rpm SHA-256: b5fe903732a915cec6b18143c922296cba86b058136fde379cd1350e4ddf8910
x86_64
bpftool-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: e720a8ea126cce3302da4d161093389d1f1e4ba13f6b2ff317d26aa3bcd763bc
bpftool-debuginfo-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 2a9fda0becf49450e923ad85bb4007e7cfcb58157bf9594959ab82491b20b9c5
kernel-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: d2b4f29e2c5d34f0fec8beb66f9a08a5de74038ebe8b08835d7bde88e69d989a
kernel-abi-whitelists-4.18.0-147.70.1.el8_1.noarch.rpm SHA-256: d4186e2f930bacd97c69d0aabd4b499670f86c49fb6142a64d6000459e7f90fe
kernel-core-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 4ebe518bb7b7ab94c06c930adb1a3b7a80cf531c56ff615a0bf28558f8412245
kernel-cross-headers-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: e6ae02e6f878d8882c8d3b031866bfcd84ce1cf600353db513f23effcc68dba1
kernel-debug-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 469586523fe69b0bac71398677ae1745724ffaec43c0b3daf2837bce7600c350
kernel-debug-core-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: c53531eb2194e859dd3a5e89b0ff0402915d6bffaf831b172447896fb9c71f5f
kernel-debug-debuginfo-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 0fdef0f8aba07ddb365aeb8a78305d15456c3558b5cc868e27bdb44c0ff44ed2
kernel-debug-devel-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 350219ca40fc02179f368842cdec44c04562a4f5e43eeb668c505c1d7e12aec5
kernel-debug-modules-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: a3b28a81c3609f711259536945ae457de3caf4ede2a5b966e077180a9699691f
kernel-debug-modules-extra-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 68af666622678cad6732778b5b0f119d0a928ff21e5f21e80876b0af9d486fd5
kernel-debuginfo-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 1509c032ecf2d4cb182620abda2b38359ed1fc57cfad571b5ff806e855f107d8
kernel-debuginfo-common-x86_64-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: e9285e2a95123bdc883e7e1e9bb3a9d50b78db9e9bb641582f7a6a006e74b594
kernel-devel-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 5c0c3052d7988383a2118472573d1c8196caf590d70d6bb2e0c41ea6a85b861b
kernel-doc-4.18.0-147.70.1.el8_1.noarch.rpm SHA-256: d81ab4ec5290f16b862ecfc0acc2ca2f856ad965d028c0128cafc562586a169c
kernel-headers-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 6059dffe895f86d51f581e31e6c6633490601cbab4d476fe438a84ac17685b50
kernel-modules-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: c30731f808a5b9bb1b257e6cb115e359aeb24ccfdcaaa06eba2c611eb038782a
kernel-modules-extra-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: cb445d8344fa4c1c71ec3be7d8719c11f9e0df421da067805c680768c580bec0
kernel-tools-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 1e00348a7644bda136edfddeaa57ce271927973e845946a76739971d062786f2
kernel-tools-debuginfo-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: f92ad5a71b228b80f9d26fc3a80b633fd0fa17adab9bac131ea98a30718c1d97
kernel-tools-libs-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: ea4254f28d6b3941a9e9366a32b90d7ac0e8ceb5a03e561d9848dd84abb8396a
perf-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: b35c86673fee42a759b624ea6acdc853dadbb70b24bcc67212d24346d551bdff
perf-debuginfo-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 66c91fd9777de06ccce4a606556e03d9f6c0b3ef508d1ddec52327b303af3e99
python3-perf-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: 52bdd3d0f32efefc7e1f8805886ba5f5fd8edabc11c256cda4217c3ae6211979
python3-perf-debuginfo-4.18.0-147.70.1.el8_1.x86_64.rpm SHA-256: ed5e3f0185c72dee613139c46482f9ab7008f9e5190b37ff85b4aebac0ef80f9

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility