Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2022:7885 - Security Advisory
Issued:
2022-11-09
Updated:
2022-11-09

RHSA-2022:7885 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kpatch management tool provides a kernel patching infrastructure which
allows you to patch a running kernel without rebooting or restarting any
processes.

Security Fix(es):

  • kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64

Fixes

  • BZ - 2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation

CVEs

  • CVE-2022-2588

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2

SRPM
kpatch-patch-4_18_0-193_80_1-1-2.el8_2.src.rpm SHA-256: 33ccc2d55bdcb5e29b4e029e909a894d729a6fc7532298abc6173af01ad983aa
kpatch-patch-4_18_0-193_81_1-1-2.el8_2.src.rpm SHA-256: b288ab2dd03e9a7da9d60b714d16b28869c22af41b45c174221d9eb6dc97925d
kpatch-patch-4_18_0-193_87_1-1-1.el8_2.src.rpm SHA-256: cd312b4087aedc370c52b920d9478917f1930f392acf5274807b273793e57685
kpatch-patch-4_18_0-193_90_1-1-1.el8_2.src.rpm SHA-256: a597d17bbe2ec2690cdbd2951608f3e9c4956442aba133e0706be9b45073c283
kpatch-patch-4_18_0-193_91_1-1-1.el8_2.src.rpm SHA-256: 5c7d4178512c43402ff545868078bc0282437e1f8fa279294f866d322e5535f3
ppc64le
kpatch-patch-4_18_0-193_80_1-1-2.el8_2.ppc64le.rpm SHA-256: 1f3ffe22baca805b7b4b4f2398e85d9fcefc9c471b59fbdea31f257f6760f999
kpatch-patch-4_18_0-193_80_1-debuginfo-1-2.el8_2.ppc64le.rpm SHA-256: 2f08d7c636bc61141910d02407c126b5a7a4075e6ba88327ffe30dce5ba09c26
kpatch-patch-4_18_0-193_80_1-debugsource-1-2.el8_2.ppc64le.rpm SHA-256: dcaa7f20f687e2c493697745cb75fd20b84fa0c501475f95ce6c65fdef7c292a
kpatch-patch-4_18_0-193_81_1-1-2.el8_2.ppc64le.rpm SHA-256: 3f073bcbb6b3de62cfe5f866825c6f39fbe9521f35e41700834ce2165bf96005
kpatch-patch-4_18_0-193_81_1-debuginfo-1-2.el8_2.ppc64le.rpm SHA-256: 5f428413dfd2351bb2c9b448a69b4357152a4dc4a1e10795367c0514625d49ec
kpatch-patch-4_18_0-193_81_1-debugsource-1-2.el8_2.ppc64le.rpm SHA-256: 9602058f812c384748d2079e957b5886767073797c7bb3dea5c60c761b085d12
kpatch-patch-4_18_0-193_87_1-1-1.el8_2.ppc64le.rpm SHA-256: 71fc1ecc48a7f1e0c336ce0f77828ea2813f99141add89502e87e36f9cc85089
kpatch-patch-4_18_0-193_87_1-debuginfo-1-1.el8_2.ppc64le.rpm SHA-256: 40627bb5134cc38c9e4a63d33b2ce0785378001a85908c60dc101cc9833ce534
kpatch-patch-4_18_0-193_87_1-debugsource-1-1.el8_2.ppc64le.rpm SHA-256: 8f58299347aa80c5a4cdc3e8e5d94f9deb36d232893b2cd6a3858e3ee2942909
kpatch-patch-4_18_0-193_90_1-1-1.el8_2.ppc64le.rpm SHA-256: 00ff74fd50be831e61f1fd66ea62209573bb95a2452b38f6d422b4798638c18a
kpatch-patch-4_18_0-193_90_1-debuginfo-1-1.el8_2.ppc64le.rpm SHA-256: 1306595ed44ec20c5ccd5ee9760355f7d4778d0083d61782d5c7ce413c7bbf8a
kpatch-patch-4_18_0-193_90_1-debugsource-1-1.el8_2.ppc64le.rpm SHA-256: cb0311e9d6d9e071bcd59b77f663ec0a8d4fdd7a4dd615eb869e33a642aac0ac
kpatch-patch-4_18_0-193_91_1-1-1.el8_2.ppc64le.rpm SHA-256: 9705b9040fad3e1ad4887677caeecf48503b25fb70820718a2c2186e56fa677c
kpatch-patch-4_18_0-193_91_1-debuginfo-1-1.el8_2.ppc64le.rpm SHA-256: e2b5d3f4233aa172348ecf83999dce40557adb6e5be8c5c952f235bbcb5489c9
kpatch-patch-4_18_0-193_91_1-debugsource-1-1.el8_2.ppc64le.rpm SHA-256: f4b62799ec9177568126a7a29dd8499995d7ccfe14cecc1bfaef1c5a79d897d6

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2

SRPM
kpatch-patch-4_18_0-193_80_1-1-2.el8_2.src.rpm SHA-256: 33ccc2d55bdcb5e29b4e029e909a894d729a6fc7532298abc6173af01ad983aa
kpatch-patch-4_18_0-193_81_1-1-2.el8_2.src.rpm SHA-256: b288ab2dd03e9a7da9d60b714d16b28869c22af41b45c174221d9eb6dc97925d
kpatch-patch-4_18_0-193_87_1-1-1.el8_2.src.rpm SHA-256: cd312b4087aedc370c52b920d9478917f1930f392acf5274807b273793e57685
kpatch-patch-4_18_0-193_90_1-1-1.el8_2.src.rpm SHA-256: a597d17bbe2ec2690cdbd2951608f3e9c4956442aba133e0706be9b45073c283
kpatch-patch-4_18_0-193_91_1-1-1.el8_2.src.rpm SHA-256: 5c7d4178512c43402ff545868078bc0282437e1f8fa279294f866d322e5535f3
x86_64
kpatch-patch-4_18_0-193_80_1-1-2.el8_2.x86_64.rpm SHA-256: 4d97228e35a5b89b62cbfaa1ae848e5c0413c38bd95308faab78124d5d7838e2
kpatch-patch-4_18_0-193_80_1-debuginfo-1-2.el8_2.x86_64.rpm SHA-256: 20b82ac32ff1cf3f031e766e20c95fd3ad7791980690626501f33f6db554efd1
kpatch-patch-4_18_0-193_80_1-debugsource-1-2.el8_2.x86_64.rpm SHA-256: 7c816cc8326b4693fefc47a3b8d64312a9b89699ec5ec3d3cb8d6e9a6a163da3
kpatch-patch-4_18_0-193_81_1-1-2.el8_2.x86_64.rpm SHA-256: 6bdb96d728df003febb1c3959c0a06abd9ca6ff65de20a06dd6e80c2870745e1
kpatch-patch-4_18_0-193_81_1-debuginfo-1-2.el8_2.x86_64.rpm SHA-256: d14d1c250a2af0e3d8a5e879bc70fc0e03a6f2363774003a7f062d0c9c755a5a
kpatch-patch-4_18_0-193_81_1-debugsource-1-2.el8_2.x86_64.rpm SHA-256: 1661ce6c613720b7aa5c8efaa7b584a4a841cc30f87625fdc0426a570a35c926
kpatch-patch-4_18_0-193_87_1-1-1.el8_2.x86_64.rpm SHA-256: 062164dcd08d630e65293a419d7e94a2266543360f5a254bbe6519fef707da53
kpatch-patch-4_18_0-193_87_1-debuginfo-1-1.el8_2.x86_64.rpm SHA-256: 5ea72bf1c9d1f1181ed142f17b110044e078122bfa2edf3c627d702a9abcc9ab
kpatch-patch-4_18_0-193_87_1-debugsource-1-1.el8_2.x86_64.rpm SHA-256: e3f82bedd26d6a6c995eaf8dd7be4e7435ed20f719e0eb6991e1525c1725ff7d
kpatch-patch-4_18_0-193_90_1-1-1.el8_2.x86_64.rpm SHA-256: 5aca2f4f9b1ba6fc709a23c8159106728fa08879792751280d542d5e637d26a0
kpatch-patch-4_18_0-193_90_1-debuginfo-1-1.el8_2.x86_64.rpm SHA-256: 636eec6c56ed48ac023f74e3f6d0d26fd51c295429ff086404644cc71dcc6b37
kpatch-patch-4_18_0-193_90_1-debugsource-1-1.el8_2.x86_64.rpm SHA-256: 9049a4c2a18d7ae175ee67b2667b78986200f4c2010dfdc9c2d10a4471a95be3
kpatch-patch-4_18_0-193_91_1-1-1.el8_2.x86_64.rpm SHA-256: 81a42a2cdeb7c544c977bd679e42a20250c6399f72e2536966e6d2c91142c65c
kpatch-patch-4_18_0-193_91_1-debuginfo-1-1.el8_2.x86_64.rpm SHA-256: d7501c87121bbf6bfa70b23a57ced783acade739adf181212d382a3f09736900
kpatch-patch-4_18_0-193_91_1-debugsource-1-1.el8_2.x86_64.rpm SHA-256: 81ffa1f70ac252c79741f826590b9d1a713ed1213e34179e8b8e624fb1fbc060

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility