Bug 2056597

Summary: CVE-2022-0435 kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS [ovirt-4.5]
Product: [oVirt] ovirt-node Reporter: Sandro Bonazzola <sbonazzo>
Component: Included packagesAssignee: Sandro Bonazzola <sbonazzo>
Status: CLOSED CURRENTRELEASE QA Contact: Sandro Bonazzola <sbonazzo>
Severity: high Docs Contact:
Priority: high    
Version: 4.4.10CC: arachman, bugs, cshao, lsvaty, lveyde, mavital, peyu, sanja, sbonazzo, weiwang, yaniwang
Target Milestone: ovirt-4.5.0-1Keywords: Security, SecurityTracking, VerifiedUpstream
Target Release: 4.5.0.1Flags: sbonazzo: ovirt-4.5+
cshao: testing_ack+
Hardware: Unspecified   
OS: Unspecified   
URL: https://koji.mbox.centos.org/koji/packageinfo?packageID=866
Whiteboard:
Fixed In Version: kernel-4.18.0-383.el8 Doc Type: Release Note
Doc Text:
oVirt Node has been updated with newer kernel release including fixes for [CVE-2022-0435](https://bugzilla.redhat.com/show_bug.cgi?id=2048738)
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-04-26 08:11:38 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: Node RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2048971, 2065587, 2067089    
Bug Blocks: 2048738    

Description Sandro Bonazzola 2022-02-21 14:54:00 UTC
This bug was created to ensure that one or more security vulnerabilities are fixed in affected versions of oVirt.

For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.

Comment 1 Sandro Bonazzola 2022-03-07 06:50:39 UTC
As of March 7th https://koji.mbox.centos.org/koji/packageinfo?packageID=866 didn't get the fix yet. Keeping monitored.

Comment 2 Sandro Bonazzola 2022-04-22 08:59:12 UTC
https://koji.mbox.centos.org/koji/buildinfo?buildID=21679

Comment 3 RHEL Program Management 2022-04-22 08:59:19 UTC
Target release should be placed once a package build is known to fix a issue. Since this bug is not modified, the target version has been reset. Please use target milestone to plan a fix for a oVirt release.