Bug 2056597
Summary: | CVE-2022-0435 kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS [ovirt-4.5] | ||
---|---|---|---|
Product: | [oVirt] ovirt-node | Reporter: | Sandro Bonazzola <sbonazzo> |
Component: | Included packages | Assignee: | Sandro Bonazzola <sbonazzo> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | Sandro Bonazzola <sbonazzo> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 4.4.10 | CC: | arachman, bugs, cshao, lsvaty, lveyde, mavital, peyu, sanja, sbonazzo, weiwang, yaniwang |
Target Milestone: | ovirt-4.5.0-1 | Keywords: | Security, SecurityTracking, VerifiedUpstream |
Target Release: | 4.5.0.1 | Flags: | sbonazzo:
ovirt-4.5+
cshao: testing_ack+ |
Hardware: | Unspecified | ||
OS: | Unspecified | ||
URL: | https://koji.mbox.centos.org/koji/packageinfo?packageID=866 | ||
Whiteboard: | |||
Fixed In Version: | kernel-4.18.0-383.el8 | Doc Type: | Release Note |
Doc Text: |
oVirt Node has been updated with newer kernel release including fixes for [CVE-2022-0435](https://bugzilla.redhat.com/show_bug.cgi?id=2048738)
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-04-26 08:11:38 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | Node | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2048971, 2065587, 2067089 | ||
Bug Blocks: | 2048738 |
Description
Sandro Bonazzola
2022-02-21 14:54:00 UTC
As of March 7th https://koji.mbox.centos.org/koji/packageinfo?packageID=866 didn't get the fix yet. Keeping monitored. Target release should be placed once a package build is known to fix a issue. Since this bug is not modified, the target version has been reset. Please use target milestone to plan a fix for a oVirt release. |