Bug 2083630
Summary: | CVE-2022-1012 - kernel: A vulnerability due to small table perturb size in the TCP source port generation algorithm lead to information leak. [ovirt-4.5] | ||
---|---|---|---|
Product: | [oVirt] ovirt-node | Reporter: | Sandro Bonazzola <sbonazzo> |
Component: | Included packages | Assignee: | Lev Veyde <lveyde> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | cshao <cshao> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 4.5.0.1 | CC: | arachman, bugs, cshao, lsvaty, lveyde, mavital, michal.skrivanek, peyu, sanja, sbonazzo, weiwang, yaniwang |
Target Milestone: | ovirt-4.5.2 | Keywords: | Security, SecurityTracking |
Target Release: | 4.5.2 | Flags: | sbonazzo:
ovirt-4.5+
cshao: testing_ack+ |
Hardware: | Unspecified | ||
OS: | Linux | ||
URL: | https://koji.mbox.centos.org/koji/packageinfo?packageID=866 | ||
Whiteboard: | |||
Fixed In Version: | kernel-4.18.0-408.el8 | Doc Type: | No Doc Update |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-08-11 09:21:56 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | Node | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2064876, 2087130 | ||
Bug Blocks: | 2064604 |
Description
Sandro Bonazzola
2022-05-10 13:00:22 UTC
Kernel including the fix: https://koji.mbox.centos.org/koji/buildinfo?buildID=22413 |