vulnerability

CentOS Linux: CVE-2022-1966: Important: kpatch-patch security update (Multiple Advisories)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
2022-06-28
Added
2022-06-29
Modified
2025-02-19

Description

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

Solution(s)

centos-upgrade-kernelcentos-upgrade-kernel-rtcentos-upgrade-kpatch-patch-3_10_0-1160_36_2centos-upgrade-kpatch-patch-3_10_0-1160_36_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_41_1centos-upgrade-kpatch-patch-3_10_0-1160_41_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_42_2centos-upgrade-kpatch-patch-3_10_0-1160_42_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_45_1centos-upgrade-kpatch-patch-3_10_0-1160_45_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_49_1centos-upgrade-kpatch-patch-3_10_0-1160_49_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_53_1centos-upgrade-kpatch-patch-3_10_0-1160_53_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_59_1centos-upgrade-kpatch-patch-3_10_0-1160_59_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_62_1centos-upgrade-kpatch-patch-3_10_0-1160_62_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_66_1centos-upgrade-kpatch-patch-3_10_0-1160_66_1-debuginfocentos-upgrade-kpatch-patch-5_14_0-70_13_1centos-upgrade-kpatch-patch-5_14_0-70_13_1-debuginfocentos-upgrade-kpatch-patch-5_14_0-70_13_1-debugsource
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.