[RHSA-2020:0027] kpatch-patch security update

Severity Important
Affected Packages 24
CVEs 2

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security fix(es):

  • Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)

  • kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation (CVE-2019-15239)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.

Package Affected Version
pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_3?arch=x86_64&distro=redhat-7 < 1-3.el7
pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_3?arch=ppc64le&distro=redhat-7 < 1-3.el7
pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_2?arch=x86_64&distro=redhat-7 < 1-3.el7
pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_2?arch=ppc64le&distro=redhat-7 < 1-3.el7
pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1?arch=x86_64&distro=redhat-7 < 1-6.el7
pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1?arch=ppc64le&distro=redhat-7 < 1-6.el7
pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2?arch=x86_64&distro=redhat-7 < 1-9.el7
pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2?arch=ppc64le&distro=redhat-7 < 1-9.el7
pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1?arch=x86_64&distro=redhat-7 < 1-10.el7
pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1?arch=ppc64le&distro=redhat-7 < 1-10.el7
pkg:rpm/redhat/kpatch-patch-3_10_0-1062?arch=x86_64&distro=redhat-7 < 1-11.el7
pkg:rpm/redhat/kpatch-patch-3_10_0-1062?arch=ppc64le&distro=redhat-7 < 1-11.el7
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 < 3.10.0-1062.el7
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 < 3.10.0-1062.4.1.el7
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 < 3.10.0-1062.1.2.el7
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 < 3.10.0-1062.1.1.el7
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 < 3.10.0-1062.4.2.el7
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 < 3.10.0-1062.4.3.el7
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 < 3.10.0-1062.el7
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 < 3.10.0-1062.4.1.el7
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 < 3.10.0-1062.1.2.el7
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 < 3.10.0-1062.1.1.el7
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 < 3.10.0-1062.4.2.el7
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 < 3.10.0-1062.4.3.el7
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_3?arch=x86_64&distro=redhat-7 redhat kpatch-patch-3_10_0-1062_4_3 < 1-3.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_3?arch=ppc64le&distro=redhat-7 redhat kpatch-patch-3_10_0-1062_4_3 < 1-3.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_2?arch=x86_64&distro=redhat-7 redhat kpatch-patch-3_10_0-1062_4_2 < 1-3.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_2?arch=ppc64le&distro=redhat-7 redhat kpatch-patch-3_10_0-1062_4_2 < 1-3.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1?arch=x86_64&distro=redhat-7 redhat kpatch-patch-3_10_0-1062_4_1 < 1-6.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1?arch=ppc64le&distro=redhat-7 redhat kpatch-patch-3_10_0-1062_4_1 < 1-6.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2?arch=x86_64&distro=redhat-7 redhat kpatch-patch-3_10_0-1062_1_2 < 1-9.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2?arch=ppc64le&distro=redhat-7 redhat kpatch-patch-3_10_0-1062_1_2 < 1-9.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1?arch=x86_64&distro=redhat-7 redhat kpatch-patch-3_10_0-1062_1_1 < 1-10.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1?arch=ppc64le&distro=redhat-7 redhat kpatch-patch-3_10_0-1062_1_1 < 1-10.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062?arch=x86_64&distro=redhat-7 redhat kpatch-patch-3_10_0-1062 < 1-11.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1062?arch=ppc64le&distro=redhat-7 redhat kpatch-patch-3_10_0-1062 < 1-11.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 redhat kernel < 3.10.0-1062.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 redhat kernel < 3.10.0-1062.4.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 redhat kernel < 3.10.0-1062.1.2.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 redhat kernel < 3.10.0-1062.1.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 redhat kernel < 3.10.0-1062.4.2.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 redhat kernel < 3.10.0-1062.4.3.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 redhat kernel < 3.10.0-1062.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 redhat kernel < 3.10.0-1062.4.1.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 redhat kernel < 3.10.0-1062.1.2.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 redhat kernel < 3.10.0-1062.1.1.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 redhat kernel < 3.10.0-1062.4.2.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 redhat kernel < 3.10.0-1062.4.3.el7 redhat-7 ppc64le
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...