[RHSA-2020:2125] kpatch-patch security update
Severity
Important
Affected Packages
4
CVEs
1
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/kpatch-patch-4_18_0-193?arch=x86_64&distro=redhat-8 | < 1-2.el8 |
pkg:rpm/redhat/kpatch-patch-4_18_0-193?arch=ppc64le&distro=redhat-8 | < 1-2.el8 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 | < 4.18.0-193.el8 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 | < 4.18.0-193.el8 |
- ID
- RHSA-2020:2125
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2020:2125
- Published
-
2020-05-13T00:00:00
(4 years ago) - Modified
-
2020-05-13T00:00:00
(4 years ago) - Rights
- Copyright 2020 Red Hat, Inc.
- Other Advisories
-
- ALAS-2020-1366
- ALAS-2020-1382
- ALAS2-2020-1425
- DSA-4698-1
- DSA-4699-1
- ELSA-2020-2082
- ELSA-2020-2102
- ELSA-2020-2103
- ELSA-2020-5755
- ELSA-2020-5756
- ELSA-2021-9002
- FEDORA-2020-203ffedeb5
- FEDORA-2020-4336d63533
- FEDORA-2020-5a69decc0c
- FEDORA-2020-c6b9fff7f8
- FEDORA-2020-e47d28bc2b
- MS:CVE-2020-10711
- openSUSE-SU-2020:0801-1
- openSUSE-SU-2020:0935-1
- openSUSE-SU-2021:0242-1
- RHSA-2020:2082
- RHSA-2020:2085
- RHSA-2020:2102
- RHSA-2020:2103
- RHSA-2020:2171
- SSA:2020-163-01
- SUSE-SU-2020:1587-1
- SUSE-SU-2020:1599-1
- SUSE-SU-2020:1602-1
- SUSE-SU-2020:1603-1
- SUSE-SU-2020:1604-1
- SUSE-SU-2020:1605-1
- SUSE-SU-2020:1663-1
- SUSE-SU-2020:2027-1
- SUSE-SU-2020:2105-1
- SUSE-SU-2020:2134-1
- SUSE-SU-2020:2152-1
- SUSE-SU-2020:2156-1
- SUSE-SU-2020:2478-1
- SUSE-SU-2020:2487-1
- USN-4411-1
- USN-4412-1
- USN-4413-1
- USN-4414-1
- USN-4419-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1825116 | https://bugzilla.redhat.com/1825116 | |
RHSA | RHSA-2020:2125 | https://access.redhat.com/errata/RHSA-2020:2125 | |
CVE | CVE-2020-10711 | https://access.redhat.com/security/cve/CVE-2020-10711 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-193?arch=x86_64&distro=redhat-8 | redhat | kpatch-patch-4_18_0-193 | < 1-2.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-193?arch=ppc64le&distro=redhat-8 | redhat | kpatch-patch-4_18_0-193 | < 1-2.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 | redhat | kernel | < 4.18.0-193.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 | redhat | kernel | < 4.18.0-193.el8 | redhat-8 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |