[RHSA-2020:5050] kpatch-patch security update
Severity
Important
Affected Packages
16
CVEs
1
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2020:5050
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2020:5050
- Published
-
2020-11-10T00:00:00
(3 years ago) - Modified
-
2020-11-10T00:00:00
(3 years ago) - Rights
- Copyright 2020 Red Hat, Inc.
- Other Advisories
-
- ELSA-2020-4286
- ELSA-2020-5437
- ELSA-2020-5884
- ELSA-2020-5913
- FEDORA-2020-00e872744f
- FEDORA-2020-5081eec059
- FEDORA-2020-708b23f2ce
- MS:CVE-2020-14385
- openSUSE-SU-2020:1586-1
- openSUSE-SU-2021:0242-1
- RHSA-2020:4286
- RHSA-2020:4289
- RHSA-2020:4331
- RHSA-2020:5437
- RHSA-2020:5441
- SUSE-SU-2020:2879-1
- SUSE-SU-2020:2908-1
- USN-4576-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1874800 | https://bugzilla.redhat.com/1874800 | |
RHSA | RHSA-2020:5050 | https://access.redhat.com/errata/RHSA-2020:5050 | |
CVE | CVE-2020-14385 | https://access.redhat.com/security/cve/CVE-2020-14385 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_6_1 | < 1-1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_6_1 | < 1-1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_2_2 | < 1-1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_2_2 | < 1-1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_2_1 | < 1-1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_2_1 | < 1-1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160 | < 1-1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160 | < 1-1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.2.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.2.2.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.6.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.2.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.2.2.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.6.1.el7 | redhat-7 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |