[RHSA-2023:3351] kpatch-patch security update

Severity Important
Affected Packages 4
CVEs 1

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/kpatch-patch-4_18_0-477_10_1?arch=x86_64&distro=redhat-8.8 redhat kpatch-patch-4_18_0-477_10_1 < 1-1.el8_8 redhat-8.8 x86_64
Affected pkg:rpm/redhat/kpatch-patch-4_18_0-477_10_1?arch=ppc64le&distro=redhat-8.8 redhat kpatch-patch-4_18_0-477_10_1 < 1-1.el8_8 redhat-8.8 ppc64le
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.8 redhat kernel < 4.18.0-477.10.1.el8_8 redhat-8.8 x86_64
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.8 redhat kernel < 4.18.0-477.10.1.el8_8 redhat-8.8 ppc64le
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...