[RHSA-2023:3705] kpatch-patch security update

Severity Important
Affected Packages 4
CVEs 2

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235)

  • kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

ID
RHSA-2023:3705
Severity
important
URL
https://access.redhat.com/errata/RHSA-2023:3705
Published
2023-06-21T00:00:00
(15 months ago)
Modified
2023-06-21T00:00:00
(15 months ago)
Rights
Copyright 2023 Red Hat, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/kpatch-patch-5_14_0-284_11_1?arch=x86_64&distro=redhat-9.2 redhat kpatch-patch-5_14_0-284_11_1 < 1-1.el9_2 redhat-9.2 x86_64
Affected pkg:rpm/redhat/kpatch-patch-5_14_0-284_11_1?arch=ppc64le&distro=redhat-9.2 redhat kpatch-patch-5_14_0-284_11_1 < 1-1.el9_2 redhat-9.2 ppc64le
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.2 redhat kernel < 5.14.0-284.11.1.el9_2 redhat-9.2 x86_64
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.2 redhat kernel < 5.14.0-284.11.1.el9_2 redhat-9.2 ppc64le
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...