[RHSA-2023:7554] kpatch-patch security update
Severity
Important
Affected Packages
4
CVEs
3
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163)
kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812)
kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=x86_64&distro=redhat-8.9 | < 1-1.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=ppc64le&distro=redhat-8.9 | < 1-1.el8_9 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | < 4.18.0-513.5.1.el8_9 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | < 4.18.0-513.5.1.el8_9 |
- ID
- RHSA-2023:7554
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:7554
- Published
-
2023-11-28T00:00:00
(9 months ago) - Modified
-
2023-11-28T00:00:00
(9 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALSA-2023:7549
- DSA-5594-1
- ELSA-2023-13043
- ELSA-2023-13044
- ELSA-2023-13048
- ELSA-2023-13049
- ELSA-2023-7549
- ELSA-2024-0461
- ELSA-2024-12094
- MS:CVE-2023-3812
- MS:CVE-2023-5178
- RHSA-2023:7548
- RHSA-2023:7549
- RHSA-2024:0340
- RLSA-2023:7549
- SSA:2023-325-01
- SUSE-SU-2023:3171-1
- SUSE-SU-2023:3172-1
- SUSE-SU-2023:3180-1
- SUSE-SU-2023:3182-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3601-1
- SUSE-SU-2023:3680-1
- SUSE-SU-2023:3681-1
- SUSE-SU-2023:3705-1
- SUSE-SU-2023:3748-1
- SUSE-SU-2023:3749-1
- SUSE-SU-2023:3768-1
- SUSE-SU-2023:3772-1
- SUSE-SU-2023:3783-1
- SUSE-SU-2023:3786-1
- SUSE-SU-2023:3788-1
- SUSE-SU-2023:3809-1
- SUSE-SU-2023:3811-1
- SUSE-SU-2023:3812-1
- SUSE-SU-2023:3838-1
- SUSE-SU-2023:3844-1
- SUSE-SU-2023:3846-1
- SUSE-SU-2023:3889-1
- SUSE-SU-2023:3892-1
- SUSE-SU-2023:3893-1
- SUSE-SU-2023:3928-1
- SUSE-SU-2023:4343-1
- SUSE-SU-2023:4345-1
- SUSE-SU-2023:4348-1
- SUSE-SU-2023:4351-1
- SUSE-SU-2023:4358-1
- SUSE-SU-2023:4375-1
- SUSE-SU-2023:4377-1
- SUSE-SU-2023:4378-1
- SUSE-SU-2023:4414-1
- SUSE-SU-2023:4766-1
- SUSE-SU-2023:4775-1
- SUSE-SU-2023:4776-1
- SUSE-SU-2023:4796-1
- SUSE-SU-2023:4801-1
- SUSE-SU-2023:4802-1
- SUSE-SU-2023:4805-1
- SUSE-SU-2023:4817-1
- SUSE-SU-2023:4820-1
- SUSE-SU-2023:4822-1
- SUSE-SU-2023:4833-1
- SUSE-SU-2023:4835-1
- SUSE-SU-2023:4836-1
- SUSE-SU-2023:4839-1
- SUSE-SU-2023:4841-1
- SUSE-SU-2023:4848-1
- SUSE-SU-2023:4849-1
- SUSE-SU-2023:4862-1
- SUSE-SU-2023:4863-1
- SUSE-SU-2023:4866-1
- SUSE-SU-2023:4867-1
- SUSE-SU-2023:4871-1
- SUSE-SU-2023:4872-1
- SUSE-SU-2024:0331-1
- SUSE-SU-2024:0348-1
- SUSE-SU-2024:0352-1
- SUSE-SU-2024:0378-1
- SUSE-SU-2024:0395-1
- SUSE-SU-2024:0414-1
- SUSE-SU-2024:0421-1
- USN-6300-1
- USN-6311-1
- USN-6332-1
- USN-6340-1
- USN-6340-2
- USN-6347-1
- USN-6349-1
- USN-6357-1
- USN-6385-1
- USN-6397-1
- USN-6497-1
- USN-6534-1
- USN-6534-2
- USN-6534-3
- USN-6536-1
- USN-6537-1
- USN-6548-1
- USN-6548-2
- USN-6548-3
- USN-6548-4
- USN-6548-5
- USN-6549-1
- USN-6549-2
- USN-6549-3
- USN-6549-4
- USN-6549-5
- USN-6573-1
- USN-6635-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2224048 | https://bugzilla.redhat.com/2224048 | |
Bugzilla | 2240249 | https://bugzilla.redhat.com/2240249 | |
Bugzilla | 2241924 | https://bugzilla.redhat.com/2241924 | |
RHSA | RHSA-2023:7554 | https://access.redhat.com/errata/RHSA-2023:7554 | |
CVE | CVE-2023-2163 | https://access.redhat.com/security/cve/CVE-2023-2163 | |
CVE | CVE-2023-3812 | https://access.redhat.com/security/cve/CVE-2023-3812 | |
CVE | CVE-2023-5178 | https://access.redhat.com/security/cve/CVE-2023-5178 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=x86_64&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_5_1 | < 1-1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=ppc64le&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_5_1 | < 1-1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |