[RHSA-2023:7734] kpatch-patch security update
Severity
Important
Affected Packages
4
CVEs
2
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
kernel: use-after-free vulnerability in the smb client component (CVE-2023-5345)
kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/kpatch-patch-5_14_0-362_8_1?arch=x86_64&distro=redhat-9.3 | < 1-1.el9_3 |
pkg:rpm/redhat/kpatch-patch-5_14_0-362_8_1?arch=ppc64le&distro=redhat-9.3 | < 1-1.el9_3 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.3 | < 5.14.0-362.8.1.el9_3 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.3 | < 5.14.0-362.8.1.el9_3 |
- ID
- RHSA-2023:7734
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:7734
- Published
-
2023-12-12T00:00:00
(9 months ago) - Modified
-
2023-12-12T00:00:00
(9 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1838
- ALAS2-2023-2264
- ALSA-2024:0897
- ELSA-2023-13043
- ELSA-2023-13047
- ELSA-2023-7749
- ELSA-2024-0897
- ELSA-2024-12169
- ELSA-2024-1249
- FEDORA-2023-50bd7c9c12
- FEDORA-2023-830d9ec624
- FEDORA-2023-c3bb819677
- RHSA-2024:0876
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:1249
- RHSA-2024:1323
- RHSA-2024:1332
- SSA:2023-325-01
- SUSE-SU-2023:4035-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4730-1
- SUSE-SU-2023:4731-1
- SUSE-SU-2023:4732-1
- SUSE-SU-2023:4733-1
- SUSE-SU-2023:4734-1
- SUSE-SU-2023:4735-1
- SUSE-SU-2023:4766-1
- SUSE-SU-2023:4775-1
- SUSE-SU-2023:4782-1
- SUSE-SU-2023:4783-1
- SUSE-SU-2023:4784-1
- SUSE-SU-2023:4801-1
- SUSE-SU-2023:4805-1
- SUSE-SU-2023:4810-1
- SUSE-SU-2023:4811-1
- SUSE-SU-2023:4822-1
- SUSE-SU-2023:4841-1
- SUSE-SU-2023:4848-1
- SUSE-SU-2023:4863-1
- SUSE-SU-2023:4872-1
- SUSE-SU-2023:4882-1
- SUSE-SU-2023:4883-1
- USN-6461-1
- USN-6494-1
- USN-6494-2
- USN-6495-1
- USN-6495-2
- USN-6496-1
- USN-6496-2
- USN-6502-1
- USN-6502-2
- USN-6502-3
- USN-6502-4
- USN-6503-1
- USN-6516-1
- USN-6520-1
- USN-6532-1
- USN-6537-1
- USN-6572-1
- USN-6607-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2242172 | https://bugzilla.redhat.com/2242172 | |
Bugzilla | 2244723 | https://bugzilla.redhat.com/2244723 | |
RHSA | RHSA-2023:7734 | https://access.redhat.com/errata/RHSA-2023:7734 | |
CVE | CVE-2023-45871 | https://access.redhat.com/security/cve/CVE-2023-45871 | |
CVE | CVE-2023-5345 | https://access.redhat.com/security/cve/CVE-2023-5345 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-5_14_0-362_8_1?arch=x86_64&distro=redhat-9.3 | redhat | kpatch-patch-5_14_0-362_8_1 | < 1-1.el9_3 | redhat-9.3 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-5_14_0-362_8_1?arch=ppc64le&distro=redhat-9.3 | redhat | kpatch-patch-5_14_0-362_8_1 | < 1-1.el9_3 | redhat-9.3 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.3 | redhat | kernel | < 5.14.0-362.8.1.el9_3 | redhat-9.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.3 | redhat | kernel | < 5.14.0-362.8.1.el9_3 | redhat-9.3 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |