[RHSA-2023:7734] kpatch-patch security update

Severity Important
Affected Packages 4
CVEs 2

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: use-after-free vulnerability in the smb client component (CVE-2023-5345)

  • kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/kpatch-patch-5_14_0-362_8_1?arch=x86_64&distro=redhat-9.3 redhat kpatch-patch-5_14_0-362_8_1 < 1-1.el9_3 redhat-9.3 x86_64
Affected pkg:rpm/redhat/kpatch-patch-5_14_0-362_8_1?arch=ppc64le&distro=redhat-9.3 redhat kpatch-patch-5_14_0-362_8_1 < 1-1.el9_3 redhat-9.3 ppc64le
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.3 redhat kernel < 5.14.0-362.8.1.el9_3 redhat-9.3 x86_64
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.3 redhat kernel < 5.14.0-362.8.1.el9_3 redhat-9.3 ppc64le
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...