[RHSA-2024:0089] kpatch-patch security update
Severity
Important
Affected Packages
8
CVEs
2
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
kernel: use after free in unix_stream_sendpage (CVE-2023-4622)
kernel: netfilter: potential slab-out-of-bound access due to integer underflow (CVE-2023-42753)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=x86_64&distro=redhat-8.9 | < 1-1.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=ppc64le&distro=redhat-8.9 | < 1-1.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=x86_64&distro=redhat-8.9 | < 1-2.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=ppc64le&distro=redhat-8.9 | < 1-2.el8_9 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | < 4.18.0-513.5.1.el8_9 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | < 4.18.0-513.9.1.el8_9 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | < 4.18.0-513.5.1.el8_9 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | < 4.18.0-513.9.1.el8_9 |
- ID
- RHSA-2024:0089
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2024:0089
- Published
-
2024-01-09T00:00:00
(8 months ago) - Modified
-
2024-01-09T00:00:00
(8 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1838
- ALAS2-2023-2264
- ALSA-2024:0113
- DSA-5492-1
- ELSA-2023-12824
- ELSA-2023-12825
- ELSA-2023-12826
- ELSA-2023-12858
- ELSA-2023-12874
- ELSA-2023-12875
- ELSA-2023-12910
- ELSA-2023-12911
- ELSA-2023-12914
- ELSA-2023-12915
- ELSA-2024-0346
- ELSA-2024-0461
- ELSA-2024-12069
- ELSA-2024-12094
- ELSA-2024-2004
- MS:CVE-2023-4622
- RHSA-2024:0113
- RHSA-2024:0134
- RHSA-2024:0340
- RHSA-2024:0346
- RHSA-2024:0347
- RHSA-2024:0371
- RHSA-2024:1960
- RHSA-2024:2003
- RHSA-2024:2004
- SSA:2023-325-01
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4035-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2023:4766-1
- SUSE-SU-2023:4775-1
- SUSE-SU-2023:4795-1
- SUSE-SU-2023:4796-1
- SUSE-SU-2023:4799-1
- SUSE-SU-2023:4801-1
- SUSE-SU-2023:4802-1
- SUSE-SU-2023:4805-1
- SUSE-SU-2023:4817-1
- SUSE-SU-2023:4820-1
- SUSE-SU-2023:4822-1
- SUSE-SU-2023:4831-1
- SUSE-SU-2023:4833-1
- SUSE-SU-2023:4836-1
- SUSE-SU-2023:4841-1
- SUSE-SU-2023:4847-1
- SUSE-SU-2023:4848-1
- SUSE-SU-2023:4849-1
- SUSE-SU-2023:4862-1
- SUSE-SU-2023:4863-1
- SUSE-SU-2023:4866-1
- SUSE-SU-2023:4871-1
- SUSE-SU-2023:4872-1
- SUSE-SU-2024:1181-1
- SUSE-SU-2024:1183-1
- SUSE-SU-2024:1236-1
- SUSE-SU-2024:1246-1
- SUSE-SU-2024:1249-1
- SUSE-SU-2024:1251-1
- SUSE-SU-2024:1252-1
- SUSE-SU-2024:1257-1
- SUSE-SU-2024:1288-1
- SUSE-SU-2024:1299-1
- SUSE-SU-2024:1312-1
- USN-6415-1
- USN-6439-1
- USN-6439-2
- USN-6440-1
- USN-6440-2
- USN-6440-3
- USN-6441-1
- USN-6441-2
- USN-6441-3
- USN-6442-1
- USN-6444-1
- USN-6444-2
- USN-6445-1
- USN-6445-2
- USN-6446-1
- USN-6446-2
- USN-6446-3
- USN-6466-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2237760 | https://bugzilla.redhat.com/2237760 | |
Bugzilla | 2239843 | https://bugzilla.redhat.com/2239843 | |
RHSA | RHSA-2024:0089 | https://access.redhat.com/errata/RHSA-2024:0089 | |
CVE | CVE-2023-42753 | https://access.redhat.com/security/cve/CVE-2023-42753 | |
CVE | CVE-2023-4622 | https://access.redhat.com/security/cve/CVE-2023-4622 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=x86_64&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_9_1 | < 1-1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=ppc64le&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_9_1 | < 1-1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=x86_64&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_5_1 | < 1-2.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=ppc64le&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_5_1 | < 1-2.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.9.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.9.1.el8_9 | redhat-8.9 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |