[RHSA-2024:0876] kpatch-patch security update
Severity
Important
Affected Packages
12
CVEs
4
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
kernel: net/sched: sch_hfsc UAF (CVE-2023-4623)
kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921)
kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871)
kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=x86_64&distro=redhat-8.9 | < 1-2.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=ppc64le&distro=redhat-8.9 | < 1-2.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=x86_64&distro=redhat-8.9 | < 1-3.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=ppc64le&distro=redhat-8.9 | < 1-3.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_11_1?arch=x86_64&distro=redhat-8.9 | < 1-1.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_11_1?arch=ppc64le&distro=redhat-8.9 | < 1-1.el8_9 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | < 4.18.0-513.5.1.el8_9 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | < 4.18.0-513.9.1.el8_9 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | < 4.18.0-513.11.1.el8_9 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | < 4.18.0-513.5.1.el8_9 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | < 4.18.0-513.9.1.el8_9 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | < 4.18.0-513.11.1.el8_9 |
- ID
- RHSA-2024:0876
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2024:0876
- Published
-
2024-02-20T00:00:00
(6 months ago) - Modified
-
2024-02-20T00:00:00
(6 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1838
- ALAS2-2023-2264
- ALSA-2024:0897
- ELSA-2023-13039
- ELSA-2023-13043
- ELSA-2023-13047
- ELSA-2023-7749
- ELSA-2024-0461
- ELSA-2024-0897
- ELSA-2024-12110
- ELSA-2024-12149
- ELSA-2024-12169
- ELSA-2024-12187
- ELSA-2024-1248
- ELSA-2024-1249
- ELSA-2024-1831
- ELSA-2024-2004
- RHSA-2023:7734
- RHSA-2024:0340
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:1249
- RHSA-2024:1251
- RHSA-2024:1323
- RHSA-2024:1332
- RHSA-2024:1960
- RHSA-2024:2003
- RHSA-2024:2004
- SSA:2023-325-01
- SSA:2024-157-01
- SUSE-SU-2023:4028-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4035-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4164-1
- SUSE-SU-2023:4165-1
- SUSE-SU-2023:4166-1
- SUSE-SU-2023:4175-1
- SUSE-SU-2023:4201-1
- SUSE-SU-2023:4204-1
- SUSE-SU-2023:4208-1
- SUSE-SU-2023:4219-1
- SUSE-SU-2023:4239-1
- SUSE-SU-2023:4243-1
- SUSE-SU-2023:4244-1
- SUSE-SU-2023:4245-1
- SUSE-SU-2023:4260-1
- SUSE-SU-2023:4261-1
- SUSE-SU-2023:4267-1
- SUSE-SU-2023:4273-1
- SUSE-SU-2023:4278-1
- SUSE-SU-2023:4279-1
- SUSE-SU-2023:4280-1
- SUSE-SU-2023:4285-1
- SUSE-SU-2023:4300-1
- SUSE-SU-2023:4301-1
- SUSE-SU-2023:4308-1
- SUSE-SU-2023:4313-1
- SUSE-SU-2023:4321-1
- SUSE-SU-2023:4322-1
- SUSE-SU-2023:4325-1
- SUSE-SU-2023:4326-1
- SUSE-SU-2023:4328-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2023:4730-1
- SUSE-SU-2023:4731-1
- SUSE-SU-2023:4732-1
- SUSE-SU-2023:4733-1
- SUSE-SU-2023:4734-1
- SUSE-SU-2023:4735-1
- SUSE-SU-2023:4782-1
- SUSE-SU-2023:4783-1
- SUSE-SU-2023:4784-1
- SUSE-SU-2023:4810-1
- SUSE-SU-2023:4811-1
- SUSE-SU-2023:4882-1
- SUSE-SU-2023:4883-1
- SUSE-SU-2024:0469-1
- SUSE-SU-2024:0474-1
- SUSE-SU-2024:0478-1
- SUSE-SU-2024:0514-1
- SUSE-SU-2024:0515-1
- SUSE-SU-2024:0516-1
- SUSE-SU-2024:0622-1
- SUSE-SU-2024:0624-1
- SUSE-SU-2024:0655-1
- SUSE-SU-2024:0666-1
- SUSE-SU-2024:0685-1
- SUSE-SU-2024:0698-1
- SUSE-SU-2024:0727-1
- USN-6415-1
- USN-6439-1
- USN-6439-2
- USN-6440-1
- USN-6440-2
- USN-6440-3
- USN-6441-1
- USN-6441-2
- USN-6441-3
- USN-6442-1
- USN-6444-1
- USN-6444-2
- USN-6445-1
- USN-6445-2
- USN-6446-1
- USN-6446-2
- USN-6446-3
- USN-6454-1
- USN-6454-2
- USN-6454-3
- USN-6454-4
- USN-6460-1
- USN-6461-1
- USN-6466-1
- USN-6479-1
- USN-6494-1
- USN-6494-2
- USN-6495-1
- USN-6495-2
- USN-6496-1
- USN-6496-2
- USN-6502-1
- USN-6502-2
- USN-6502-3
- USN-6502-4
- USN-6516-1
- USN-6520-1
- USN-6532-1
- USN-6639-1
- USN-6648-1
- USN-6648-2
- USN-6651-1
- USN-6651-2
- USN-6651-3
- USN-6652-1
- USN-6653-1
- USN-6653-2
- USN-6653-3
- USN-6653-4
- USN-6699-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2237757 | https://bugzilla.redhat.com/2237757 | |
Bugzilla | 2244723 | https://bugzilla.redhat.com/2244723 | |
Bugzilla | 2245514 | https://bugzilla.redhat.com/2245514 | |
Bugzilla | 2253908 | https://bugzilla.redhat.com/2253908 | |
RHSA | RHSA-2024:0876 | https://access.redhat.com/errata/RHSA-2024:0876 | |
CVE | CVE-2023-45871 | https://access.redhat.com/security/cve/CVE-2023-45871 | |
CVE | CVE-2023-4623 | https://access.redhat.com/security/cve/CVE-2023-4623 | |
CVE | CVE-2023-4921 | https://access.redhat.com/security/cve/CVE-2023-4921 | |
CVE | CVE-2024-0646 | https://access.redhat.com/security/cve/CVE-2024-0646 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=x86_64&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_9_1 | < 1-2.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=ppc64le&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_9_1 | < 1-2.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=x86_64&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_5_1 | < 1-3.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=ppc64le&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_5_1 | < 1-3.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_11_1?arch=x86_64&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_11_1 | < 1-1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_11_1?arch=ppc64le&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_11_1 | < 1-1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.9.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.11.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.9.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.11.1.el8_9 | redhat-8.9 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |