[RHSA-2024:1251] kpatch-patch security update
Severity
Important
Affected Packages
12
CVEs
1
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/kpatch-patch-5_14_0-362_8_1?arch=x86_64&distro=redhat-9.3 | < 1-3.el9_3 |
pkg:rpm/redhat/kpatch-patch-5_14_0-362_8_1?arch=ppc64le&distro=redhat-9.3 | < 1-3.el9_3 |
pkg:rpm/redhat/kpatch-patch-5_14_0-362_18_1?arch=x86_64&distro=redhat-9.3 | < 1-1.el9_3 |
pkg:rpm/redhat/kpatch-patch-5_14_0-362_18_1?arch=ppc64le&distro=redhat-9.3 | < 1-1.el9_3 |
pkg:rpm/redhat/kpatch-patch-5_14_0-362_13_1?arch=x86_64&distro=redhat-9.3 | < 1-2.el9_3 |
pkg:rpm/redhat/kpatch-patch-5_14_0-362_13_1?arch=ppc64le&distro=redhat-9.3 | < 1-2.el9_3 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.3 | < 5.14.0-362.8.1.el9_3 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.3 | < 5.14.0-362.13.1.el9_3 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.3 | < 5.14.0-362.18.1.el9_3 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.3 | < 5.14.0-362.8.1.el9_3 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.3 | < 5.14.0-362.13.1.el9_3 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.3 | < 5.14.0-362.18.1.el9_3 |
- ID
- RHSA-2024:1251
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2024:1251
- Published
-
2024-03-12T00:00:00
(6 months ago) - Modified
-
2024-03-12T00:00:00
(6 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2253908 | https://bugzilla.redhat.com/2253908 | |
RHSA | RHSA-2024:1251 | https://access.redhat.com/errata/RHSA-2024:1251 | |
CVE | CVE-2024-0646 | https://access.redhat.com/security/cve/CVE-2024-0646 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-5_14_0-362_8_1?arch=x86_64&distro=redhat-9.3 | redhat | kpatch-patch-5_14_0-362_8_1 | < 1-3.el9_3 | redhat-9.3 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-5_14_0-362_8_1?arch=ppc64le&distro=redhat-9.3 | redhat | kpatch-patch-5_14_0-362_8_1 | < 1-3.el9_3 | redhat-9.3 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-5_14_0-362_18_1?arch=x86_64&distro=redhat-9.3 | redhat | kpatch-patch-5_14_0-362_18_1 | < 1-1.el9_3 | redhat-9.3 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-5_14_0-362_18_1?arch=ppc64le&distro=redhat-9.3 | redhat | kpatch-patch-5_14_0-362_18_1 | < 1-1.el9_3 | redhat-9.3 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-5_14_0-362_13_1?arch=x86_64&distro=redhat-9.3 | redhat | kpatch-patch-5_14_0-362_13_1 | < 1-2.el9_3 | redhat-9.3 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-5_14_0-362_13_1?arch=ppc64le&distro=redhat-9.3 | redhat | kpatch-patch-5_14_0-362_13_1 | < 1-2.el9_3 | redhat-9.3 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.3 | redhat | kernel | < 5.14.0-362.8.1.el9_3 | redhat-9.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.3 | redhat | kernel | < 5.14.0-362.13.1.el9_3 | redhat-9.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.3 | redhat | kernel | < 5.14.0-362.18.1.el9_3 | redhat-9.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.3 | redhat | kernel | < 5.14.0-362.8.1.el9_3 | redhat-9.3 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.3 | redhat | kernel | < 5.14.0-362.13.1.el9_3 | redhat-9.3 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.3 | redhat | kernel | < 5.14.0-362.18.1.el9_3 | redhat-9.3 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |