[RHSA-2024:1323] kpatch-patch security update

Severity Important
Affected Packages 16
CVEs 4

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921)

  • kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871)

  • kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)

  • kernel: out-of-bounds write in qfq_change_class function (CVE-2023-31436)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

ID
RHSA-2024:1323
Severity
important
URL
https://access.redhat.com/errata/RHSA-2024:1323
Published
2024-03-13T00:00:00
(6 months ago)
Modified
2024-03-13T00:00:00
(6 months ago)
Rights
Copyright 2024 Red Hat, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1160_99_1?arch=x86_64&distro=redhat-7 redhat kpatch-patch-3_10_0-1160_99_1 < 1-4.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1160_99_1?arch=ppc64le&distro=redhat-7 redhat kpatch-patch-3_10_0-1160_99_1 < 1-4.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1160_108_1?arch=x86_64&distro=redhat-7 redhat kpatch-patch-3_10_0-1160_108_1 < 1-1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1160_108_1?arch=ppc64le&distro=redhat-7 redhat kpatch-patch-3_10_0-1160_108_1 < 1-1.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1160_105_1?arch=x86_64&distro=redhat-7 redhat kpatch-patch-3_10_0-1160_105_1 < 1-2.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1160_105_1?arch=ppc64le&distro=redhat-7 redhat kpatch-patch-3_10_0-1160_105_1 < 1-2.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1160_102_1?arch=x86_64&distro=redhat-7 redhat kpatch-patch-3_10_0-1160_102_1 < 1-3.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kpatch-patch-3_10_0-1160_102_1?arch=ppc64le&distro=redhat-7 redhat kpatch-patch-3_10_0-1160_102_1 < 1-3.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 redhat kernel < 3.10.0-1160.99.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 redhat kernel < 3.10.0-1160.102.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 redhat kernel < 3.10.0-1160.105.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 redhat kernel < 3.10.0-1160.108.1.el7 redhat-7 x86_64
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 redhat kernel < 3.10.0-1160.99.1.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 redhat kernel < 3.10.0-1160.102.1.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 redhat kernel < 3.10.0-1160.105.1.el7 redhat-7 ppc64le
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 redhat kernel < 3.10.0-1160.108.1.el7 redhat-7 ppc64le
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...