[RHSA-2024:1323] kpatch-patch security update
Severity
Important
Affected Packages
16
CVEs
4
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921)
kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871)
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
kernel: out-of-bounds write in qfq_change_class function (CVE-2023-31436)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2024:1323
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2024:1323
- Published
-
2024-03-13T00:00:00
(6 months ago) - Modified
-
2024-03-13T00:00:00
(6 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1744
- ALAS-2023-1838
- ALAS2-2022-1903
- ALAS2-2023-2035
- ALAS2-2023-2264
- ALSA-2023:2458
- ALSA-2023:4517
- ALSA-2023:7077
- ALSA-2024:0897
- DSA-5402-1
- ELSA-2023-12017
- ELSA-2023-12018
- ELSA-2023-12109
- ELSA-2023-12117
- ELSA-2023-12118
- ELSA-2023-12119
- ELSA-2023-12121
- ELSA-2023-13043
- ELSA-2023-13047
- ELSA-2023-2458
- ELSA-2023-4517
- ELSA-2023-7077
- ELSA-2023-7749
- ELSA-2024-0897
- ELSA-2024-12110
- ELSA-2024-12169
- ELSA-2024-1249
- ELSA-2024-1831
- MS:CVE-2023-31436
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:4517
- RHSA-2023:4531
- RHSA-2023:4541
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2023:7734
- RHSA-2024:0876
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:1249
- RHSA-2024:1332
- RLSA-2023:4517
- SSA:2022-333-01
- SSA:2023-172-02
- SSA:2023-325-01
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0420-1
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2501-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2507-1
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2537-1
- SUSE-SU-2023:2538-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2660-1
- SUSE-SU-2023:2666-1
- SUSE-SU-2023:2679-1
- SUSE-SU-2023:2680-1
- SUSE-SU-2023:2681-1
- SUSE-SU-2023:2686-1
- SUSE-SU-2023:2687-1
- SUSE-SU-2023:2689-1
- SUSE-SU-2023:2690-1
- SUSE-SU-2023:2694-1
- SUSE-SU-2023:2695-1
- SUSE-SU-2023:2697-1
- SUSE-SU-2023:2698-1
- SUSE-SU-2023:2700-1
- SUSE-SU-2023:2701-1
- SUSE-SU-2023:2702-1
- SUSE-SU-2023:2703-1
- SUSE-SU-2023:2708-1
- SUSE-SU-2023:2709-1
- SUSE-SU-2023:2710-1
- SUSE-SU-2023:2714-1
- SUSE-SU-2023:2718-1
- SUSE-SU-2023:2719-1
- SUSE-SU-2023:2720-1
- SUSE-SU-2023:2721-1
- SUSE-SU-2023:2724-1
- SUSE-SU-2023:2727-1
- SUSE-SU-2023:2731-1
- SUSE-SU-2023:2734-1
- SUSE-SU-2023:2735-1
- SUSE-SU-2023:2741-1
- SUSE-SU-2023:2743-1
- SUSE-SU-2023:2755-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4035-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2023:4730-1
- SUSE-SU-2023:4731-1
- SUSE-SU-2023:4732-1
- SUSE-SU-2023:4733-1
- SUSE-SU-2023:4734-1
- SUSE-SU-2023:4735-1
- SUSE-SU-2023:4782-1
- SUSE-SU-2023:4783-1
- SUSE-SU-2023:4784-1
- SUSE-SU-2023:4810-1
- SUSE-SU-2023:4811-1
- SUSE-SU-2023:4882-1
- SUSE-SU-2023:4883-1
- SUSE-SU-2024:0469-1
- SUSE-SU-2024:0474-1
- SUSE-SU-2024:0478-1
- SUSE-SU-2024:0514-1
- SUSE-SU-2024:0515-1
- SUSE-SU-2024:0516-1
- SUSE-SU-2024:0622-1
- SUSE-SU-2024:0624-1
- SUSE-SU-2024:0655-1
- SUSE-SU-2024:0666-1
- SUSE-SU-2024:0685-1
- SUSE-SU-2024:0698-1
- SUSE-SU-2024:0727-1
- USN-5780-1
- USN-5783-1
- USN-5794-1
- USN-5802-1
- USN-5803-1
- USN-5804-1
- USN-5804-2
- USN-5808-1
- USN-5809-1
- USN-5813-1
- USN-5814-1
- USN-5829-1
- USN-5830-1
- USN-5831-1
- USN-5832-1
- USN-5860-1
- USN-5861-1
- USN-5863-1
- USN-5875-1
- USN-5877-1
- USN-5879-1
- USN-5914-1
- USN-5918-1
- USN-6127-1
- USN-6130-1
- USN-6131-1
- USN-6132-1
- USN-6135-1
- USN-6149-1
- USN-6150-1
- USN-6162-1
- USN-6173-1
- USN-6175-1
- USN-6186-1
- USN-6222-1
- USN-6256-1
- USN-6385-1
- USN-6439-1
- USN-6439-2
- USN-6440-1
- USN-6440-2
- USN-6440-3
- USN-6441-1
- USN-6441-2
- USN-6441-3
- USN-6442-1
- USN-6444-1
- USN-6444-2
- USN-6445-1
- USN-6445-2
- USN-6446-1
- USN-6446-2
- USN-6446-3
- USN-6454-1
- USN-6454-2
- USN-6454-3
- USN-6454-4
- USN-6460-1
- USN-6461-1
- USN-6466-1
- USN-6479-1
- USN-6494-1
- USN-6494-2
- USN-6495-1
- USN-6495-2
- USN-6496-1
- USN-6496-2
- USN-6502-1
- USN-6502-2
- USN-6502-3
- USN-6502-4
- USN-6516-1
- USN-6520-1
- USN-6532-1
- USN-6699-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2147364 | https://bugzilla.redhat.com/2147364 | |
Bugzilla | 2192671 | https://bugzilla.redhat.com/2192671 | |
Bugzilla | 2244723 | https://bugzilla.redhat.com/2244723 | |
Bugzilla | 2245514 | https://bugzilla.redhat.com/2245514 | |
RHSA | RHSA-2024:1323 | https://access.redhat.com/errata/RHSA-2024:1323 | |
CVE | CVE-2022-42896 | https://access.redhat.com/security/cve/CVE-2022-42896 | |
CVE | CVE-2023-31436 | https://access.redhat.com/security/cve/CVE-2023-31436 | |
CVE | CVE-2023-45871 | https://access.redhat.com/security/cve/CVE-2023-45871 | |
CVE | CVE-2023-4921 | https://access.redhat.com/security/cve/CVE-2023-4921 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_99_1?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_99_1 | < 1-4.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_99_1?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_99_1 | < 1-4.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_108_1?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_108_1 | < 1-1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_108_1?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_108_1 | < 1-1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_105_1?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_105_1 | < 1-2.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_105_1?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_105_1 | < 1-2.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_102_1?arch=x86_64&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_102_1 | < 1-3.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-3_10_0-1160_102_1?arch=ppc64le&distro=redhat-7 | redhat | kpatch-patch-3_10_0-1160_102_1 | < 1-3.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.99.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.102.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.105.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.108.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.99.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.102.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.105.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1160.108.1.el7 | redhat-7 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |