Severity
Important
Affected Packages
12
CVEs
1
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
![]() |
< 1-3.el8_9 |
![]() |
< 1-3.el8_9 |
![]() |
< 1-4.el8_9 |
![]() |
< 1-4.el8_9 |
![]() |
< 1-2.el8_9 |
![]() |
< 1-2.el8_9 |
![]() |
< 4.18.0-513.5.1.el8_9 |
![]() |
< 4.18.0-513.9.1.el8_9 |
![]() |
< 4.18.0-513.11.1.el8_9 |
![]() |
< 4.18.0-513.5.1.el8_9 |
![]() |
< 4.18.0-513.9.1.el8_9 |
![]() |
< 4.18.0-513.11.1.el8_9 |
- ID
- RHSA-2024:1612
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2024:1612
- Published
-
2024-04-02T00:00:00
(3 months ago) - Modified
-
2024-04-02T00:00:00
(3 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2255498 |
|
|
RHSA | RHSA-2024:1612 |
|
|
CVE | CVE-2023-6546 |
|
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=x86_64&distro=redhat-8.9 | redhat |
![]() |
< 1-3.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=ppc64le&distro=redhat-8.9 | redhat |
![]() |
< 1-3.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=x86_64&distro=redhat-8.9 | redhat |
![]() |
< 1-4.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=ppc64le&distro=redhat-8.9 | redhat |
![]() |
< 1-4.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_11_1?arch=x86_64&distro=redhat-8.9 | redhat |
![]() |
< 1-2.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_11_1?arch=ppc64le&distro=redhat-8.9 | redhat |
![]() |
< 1-2.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat |
![]() |
< 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat |
![]() |
< 4.18.0-513.9.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat |
![]() |
< 4.18.0-513.11.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat |
![]() |
< 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat |
![]() |
< 4.18.0-513.9.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat |
![]() |
< 4.18.0-513.11.1.el8_9 | redhat-8.9 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |