[RHSA-2024:1612] kpatch-patch security update
Severity
Important
Affected Packages
12
CVEs
1
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=x86_64&distro=redhat-8.9 | < 1-3.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=ppc64le&distro=redhat-8.9 | < 1-3.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=x86_64&distro=redhat-8.9 | < 1-4.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=ppc64le&distro=redhat-8.9 | < 1-4.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_11_1?arch=x86_64&distro=redhat-8.9 | < 1-2.el8_9 |
pkg:rpm/redhat/kpatch-patch-4_18_0-513_11_1?arch=ppc64le&distro=redhat-8.9 | < 1-2.el8_9 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | < 4.18.0-513.5.1.el8_9 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | < 4.18.0-513.9.1.el8_9 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | < 4.18.0-513.11.1.el8_9 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | < 4.18.0-513.5.1.el8_9 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | < 4.18.0-513.9.1.el8_9 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | < 4.18.0-513.11.1.el8_9 |
- ID
- RHSA-2024:1612
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2024:1612
- Published
-
2024-04-02T00:00:00
(5 months ago) - Modified
-
2024-04-02T00:00:00
(5 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2024-2443
- ALSA-2024:1607
- ELSA-2024-1607
- ELSA-2024-2394
- RHSA-2024:1607
- RHSA-2024:1614
- RLSA-2024:1607
- SUSE-SU-2024:0115-1
- SUSE-SU-2024:0129-1
- SUSE-SU-2024:0141-1
- SUSE-SU-2024:0156-1
- SUSE-SU-2024:0160-1
- SUSE-SU-2024:1677-1
- SUSE-SU-2024:1679-1
- SUSE-SU-2024:1680-1
- SUSE-SU-2024:1682-1
- SUSE-SU-2024:1685-1
- SUSE-SU-2024:1686-1
- SUSE-SU-2024:1692-1
- SUSE-SU-2024:1694-1
- SUSE-SU-2024:1695-1
- SUSE-SU-2024:1696-1
- SUSE-SU-2024:1705-1
- SUSE-SU-2024:1706-1
- SUSE-SU-2024:1707-1
- SUSE-SU-2024:1708-1
- SUSE-SU-2024:1709-1
- SUSE-SU-2024:1711-1
- SUSE-SU-2024:1712-1
- SUSE-SU-2024:1713-1
- SUSE-SU-2024:1719-1
- SUSE-SU-2024:1720-1
- SUSE-SU-2024:1723-1
- SUSE-SU-2024:1726-1
- SUSE-SU-2024:1729-1
- SUSE-SU-2024:1731-1
- SUSE-SU-2024:1732-1
- SUSE-SU-2024:1735-1
- SUSE-SU-2024:1736-1
- SUSE-SU-2024:1739-1
- SUSE-SU-2024:1740-1
- SUSE-SU-2024:1742-1
- SUSE-SU-2024:1746-1
- SUSE-SU-2024:1748-1
- SUSE-SU-2024:1749-1
- SUSE-SU-2024:1751-1
- SUSE-SU-2024:1753-1
- SUSE-SU-2024:1757-1
- SUSE-SU-2024:1759-1
- SUSE-SU-2024:2092-1
- SUSE-SU-2024:2100-1
- SUSE-SU-2024:2120-1
- SUSE-SU-2024:2130-1
- SUSE-SU-2024:2148-1
- SUSE-SU-2024:2162-1
- SUSE-SU-2024:2163-1
- SUSE-SU-2024:2207-1
- SUSE-SU-2024:2208-1
- SUSE-SU-2024:2337-1
- SUSE-SU-2024:2343-1
- SUSE-SU-2024:2373-1
- SUSE-SU-2024:2382-1
- SUSE-SU-2024:2446-1
- SUSE-SU-2024:2447-1
- SUSE-SU-2024:2472-1
- SUSE-SU-2024:2558-1
- SUSE-SU-2024:2722-1
- SUSE-SU-2024:2740-1
- SUSE-SU-2024:2751-1
- SUSE-SU-2024:2755-1
- SUSE-SU-2024:2821-1
- SUSE-SU-2024:2824-1
- SUSE-SU-2024:2840-1
- SUSE-SU-2024:2850-1
- SUSE-SU-2024:2851-1
- SUSE-SU-2024:3034-1
- SUSE-SU-2024:3037-1
- SUSE-SU-2024:3043-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2255498 | https://bugzilla.redhat.com/2255498 | |
RHSA | RHSA-2024:1612 | https://access.redhat.com/errata/RHSA-2024:1612 | |
CVE | CVE-2023-6546 | https://access.redhat.com/security/cve/CVE-2023-6546 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=x86_64&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_9_1 | < 1-3.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_9_1?arch=ppc64le&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_9_1 | < 1-3.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=x86_64&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_5_1 | < 1-4.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_5_1?arch=ppc64le&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_5_1 | < 1-4.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_11_1?arch=x86_64&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_11_1 | < 1-2.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-513_11_1?arch=ppc64le&distro=redhat-8.9 | redhat | kpatch-patch-4_18_0-513_11_1 | < 1-2.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.9.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.11.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.9.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.11.1.el8_9 | redhat-8.9 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |