[RHSA-2024:4713] kpatch-patch security update

Severity Important
Affected Packages 4
CVEs 1

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/kpatch-patch-5_14_0-427_13_1?arch=x86_64&distro=redhat-9.4 redhat kpatch-patch-5_14_0-427_13_1 < 1-1.el9_4 redhat-9.4 x86_64
Affected pkg:rpm/redhat/kpatch-patch-5_14_0-427_13_1?arch=ppc64le&distro=redhat-9.4 redhat kpatch-patch-5_14_0-427_13_1 < 1-1.el9_4 redhat-9.4 ppc64le
Affected pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.4 redhat kernel < 5.14.0-427.13.1.el9_4 redhat-9.4 x86_64
Affected pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.4 redhat kernel < 5.14.0-427.13.1.el9_4 redhat-9.4 ppc64le
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...