[RHSA-2024:4713] kpatch-patch security update
Severity
Important
Affected Packages
4
CVEs
1
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/kpatch-patch-5_14_0-427_13_1?arch=x86_64&distro=redhat-9.4 | < 1-1.el9_4 |
pkg:rpm/redhat/kpatch-patch-5_14_0-427_13_1?arch=ppc64le&distro=redhat-9.4 | < 1-1.el9_4 |
pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.4 | < 5.14.0-427.13.1.el9_4 |
pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.4 | < 5.14.0-427.13.1.el9_4 |
- ID
- RHSA-2024:4713
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2024:4713
- Published
-
2024-07-23T00:00:00
(7 weeks ago) - Modified
-
2024-07-23T00:00:00
(7 weeks ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2024-2581
- ALSA-2024:5101
- DSA-5703-1
- ELSA-2024-4583
- ELSA-2024-5101
- RHSA-2024:5101
- RHSA-2024:5102
- RHSA-2024:5522
- RLSA-2024:4583
- RLSA-2024:5101
- USN-6949-1
- USN-6949-2
- USN-6950-1
- USN-6950-2
- USN-6950-3
- USN-6950-4
- USN-6951-1
- USN-6951-2
- USN-6951-3
- USN-6951-4
- USN-6952-1
- USN-6952-2
- USN-6953-1
- USN-6955-1
- USN-6956-1
- USN-6957-1
- USN-6979-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2277238 | https://bugzilla.redhat.com/2277238 | |
RHSA | RHSA-2024:4713 | https://access.redhat.com/errata/RHSA-2024:4713 | |
CVE | CVE-2024-36886 | https://access.redhat.com/security/cve/CVE-2024-36886 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-5_14_0-427_13_1?arch=x86_64&distro=redhat-9.4 | redhat | kpatch-patch-5_14_0-427_13_1 | < 1-1.el9_4 | redhat-9.4 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-5_14_0-427_13_1?arch=ppc64le&distro=redhat-9.4 | redhat | kpatch-patch-5_14_0-427_13_1 | < 1-1.el9_4 | redhat-9.4 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.4 | redhat | kernel | < 5.14.0-427.13.1.el9_4 | redhat-9.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.4 | redhat | kernel | < 5.14.0-427.13.1.el9_4 | redhat-9.4 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |