Lucene search

K
redhatRedHatRHSA-2023:4146
HistoryJul 18, 2023 - 7:34 a.m.

(RHSA-2023:4146) Important: kpatch-patch security update

2023-07-1807:34:04
access.redhat.com
31
kpatch-patch module
security update
use-after-free
privilege escalation
remote dos
nf_tables
cve-2023-0461
cve-2023-1281
cve-2023-1390
cve-2023-32233
references section

0.002 Low

EPSS

Percentile

54.9%

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)

  • kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)

  • kernel: remote DoS in TIPC kernel module (CVE-2023-1390)

  • kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.