QID 243057
Date Published: 2024-03-14
QID 243057: Red Hat Update for kpatch-patch (RHSA-2024:1278)
This is a kernel live patch module which is automatically loaded by the rpm post-install script to modify the code of a running kernel...Security Fix(es):
- kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (cve-2024-0646).
Kernel: use-after-free in sch_qfq network scheduler (cve-2023-4921).
Kernel: igb driver inadequate buffer size for frames larger than mtu (cve-2023-45871).
Kernel: use after free in nvmet_tcp_free_crypto in nvme (cve-2023-5178).
Kernel: net/sched: sch_hfsc uaf (cve-2023-4623).
Kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead (cve-2023-3611).
Kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (cve-2023-35001).
Kernel: uaf in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (cve-2023-3390).
Kernel: out-of-bounds write in qfq_change_class function (cve-2023-31436).
- Red Hat enterprise linux server for power le - update services for sap solutions 8.2 ppc64le.
Red hat enterprise linux for x86_64 - update services for sap solutions 8.2 x86_64.
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
Solution
Refer to Red Hat security advisory RHSA-2024:1278 for updates and patch information.
Vendor References
- RHSA-2024:1278 -
access.redhat.com/errata/RHSA-2024:1278
CVEs related to QID 243057
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| RHSA-2024:1278 | Red Hat Enterprise Linux |
|