Vulnerability Database
Blog
FAQ
Docs
RHSA-2024:0554
See a problem?
Please try reporting it
to the source
first.
Source
https://access.redhat.com/errata/RHSA-2024:0554
Import Source
https://security.access.redhat.com/data/osv/RHSA-2024:0554.json
JSON Data
https://api.osv.dev/v1/vulns/RHSA-2024:0554
Related
CVE-2023-2163
CVE-2023-31436
CVE-2023-3611
CVE-2023-3812
CVE-2023-45871
CVE-2023-4622
CVE-2023-4623
CVE-2023-5178
Published
2024-09-13T21:19:40Z
Modified
2024-09-13T21:19:40Z
Severity
8.8 (High)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
Red Hat Security Advisory: kpatch-patch security update
Details
References
https://access.redhat.com/errata/RHSA-2024:0554
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=2192671
https://bugzilla.redhat.com/show_bug.cgi?id=2224048
https://bugzilla.redhat.com/show_bug.cgi?id=2225191
https://bugzilla.redhat.com/show_bug.cgi?id=2237757
https://bugzilla.redhat.com/show_bug.cgi?id=2237760
https://bugzilla.redhat.com/show_bug.cgi?id=2240249
https://bugzilla.redhat.com/show_bug.cgi?id=2241924
https://bugzilla.redhat.com/show_bug.cgi?id=2244723
https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0554.json
https://access.redhat.com/security/cve/CVE-2023-2163
https://www.cve.org/CVERecord?id=CVE-2023-2163
https://nvd.nist.gov/vuln/detail/CVE-2023-2163
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed
https://access.redhat.com/security/cve/CVE-2023-3611
https://www.cve.org/CVERecord?id=CVE-2023-3611
https://nvd.nist.gov/vuln/detail/CVE-2023-3611
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64
https://access.redhat.com/security/cve/CVE-2023-3812
https://www.cve.org/CVERecord?id=CVE-2023-3812
https://nvd.nist.gov/vuln/detail/CVE-2023-3812
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0
https://access.redhat.com/security/cve/CVE-2023-4622
https://www.cve.org/CVERecord?id=CVE-2023-4622
https://nvd.nist.gov/vuln/detail/CVE-2023-4622
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=790c2f9d15b594350ae9bca7b236f2b1859de02c
https://access.redhat.com/security/cve/CVE-2023-4623
https://www.cve.org/CVERecord?id=CVE-2023-4623
https://nvd.nist.gov/vuln/detail/CVE-2023-4623
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f
https://access.redhat.com/security/cve/CVE-2023-5178
https://www.cve.org/CVERecord?id=CVE-2023-5178
https://nvd.nist.gov/vuln/detail/CVE-2023-5178
https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/
https://access.redhat.com/security/cve/CVE-2023-31436
https://www.cve.org/CVERecord?id=CVE-2023-31436
https://nvd.nist.gov/vuln/detail/CVE-2023-31436
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d
https://access.redhat.com/security/cve/CVE-2023-45871
https://www.cve.org/CVERecord?id=CVE-2023-45871
https://nvd.nist.gov/vuln/detail/CVE-2023-45871
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f
Affected packages
Red Hat:rhel_eus:8.8::baseos
/
kpatch-patch-4_18_0-477_21_1
Package
Name
kpatch-patch-4_18_0-477_21_1
Purl
pkg:rpm/redhat/kpatch-patch-4_18_0-477_21_1
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1-3.el8_8
Red Hat:rhel_eus:8.8::baseos
/
kpatch-patch-4_18_0-477_21_1-debuginfo
Package
Name
kpatch-patch-4_18_0-477_21_1-debuginfo
Purl
pkg:rpm/redhat/kpatch-patch-4_18_0-477_21_1-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1-3.el8_8
Red Hat:rhel_eus:8.8::baseos
/
kpatch-patch-4_18_0-477_21_1-debugsource
Package
Name
kpatch-patch-4_18_0-477_21_1-debugsource
Purl
pkg:rpm/redhat/kpatch-patch-4_18_0-477_21_1-debugsource
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1-3.el8_8
Red Hat:rhel_eus:8.8::baseos
/
kpatch-patch-4_18_0-477_27_1
Package
Name
kpatch-patch-4_18_0-477_27_1
Purl
pkg:rpm/redhat/kpatch-patch-4_18_0-477_27_1
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1-2.el8_8
Red Hat:rhel_eus:8.8::baseos
/
kpatch-patch-4_18_0-477_27_1-debuginfo
Package
Name
kpatch-patch-4_18_0-477_27_1-debuginfo
Purl
pkg:rpm/redhat/kpatch-patch-4_18_0-477_27_1-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1-2.el8_8
Red Hat:rhel_eus:8.8::baseos
/
kpatch-patch-4_18_0-477_27_1-debugsource
Package
Name
kpatch-patch-4_18_0-477_27_1-debugsource
Purl
pkg:rpm/redhat/kpatch-patch-4_18_0-477_27_1-debugsource
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1-2.el8_8
Red Hat:rhel_eus:8.8::baseos
/
kpatch-patch-4_18_0-477_36_1
Package
Name
kpatch-patch-4_18_0-477_36_1
Purl
pkg:rpm/redhat/kpatch-patch-4_18_0-477_36_1
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1-1.el8_8
Red Hat:rhel_eus:8.8::baseos
/
kpatch-patch-4_18_0-477_36_1-debuginfo
Package
Name
kpatch-patch-4_18_0-477_36_1-debuginfo
Purl
pkg:rpm/redhat/kpatch-patch-4_18_0-477_36_1-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1-1.el8_8
Red Hat:rhel_eus:8.8::baseos
/
kpatch-patch-4_18_0-477_36_1-debugsource
Package
Name
kpatch-patch-4_18_0-477_36_1-debugsource
Purl
pkg:rpm/redhat/kpatch-patch-4_18_0-477_36_1-debugsource
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1-1.el8_8
RHSA-2024:0554 - OSV