Oval Definition:oval:com.redhat.rhsa:def:20231008
Revision Date:2023-02-28Version:637
Title:RHSA-2023:1008: kpatch-patch security update (Important)
Description:This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)

  • kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)

  • kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379)

  • kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179)

    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2022-3564
    CVE-2022-4378
    CVE-2022-4379
    CVE-2023-0179
    RHSA-2023:1008
    Platform(s):Red Hat Enterprise Linux 9
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 9 is installed
  • AND
  • kernel version 0:5.14.0-162.6.1.el9_1 is currently running
  • OR kernel version 0:5.14.0-162.6.1.el9_1 is set to boot up on next boot
  • kernel version equals 0:5.14.0-162.6.1.el9_1
  • AND kernel is signed with Red Hat redhatrelease2 key
  • kernel version 0:5.14.0-162.12.1.el9_1 is currently running
  • OR kernel version 0:5.14.0-162.12.1.el9_1 is set to boot up on next boot
  • kernel version equals 0:5.14.0-162.12.1.el9_1
  • AND kernel is signed with Red Hat redhatrelease2 key
  • BACK