RHSA-2023:7419 -- Redhat kpatch-patchID: oval:org.secpod.oval:def:95302 | Date: (C)2023-12-01 (M)2024-04-25 |
Class: PATCH | Family: unix |
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Security Fix(es): kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead (CVE-2023-3611) kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776) kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208)
Platform: |
Red Hat Enterprise Linux 7 |