CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-5.14.0-70.85.1.el9_0.
Security Fix(es):
kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)
kernel: net: CVE-2024-36971 kernel: UAF in network route management (CVE-2024-36971)
kernel: virtio-net: tap: mlx5_core short frame denial of service (CVE-2024-41090)
kernel: virtio-net: tun: mlx5_core short frame denial of service (CVE-2024-41091)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | kernel-rt | * | cpe:2.3:o:redhat:kernel-rt:*:*:*:*:*:*:*:* |
redhat | kernel | * | cpe:2.3:a:redhat:kernel:*:*:*:*:*:*:*:* |
redhat | enterprise_linux | nfv | cpe:2.3:o:redhat:enterprise_linux:nfv:*:*:*:*:*:*:* |
redhat | enterprise_linux | 8 | cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:* |
redhat | enterprise_linux | 9 | cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:* |