Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:4834 - Security Advisory
Issued:
2023-08-29
Updated:
2023-08-29

RHSA-2023:4834 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le

Fixes

  • BZ - 2215768 - CVE-2023-35788 kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()

CVEs

  • CVE-2023-35788

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
kpatch-patch-3_10_0-1160_83_1-1-3.el7.src.rpm SHA-256: e0e3a43d0ce53804fde357c3fa04bd3fb19ea30001e0331f9b329a443cffc780
kpatch-patch-3_10_0-1160_88_1-1-2.el7.src.rpm SHA-256: cb0c0efc6f97b92d135f2e38862c10c36e1e98220dee45b4e6c0a3b582f07218
kpatch-patch-3_10_0-1160_90_1-1-2.el7.src.rpm SHA-256: 79181abb765b51f9fd3684ee18263733b75da597c5b4a343e8e197c57f34b9e4
kpatch-patch-3_10_0-1160_92_1-1-2.el7.src.rpm SHA-256: 442b3e4e49047bd5f0d2de60a49bb256e6eaa7852ea85518f3f8e531fec18c94
kpatch-patch-3_10_0-1160_95_1-1-1.el7.src.rpm SHA-256: b41d67e1a39170286b9263efb30f684c23e940c2c562417b2c2a14d6c292e05a
x86_64
kpatch-patch-3_10_0-1160_83_1-1-3.el7.x86_64.rpm SHA-256: 2a84e65ddbbe8bb6f95106c441d64296c7f7cee24e7e66f18dce831c480d14f0
kpatch-patch-3_10_0-1160_83_1-debuginfo-1-3.el7.x86_64.rpm SHA-256: 5f718ba028d700b7bcada54431dd6300ca014587258cec2b2d83ba29ddeb65a1
kpatch-patch-3_10_0-1160_88_1-1-2.el7.x86_64.rpm SHA-256: c9bd979116c596677b8df12a9c83752f73a12d0de321b40b0c9d2af0d63bd265
kpatch-patch-3_10_0-1160_88_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: 19e04e2b90b846cab76dff2f0808556f4431dca8b74c5d36add1475db041a1b2
kpatch-patch-3_10_0-1160_90_1-1-2.el7.x86_64.rpm SHA-256: 7d088f4a86aad55a103d44f28b3af7366d1386e65b33472d3b5c35078207aa1d
kpatch-patch-3_10_0-1160_90_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: 0c6a272804ee73909cac5af896226704bdf73d4d5fcd8eafc05765466b882f1d
kpatch-patch-3_10_0-1160_92_1-1-2.el7.x86_64.rpm SHA-256: 4f4f7d83095d11409556b998eb03319ffdab0f110634de0e1c33def7d04aebda
kpatch-patch-3_10_0-1160_92_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: e8c91810cdab832da797f4c18a8a645f686bf1e0985145b8e81b269895b343d5
kpatch-patch-3_10_0-1160_95_1-1-1.el7.x86_64.rpm SHA-256: 87e7f60d6a60e11d6d1f73c97206c511e710cfb8e65a18e8d7d8ecb4319f6429
kpatch-patch-3_10_0-1160_95_1-debuginfo-1-1.el7.x86_64.rpm SHA-256: c420b746a3420b6bda5402bc1b01dfff1bd634cb1a6147135799e0233f2edd9d

Red Hat Enterprise Linux Server - Extended Life Cycle Support 7

SRPM
kpatch-patch-3_10_0-1160_83_1-1-3.el7.src.rpm SHA-256: e0e3a43d0ce53804fde357c3fa04bd3fb19ea30001e0331f9b329a443cffc780
kpatch-patch-3_10_0-1160_88_1-1-2.el7.src.rpm SHA-256: cb0c0efc6f97b92d135f2e38862c10c36e1e98220dee45b4e6c0a3b582f07218
kpatch-patch-3_10_0-1160_90_1-1-2.el7.src.rpm SHA-256: 79181abb765b51f9fd3684ee18263733b75da597c5b4a343e8e197c57f34b9e4
kpatch-patch-3_10_0-1160_92_1-1-2.el7.src.rpm SHA-256: 442b3e4e49047bd5f0d2de60a49bb256e6eaa7852ea85518f3f8e531fec18c94
kpatch-patch-3_10_0-1160_95_1-1-1.el7.src.rpm SHA-256: b41d67e1a39170286b9263efb30f684c23e940c2c562417b2c2a14d6c292e05a
x86_64
kpatch-patch-3_10_0-1160_83_1-1-3.el7.x86_64.rpm SHA-256: 2a84e65ddbbe8bb6f95106c441d64296c7f7cee24e7e66f18dce831c480d14f0
kpatch-patch-3_10_0-1160_83_1-debuginfo-1-3.el7.x86_64.rpm SHA-256: 5f718ba028d700b7bcada54431dd6300ca014587258cec2b2d83ba29ddeb65a1
kpatch-patch-3_10_0-1160_88_1-1-2.el7.x86_64.rpm SHA-256: c9bd979116c596677b8df12a9c83752f73a12d0de321b40b0c9d2af0d63bd265
kpatch-patch-3_10_0-1160_88_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: 19e04e2b90b846cab76dff2f0808556f4431dca8b74c5d36add1475db041a1b2
kpatch-patch-3_10_0-1160_90_1-1-2.el7.x86_64.rpm SHA-256: 7d088f4a86aad55a103d44f28b3af7366d1386e65b33472d3b5c35078207aa1d
kpatch-patch-3_10_0-1160_90_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: 0c6a272804ee73909cac5af896226704bdf73d4d5fcd8eafc05765466b882f1d
kpatch-patch-3_10_0-1160_92_1-1-2.el7.x86_64.rpm SHA-256: 4f4f7d83095d11409556b998eb03319ffdab0f110634de0e1c33def7d04aebda
kpatch-patch-3_10_0-1160_92_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: e8c91810cdab832da797f4c18a8a645f686bf1e0985145b8e81b269895b343d5
kpatch-patch-3_10_0-1160_95_1-1-1.el7.x86_64.rpm SHA-256: 87e7f60d6a60e11d6d1f73c97206c511e710cfb8e65a18e8d7d8ecb4319f6429
kpatch-patch-3_10_0-1160_95_1-debuginfo-1-1.el7.x86_64.rpm SHA-256: c420b746a3420b6bda5402bc1b01dfff1bd634cb1a6147135799e0233f2edd9d

Red Hat Enterprise Linux for Power, little endian 7

SRPM
kpatch-patch-3_10_0-1160_83_1-1-3.el7.src.rpm SHA-256: e0e3a43d0ce53804fde357c3fa04bd3fb19ea30001e0331f9b329a443cffc780
kpatch-patch-3_10_0-1160_88_1-1-2.el7.src.rpm SHA-256: cb0c0efc6f97b92d135f2e38862c10c36e1e98220dee45b4e6c0a3b582f07218
kpatch-patch-3_10_0-1160_90_1-1-2.el7.src.rpm SHA-256: 79181abb765b51f9fd3684ee18263733b75da597c5b4a343e8e197c57f34b9e4
kpatch-patch-3_10_0-1160_92_1-1-2.el7.src.rpm SHA-256: 442b3e4e49047bd5f0d2de60a49bb256e6eaa7852ea85518f3f8e531fec18c94
kpatch-patch-3_10_0-1160_95_1-1-1.el7.src.rpm SHA-256: b41d67e1a39170286b9263efb30f684c23e940c2c562417b2c2a14d6c292e05a
ppc64le
kpatch-patch-3_10_0-1160_83_1-1-3.el7.ppc64le.rpm SHA-256: 0b31753ec32f99313eaa3ffc60bf46d6ad485baebfb100e32c071495668683fe
kpatch-patch-3_10_0-1160_83_1-debuginfo-1-3.el7.ppc64le.rpm SHA-256: 676f52be3998575d7f93f681489d60c5b6b4c18946cc163c69e3ed20d66b0809
kpatch-patch-3_10_0-1160_88_1-1-2.el7.ppc64le.rpm SHA-256: 9da9cb6c5c89129a9ac9e1b53c67c409af5c27ef2cf76df5b1f47a531d1a5ec3
kpatch-patch-3_10_0-1160_88_1-debuginfo-1-2.el7.ppc64le.rpm SHA-256: 39da3c37bcf9c7da59405f858a85257f7b57332b386ef5943064823c29d64e47
kpatch-patch-3_10_0-1160_90_1-1-2.el7.ppc64le.rpm SHA-256: 646a09a92251d1f38aaaa4644a859cf15da64d0d0210fc7b2106acf0b20d673c
kpatch-patch-3_10_0-1160_90_1-debuginfo-1-2.el7.ppc64le.rpm SHA-256: a209b2a29e1fe318de4df0a6aeb2be109e3fa9a48a97392b2d78793c2763d34a
kpatch-patch-3_10_0-1160_92_1-1-2.el7.ppc64le.rpm SHA-256: 9343a55e92b7ba583bb62a06ff4865c0c94b2d5be21d834e28f2e836a13d5f67
kpatch-patch-3_10_0-1160_92_1-debuginfo-1-2.el7.ppc64le.rpm SHA-256: 60bb3b04f885b5b69256b9a62af968906b919e430371fb7b36e443bef6cb538a
kpatch-patch-3_10_0-1160_95_1-1-1.el7.ppc64le.rpm SHA-256: 8be1724a4e754604e075d20f2c5384e623a69395de112e5d969cdc3521218e51
kpatch-patch-3_10_0-1160_95_1-debuginfo-1-1.el7.ppc64le.rpm SHA-256: 566b0c5e9f7e363a2bab14304dedd25daac97b95f27c33718ddffcda4df1a00b

Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7

SRPM
kpatch-patch-3_10_0-1160_83_1-1-3.el7.src.rpm SHA-256: e0e3a43d0ce53804fde357c3fa04bd3fb19ea30001e0331f9b329a443cffc780
kpatch-patch-3_10_0-1160_88_1-1-2.el7.src.rpm SHA-256: cb0c0efc6f97b92d135f2e38862c10c36e1e98220dee45b4e6c0a3b582f07218
kpatch-patch-3_10_0-1160_90_1-1-2.el7.src.rpm SHA-256: 79181abb765b51f9fd3684ee18263733b75da597c5b4a343e8e197c57f34b9e4
kpatch-patch-3_10_0-1160_92_1-1-2.el7.src.rpm SHA-256: 442b3e4e49047bd5f0d2de60a49bb256e6eaa7852ea85518f3f8e531fec18c94
kpatch-patch-3_10_0-1160_95_1-1-1.el7.src.rpm SHA-256: b41d67e1a39170286b9263efb30f684c23e940c2c562417b2c2a14d6c292e05a
ppc64le
kpatch-patch-3_10_0-1160_83_1-1-3.el7.ppc64le.rpm SHA-256: 0b31753ec32f99313eaa3ffc60bf46d6ad485baebfb100e32c071495668683fe
kpatch-patch-3_10_0-1160_83_1-debuginfo-1-3.el7.ppc64le.rpm SHA-256: 676f52be3998575d7f93f681489d60c5b6b4c18946cc163c69e3ed20d66b0809
kpatch-patch-3_10_0-1160_88_1-1-2.el7.ppc64le.rpm SHA-256: 9da9cb6c5c89129a9ac9e1b53c67c409af5c27ef2cf76df5b1f47a531d1a5ec3
kpatch-patch-3_10_0-1160_88_1-debuginfo-1-2.el7.ppc64le.rpm SHA-256: 39da3c37bcf9c7da59405f858a85257f7b57332b386ef5943064823c29d64e47
kpatch-patch-3_10_0-1160_90_1-1-2.el7.ppc64le.rpm SHA-256: 646a09a92251d1f38aaaa4644a859cf15da64d0d0210fc7b2106acf0b20d673c
kpatch-patch-3_10_0-1160_90_1-debuginfo-1-2.el7.ppc64le.rpm SHA-256: a209b2a29e1fe318de4df0a6aeb2be109e3fa9a48a97392b2d78793c2763d34a
kpatch-patch-3_10_0-1160_92_1-1-2.el7.ppc64le.rpm SHA-256: 9343a55e92b7ba583bb62a06ff4865c0c94b2d5be21d834e28f2e836a13d5f67
kpatch-patch-3_10_0-1160_92_1-debuginfo-1-2.el7.ppc64le.rpm SHA-256: 60bb3b04f885b5b69256b9a62af968906b919e430371fb7b36e443bef6cb538a
kpatch-patch-3_10_0-1160_95_1-1-1.el7.ppc64le.rpm SHA-256: 8be1724a4e754604e075d20f2c5384e623a69395de112e5d969cdc3521218e51
kpatch-patch-3_10_0-1160_95_1-debuginfo-1-1.el7.ppc64le.rpm SHA-256: 566b0c5e9f7e363a2bab14304dedd25daac97b95f27c33718ddffcda4df1a00b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility