CVE-2023-52651 Affecting kernel-core package, versions <0:5.14.0-284.79.1.el9_2
Threat Intelligence
EPSS
0.04% (10th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL9-KERNELCORE-7726626
- published 21 Aug 2024
- disclosed 1 May 2024
Introduced: 1 May 2024
CVE-2023-52651 Open this link in a new tabHow to fix?
Upgrade RHEL:9
kernel-core
to version 0:5.14.0-284.79.1.el9_2 or higher.
This issue was patched in RHSA-2024:5364
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-core
package and not the kernel-core
package as distributed by RHEL
.
See How to fix?
for RHEL:9
relevant fixed versions and status.
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
References
- https://access.redhat.com/security/cve/CVE-2023-52651
- https://git.kernel.org/stable/c/0cd3b0a1dc987697cba1fe93c784365aa1f8a230
- https://git.kernel.org/stable/c/10a342fa2fe4c4dd22f2c8fe917d3b1929582076
- https://git.kernel.org/stable/c/4c4e592266b6eec748ce90e82bd9cbc9838f3633
- https://git.kernel.org/stable/c/835c5d37f4b0ba99e9ec285ffa645bc532714191
- https://git.kernel.org/stable/c/88a9dffaec779504ab3680d33cf677741c029420
- https://git.kernel.org/stable/c/90f089d77e38db1c48629f111f3c8c336be1bc38
- https://git.kernel.org/stable/c/ad25ee36f00172f7d53242dc77c69fff7ced0755
- https://git.kernel.org/stable/c/db755cf93f5895bbac491d27a8e2fe04c5f9ae4a
- https://git.kernel.org/stable/c/e1dc7aa814a95aeeb1b2c05be2b62af8423b15cc
CVSS Scores
version 3.1