First published: Tue Oct 10 2023(Updated: )
Important: kpatch-patch security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | ||
redhat/kpatch-patch | <4_18_0-193_100_1-1-4.el8_2 | 4_18_0-193_100_1-1-4.el8_2 |
redhat/kpatch-patch | <4_18_0-193_105_1-1-3.el8_2 | 4_18_0-193_105_1-1-3.el8_2 |
redhat/kpatch-patch | <4_18_0-193_109_1-1-2.el8_2 | 4_18_0-193_109_1-1-2.el8_2 |
redhat/kpatch-patch | <4_18_0-193_113_1-1-1.el8_2 | 4_18_0-193_113_1-1-1.el8_2 |
redhat/kpatch-patch | <4_18_0-193_100_1-1-4.el8_2 | 4_18_0-193_100_1-1-4.el8_2 |
redhat/kpatch-patch | <4_18_0-193_100_1-debuginfo-1-4.el8_2 | 4_18_0-193_100_1-debuginfo-1-4.el8_2 |
redhat/kpatch-patch | <4_18_0-193_100_1-debugsource-1-4.el8_2 | 4_18_0-193_100_1-debugsource-1-4.el8_2 |
redhat/kpatch-patch | <4_18_0-193_105_1-1-3.el8_2 | 4_18_0-193_105_1-1-3.el8_2 |
redhat/kpatch-patch | <4_18_0-193_105_1-debuginfo-1-3.el8_2 | 4_18_0-193_105_1-debuginfo-1-3.el8_2 |
redhat/kpatch-patch | <4_18_0-193_105_1-debugsource-1-3.el8_2 | 4_18_0-193_105_1-debugsource-1-3.el8_2 |
redhat/kpatch-patch | <4_18_0-193_109_1-1-2.el8_2 | 4_18_0-193_109_1-1-2.el8_2 |
redhat/kpatch-patch | <4_18_0-193_109_1-debuginfo-1-2.el8_2 | 4_18_0-193_109_1-debuginfo-1-2.el8_2 |
redhat/kpatch-patch | <4_18_0-193_109_1-debugsource-1-2.el8_2 | 4_18_0-193_109_1-debugsource-1-2.el8_2 |
redhat/kpatch-patch | <4_18_0-193_113_1-1-1.el8_2 | 4_18_0-193_113_1-1-1.el8_2 |
redhat/kpatch-patch | <4_18_0-193_113_1-debuginfo-1-1.el8_2 | 4_18_0-193_113_1-debuginfo-1-1.el8_2 |
redhat/kpatch-patch | <4_18_0-193_113_1-debugsource-1-1.el8_2 | 4_18_0-193_113_1-debugsource-1-1.el8_2 |
redhat/kpatch-patch | <4_18_0-193_100_1-1-4.el8_2 | 4_18_0-193_100_1-1-4.el8_2 |
redhat/kpatch-patch | <4_18_0-193_100_1-debuginfo-1-4.el8_2 | 4_18_0-193_100_1-debuginfo-1-4.el8_2 |
redhat/kpatch-patch | <4_18_0-193_100_1-debugsource-1-4.el8_2 | 4_18_0-193_100_1-debugsource-1-4.el8_2 |
redhat/kpatch-patch | <4_18_0-193_105_1-1-3.el8_2 | 4_18_0-193_105_1-1-3.el8_2 |
redhat/kpatch-patch | <4_18_0-193_105_1-debuginfo-1-3.el8_2 | 4_18_0-193_105_1-debuginfo-1-3.el8_2 |
redhat/kpatch-patch | <4_18_0-193_105_1-debugsource-1-3.el8_2 | 4_18_0-193_105_1-debugsource-1-3.el8_2 |
redhat/kpatch-patch | <4_18_0-193_109_1-1-2.el8_2 | 4_18_0-193_109_1-1-2.el8_2 |
redhat/kpatch-patch | <4_18_0-193_109_1-debuginfo-1-2.el8_2 | 4_18_0-193_109_1-debuginfo-1-2.el8_2 |
redhat/kpatch-patch | <4_18_0-193_109_1-debugsource-1-2.el8_2 | 4_18_0-193_109_1-debugsource-1-2.el8_2 |
redhat/kpatch-patch | <4_18_0-193_113_1-1-1.el8_2 | 4_18_0-193_113_1-1-1.el8_2 |
redhat/kpatch-patch | <4_18_0-193_113_1-debuginfo-1-1.el8_2 | 4_18_0-193_113_1-debuginfo-1-1.el8_2 |
redhat/kpatch-patch | <4_18_0-193_113_1-debugsource-1-1.el8_2 | 4_18_0-193_113_1-debugsource-1-1.el8_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:5580 is high.
The kpatch-patch package with version 4_18_0-193_100_1-1-4.el8_2 and other versions are affected.
To fix RHSA-2023:5580, update the kpatch-patch package to version 4_18_0-193_100_1-1-4.el8_2 or later.
You can find more information about RHSA-2023:5580 on the Red Hat Bugzilla website and the Red Hat Security Updates website.
The Common Weakness Enumeration (CWE) for RHSA-2023:5580 is CWE-416.