First published: Tue Jan 23 2024(Updated: )
Important: kpatch-patch security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <3_10_0-1160_102_1-1-2.el7 | 3_10_0-1160_102_1-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-1-1.el7 | 3_10_0-1160_105_1-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1160_95_1-1-4.el7 | 3_10_0-1160_95_1-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_99_1-1-3.el7 | 3_10_0-1160_99_1-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-1-2.el7 | 3_10_0-1160_102_1-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-debuginfo-1-2.el7 | 3_10_0-1160_102_1-debuginfo-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-1-1.el7 | 3_10_0-1160_105_1-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-debuginfo-1-1.el7 | 3_10_0-1160_105_1-debuginfo-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1160_95_1-1-4.el7 | 3_10_0-1160_95_1-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_95_1-debuginfo-1-4.el7 | 3_10_0-1160_95_1-debuginfo-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_99_1-1-3.el7 | 3_10_0-1160_99_1-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_99_1-debuginfo-1-3.el7 | 3_10_0-1160_99_1-debuginfo-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-1-2.el7 | 3_10_0-1160_102_1-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-debuginfo-1-2.el7 | 3_10_0-1160_102_1-debuginfo-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-1-1.el7 | 3_10_0-1160_105_1-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-debuginfo-1-1.el7 | 3_10_0-1160_105_1-debuginfo-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1160_95_1-1-4.el7 | 3_10_0-1160_95_1-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_95_1-debuginfo-1-4.el7 | 3_10_0-1160_95_1-debuginfo-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_99_1-1-3.el7 | 3_10_0-1160_99_1-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_99_1-debuginfo-1-3.el7 | 3_10_0-1160_99_1-debuginfo-1-3.el7 |
Red Hat Enterprise Linux | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The RHSA-2024:0371 vulnerability is classified as important.
You can resolve RHSA-2024:0371 by updating the kpatch-patch package to the latest version specified in the advisory.
RHSA-2024:0371 affects various versions of Red Hat Enterprise Linux Server and Red Hat Enterprise Linux for Power, little endian.
The impacted versions include kpatch-patch versions up to 3_10_0-1160_102_1-1-2.el7.
Yes, the kpatch-patch package needs to be updated to address the vulnerability in RHSA-2024:0371.