First published: Tue Jan 23 2024(Updated: )
Important: kpatch-patch security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <5_14_0-284_18_1-1-6.el9_2 | 5_14_0-284_18_1-1-6.el9_2 |
redhat/kpatch-patch | <5_14_0-284_25_1-1-5.el9_2 | 5_14_0-284_25_1-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_30_1-1-2.el9_2 | 5_14_0-284_30_1-1-2.el9_2 |
redhat/kpatch-patch | <5_14_0-284_40_1-1-1.el9_2 | 5_14_0-284_40_1-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_18_1-1-6.el9_2 | 5_14_0-284_18_1-1-6.el9_2 |
redhat/kpatch-patch | <5_14_0-284_18_1-debuginfo-1-6.el9_2 | 5_14_0-284_18_1-debuginfo-1-6.el9_2 |
redhat/kpatch-patch | <5_14_0-284_18_1-debugsource-1-6.el9_2 | 5_14_0-284_18_1-debugsource-1-6.el9_2 |
redhat/kpatch-patch | <5_14_0-284_25_1-1-5.el9_2 | 5_14_0-284_25_1-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_25_1-debuginfo-1-5.el9_2 | 5_14_0-284_25_1-debuginfo-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_25_1-debugsource-1-5.el9_2 | 5_14_0-284_25_1-debugsource-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_30_1-1-2.el9_2 | 5_14_0-284_30_1-1-2.el9_2 |
redhat/kpatch-patch | <5_14_0-284_30_1-debuginfo-1-2.el9_2 | 5_14_0-284_30_1-debuginfo-1-2.el9_2 |
redhat/kpatch-patch | <5_14_0-284_30_1-debugsource-1-2.el9_2 | 5_14_0-284_30_1-debugsource-1-2.el9_2 |
redhat/kpatch-patch | <5_14_0-284_40_1-1-1.el9_2 | 5_14_0-284_40_1-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_40_1-debuginfo-1-1.el9_2 | 5_14_0-284_40_1-debuginfo-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_40_1-debugsource-1-1.el9_2 | 5_14_0-284_40_1-debugsource-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_18_1-1-6.el9_2 | 5_14_0-284_18_1-1-6.el9_2 |
redhat/kpatch-patch | <5_14_0-284_18_1-debuginfo-1-6.el9_2 | 5_14_0-284_18_1-debuginfo-1-6.el9_2 |
redhat/kpatch-patch | <5_14_0-284_18_1-debugsource-1-6.el9_2 | 5_14_0-284_18_1-debugsource-1-6.el9_2 |
redhat/kpatch-patch | <5_14_0-284_25_1-1-5.el9_2 | 5_14_0-284_25_1-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_25_1-debuginfo-1-5.el9_2 | 5_14_0-284_25_1-debuginfo-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_25_1-debugsource-1-5.el9_2 | 5_14_0-284_25_1-debugsource-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_30_1-1-2.el9_2 | 5_14_0-284_30_1-1-2.el9_2 |
redhat/kpatch-patch | <5_14_0-284_30_1-debuginfo-1-2.el9_2 | 5_14_0-284_30_1-debuginfo-1-2.el9_2 |
redhat/kpatch-patch | <5_14_0-284_30_1-debugsource-1-2.el9_2 | 5_14_0-284_30_1-debugsource-1-2.el9_2 |
redhat/kpatch-patch | <5_14_0-284_40_1-1-1.el9_2 | 5_14_0-284_40_1-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_40_1-debuginfo-1-1.el9_2 | 5_14_0-284_40_1-debuginfo-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_40_1-debugsource-1-1.el9_2 | 5_14_0-284_40_1-debugsource-1-1.el9_2 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0381 is classified as Important.
To fix RHSA-2024:0381, you need to update the kpatch-patch package to the latest version specified in the advisory.
RHSA-2024:0381 affects Red Hat Enterprise Linux for x86_64 and PowerPC architectures.
RHSA-2024:0381 addresses vulnerabilities related to BPF incorrect verifier pruning which can lead to unsafe code paths.
RHSA-2024:0381 was released on an unspecified date in 2024.