First published: Wed Jan 24 2024(Updated: )
Important: kpatch-patch security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <5_14_0-70_64_1-1-4.el9_0 | 5_14_0-70_64_1-1-4.el9_0 |
redhat/kpatch-patch | <5_14_0-70_70_1-1-3.el9_0 | 5_14_0-70_70_1-1-3.el9_0 |
redhat/kpatch-patch | <5_14_0-70_75_1-1-2.el9_0 | 5_14_0-70_75_1-1-2.el9_0 |
redhat/kpatch-patch | <5_14_0-70_80_1-1-1.el9_0 | 5_14_0-70_80_1-1-1.el9_0 |
redhat/kpatch-patch | <5_14_0-70_64_1-1-4.el9_0 | 5_14_0-70_64_1-1-4.el9_0 |
redhat/kpatch-patch | <5_14_0-70_64_1-debuginfo-1-4.el9_0 | 5_14_0-70_64_1-debuginfo-1-4.el9_0 |
redhat/kpatch-patch | <5_14_0-70_64_1-debugsource-1-4.el9_0 | 5_14_0-70_64_1-debugsource-1-4.el9_0 |
redhat/kpatch-patch | <5_14_0-70_70_1-1-3.el9_0 | 5_14_0-70_70_1-1-3.el9_0 |
redhat/kpatch-patch | <5_14_0-70_70_1-debuginfo-1-3.el9_0 | 5_14_0-70_70_1-debuginfo-1-3.el9_0 |
redhat/kpatch-patch | <5_14_0-70_70_1-debugsource-1-3.el9_0 | 5_14_0-70_70_1-debugsource-1-3.el9_0 |
redhat/kpatch-patch | <5_14_0-70_75_1-1-2.el9_0 | 5_14_0-70_75_1-1-2.el9_0 |
redhat/kpatch-patch | <5_14_0-70_75_1-debuginfo-1-2.el9_0 | 5_14_0-70_75_1-debuginfo-1-2.el9_0 |
redhat/kpatch-patch | <5_14_0-70_75_1-debugsource-1-2.el9_0 | 5_14_0-70_75_1-debugsource-1-2.el9_0 |
redhat/kpatch-patch | <5_14_0-70_80_1-1-1.el9_0 | 5_14_0-70_80_1-1-1.el9_0 |
redhat/kpatch-patch | <5_14_0-70_80_1-debuginfo-1-1.el9_0 | 5_14_0-70_80_1-debuginfo-1-1.el9_0 |
redhat/kpatch-patch | <5_14_0-70_80_1-debugsource-1-1.el9_0 | 5_14_0-70_80_1-debugsource-1-1.el9_0 |
redhat/kpatch-patch | <5_14_0-70_64_1-1-4.el9_0 | 5_14_0-70_64_1-1-4.el9_0 |
redhat/kpatch-patch | <5_14_0-70_64_1-debuginfo-1-4.el9_0 | 5_14_0-70_64_1-debuginfo-1-4.el9_0 |
redhat/kpatch-patch | <5_14_0-70_64_1-debugsource-1-4.el9_0 | 5_14_0-70_64_1-debugsource-1-4.el9_0 |
redhat/kpatch-patch | <5_14_0-70_70_1-1-3.el9_0 | 5_14_0-70_70_1-1-3.el9_0 |
redhat/kpatch-patch | <5_14_0-70_70_1-debuginfo-1-3.el9_0 | 5_14_0-70_70_1-debuginfo-1-3.el9_0 |
redhat/kpatch-patch | <5_14_0-70_70_1-debugsource-1-3.el9_0 | 5_14_0-70_70_1-debugsource-1-3.el9_0 |
redhat/kpatch-patch | <5_14_0-70_75_1-1-2.el9_0 | 5_14_0-70_75_1-1-2.el9_0 |
redhat/kpatch-patch | <5_14_0-70_75_1-debuginfo-1-2.el9_0 | 5_14_0-70_75_1-debuginfo-1-2.el9_0 |
redhat/kpatch-patch | <5_14_0-70_75_1-debugsource-1-2.el9_0 | 5_14_0-70_75_1-debugsource-1-2.el9_0 |
redhat/kpatch-patch | <5_14_0-70_80_1-1-1.el9_0 | 5_14_0-70_80_1-1-1.el9_0 |
redhat/kpatch-patch | <5_14_0-70_80_1-debuginfo-1-1.el9_0 | 5_14_0-70_80_1-debuginfo-1-1.el9_0 |
redhat/kpatch-patch | <5_14_0-70_80_1-debugsource-1-1.el9_0 | 5_14_0-70_80_1-debugsource-1-1.el9_0 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0386 is classified as Important due to the potential impact on system security.
To fix RHSA-2024:0386, install the updated version of the kpatch-patch package specified in the advisory.
RHSA-2024:0386 affects various editions of Red Hat Enterprise Linux, including Power and x86_64 architectures.
RHSA-2024:0386 addresses a use-after-free vulnerability in the Linux kernel related to net/sched: sch_hfsc.
Yes, applying the patch for RHSA-2024:0386 is safe and recommended to mitigate the identified security vulnerability.