First published: Tue Jan 30 2024(Updated: )
Important: kpatch-patch security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <4_18_0-477_21_1-1-3.el8_8 | 4_18_0-477_21_1-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_27_1-1-2.el8_8 | 4_18_0-477_27_1-1-2.el8_8 |
redhat/kpatch-patch | <4_18_0-477_36_1-1-1.el8_8 | 4_18_0-477_36_1-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_21_1-1-3.el8_8 | 4_18_0-477_21_1-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_21_1-debuginfo-1-3.el8_8 | 4_18_0-477_21_1-debuginfo-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_21_1-debugsource-1-3.el8_8 | 4_18_0-477_21_1-debugsource-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_27_1-1-2.el8_8 | 4_18_0-477_27_1-1-2.el8_8 |
redhat/kpatch-patch | <4_18_0-477_27_1-debuginfo-1-2.el8_8 | 4_18_0-477_27_1-debuginfo-1-2.el8_8 |
redhat/kpatch-patch | <4_18_0-477_27_1-debugsource-1-2.el8_8 | 4_18_0-477_27_1-debugsource-1-2.el8_8 |
redhat/kpatch-patch | <4_18_0-477_36_1-1-1.el8_8 | 4_18_0-477_36_1-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_36_1-debuginfo-1-1.el8_8 | 4_18_0-477_36_1-debuginfo-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_36_1-debugsource-1-1.el8_8 | 4_18_0-477_36_1-debugsource-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_21_1-1-3.el8_8 | 4_18_0-477_21_1-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_21_1-debuginfo-1-3.el8_8 | 4_18_0-477_21_1-debuginfo-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_21_1-debugsource-1-3.el8_8 | 4_18_0-477_21_1-debugsource-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_27_1-1-2.el8_8 | 4_18_0-477_27_1-1-2.el8_8 |
redhat/kpatch-patch | <4_18_0-477_27_1-debuginfo-1-2.el8_8 | 4_18_0-477_27_1-debuginfo-1-2.el8_8 |
redhat/kpatch-patch | <4_18_0-477_27_1-debugsource-1-2.el8_8 | 4_18_0-477_27_1-debugsource-1-2.el8_8 |
redhat/kpatch-patch | <4_18_0-477_36_1-1-1.el8_8 | 4_18_0-477_36_1-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_36_1-debuginfo-1-1.el8_8 | 4_18_0-477_36_1-debuginfo-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_36_1-debugsource-1-1.el8_8 | 4_18_0-477_36_1-debugsource-1-1.el8_8 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0554 is classified as important due to identified vulnerabilities in the kpatch-patch security update.
To fix RHSA-2024:0554, update the kpatch-patch package to the specified versions: 4_18_0-477_21_1-1-3.el8_8, 4_18_0-477_27_1-1-2.el8_8, or 4_18_0-477_36_1-1-1.el8_8.
RHSA-2024:0554 addresses issues related to incorrect verifier pruning that could lead to unsafe code paths.
RHSA-2024:0554 affects Red Hat Enterprise Linux for x86_64 and ppc64le architectures.
Yes, the required versions of kpatch-patch for resolving RHSA-2024:0554 are outlined as 4_18_0-477_21_1-1-3.el8_8, 4_18_0-477_27_1-1-2.el8_8, or 4_18_0-477_36_1-1-1.el8_8.